623975fa5a
Permissive domains are only intended for development. When a device launches, we want to ensure that all permissive domains are in, at a minimum, unconfined+enforcing. Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During development, this flag is false, and permissive domains are allowed. When SELinux new feature development has been frozen immediately before release, this flag will be flipped to true. Any previously permissive domains will move into unconfined+enforcing. This will ensure that all SELinux domains have at least a minimal level of protection. Unconditionally enable this flag for all user builds. Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
53 lines
1.7 KiB
Text
53 lines
1.7 KiB
Text
# bluetooth subsystem
|
|
type bluetooth, domain;
|
|
permissive_or_unconfined(bluetooth)
|
|
app_domain(bluetooth)
|
|
|
|
# Data file accesses.
|
|
allow bluetooth bluetooth_data_file:dir create_dir_perms;
|
|
allow bluetooth bluetooth_data_file:notdevfile_class_set create_file_perms;
|
|
|
|
# bluetooth factory file accesses.
|
|
r_dir_file(bluetooth, bluetooth_efs_file)
|
|
|
|
# Device accesses.
|
|
allow bluetooth { tun_device uhid_device hci_attach_dev }:chr_file rw_file_perms;
|
|
|
|
# Other domains that can create and use bluetooth sockets.
|
|
# SELinux does not presently define a specific socket class for
|
|
# bluetooth sockets, nor does it distinguish among the bluetooth protocols.
|
|
allow bluetoothdomain self:socket *;
|
|
|
|
# sysfs access.
|
|
allow bluetooth sysfs_bluetooth_writable:file rw_file_perms;
|
|
allow bluetooth self:capability net_admin;
|
|
|
|
# Allow clients to use a socket provided by the bluetooth app.
|
|
allow bluetoothdomain bluetooth:unix_stream_socket { read write shutdown };
|
|
|
|
# tethering
|
|
allow bluetooth self:{ tun_socket udp_socket } { ioctl create };
|
|
allow bluetooth efs_file:dir search;
|
|
|
|
# Talk to init over the property socket.
|
|
unix_socket_connect(bluetooth, property, init)
|
|
|
|
# proc access.
|
|
allow bluetooth proc_bluetooth_writable:file rw_file_perms;
|
|
|
|
# bluetooth file transfers
|
|
allow bluetooth sdcard_internal:dir create_dir_perms;
|
|
allow bluetooth sdcard_internal:file create_file_perms;
|
|
|
|
# Allow write access to bluetooth specific properties
|
|
allow bluetooth bluetooth_prop:property_service set;
|
|
|
|
###
|
|
### Neverallow rules
|
|
###
|
|
### These are things that the bluetooth app should NEVER be able to do
|
|
###
|
|
|
|
# Superuser capabilities.
|
|
# bluetooth requires net_admin.
|
|
neverallow { bluetooth -unconfineddomain } self:capability ~net_admin;
|