Skip to content
Snippets Groups Projects
Select Git revision
  • android-wear-6.0.1_r0.40
  • master default protected
  • android-msm-bullhead-3.10-nougat_kgdb_less_changes
  • android-msm-bullhead-3.10-nougat_kgdb
  • android-msm-bullhead-3.10-nougat_klist
  • android-4.4
  • android-msm-vega-4.4-oreo-daydream
  • android-msm-wahoo-4.4-p-preview-5
  • android-msm-wahoo-4.4-pie
  • android-msm-marlin-3.18-p-preview-5
  • android-msm-marlin-3.18-pie
  • android-msm-wahoo-2018.07-oreo-m2
  • android-msm-wahoo-2018.07-oreo-m4
  • android-msm-wahoo-4.4-p-preview-4
  • android-msm-bullhead-3.10-oreo-m6
  • android-msm-angler-3.10-oreo-m6
  • android-msm-marlin-3.18-p-preview-4
  • android-msm-stargazer-3.18-oreo-wear-dr
  • android-msm-catshark-3.18-oreo-wear-dr
  • android-msm-wahoo-4.4-oreo-m2
  • android-msm-wahoo-4.4-oreo-m4
  • android-daydreamos-8.0.0_r0.5
  • android-8.1.0_r0.92
  • android-8.1.0_r0.91
  • android-daydreamos-8.0.0_r0.4
  • android-p-preview-5_r0.2
  • android-p-preview-5_r0.1
  • android-9.0.0_r0.5
  • android-9.0.0_r0.4
  • android-9.0.0_r0.2
  • android-9.0.0_r0.1
  • android-8.1.0_r0.81
  • android-8.1.0_r0.80
  • android-8.1.0_r0.78
  • android-8.1.0_r0.76
  • android-8.1.0_r0.75
  • android-8.1.0_r0.72
  • android-8.1.0_r0.70
  • android-p-preview-4_r0.2
  • android-p-preview-4_r0.1
  • android-wear-8.0.0_r0.30
41 results

xxs1500_ss.c

Blame
  • bluetooth.te 1.63 KiB
    # bluetooth subsystem
    type bluetooth, domain;
    permissive bluetooth;
    app_domain(bluetooth)
    
    # Data file accesses.
    allow bluetooth bluetooth_data_file:dir create_dir_perms;
    allow bluetooth bluetooth_data_file:notdevfile_class_set create_file_perms;
    
    # bluetooth factory file accesses.
    r_dir_file(bluetooth, bluetooth_efs_file)
    
    # Device accesses.
    allow bluetooth { tun_device uhid_device hci_attach_dev }:chr_file rw_file_perms;
    
    # Other domains that can create and use bluetooth sockets.
    # SELinux does not presently define a specific socket class for
    # bluetooth sockets, nor does it distinguish among the bluetooth protocols.
    allow bluetoothdomain self:socket *;
    
    # sysfs access.
    allow bluetooth sysfs_bluetooth_writable:file rw_file_perms;
    allow bluetooth self:capability net_admin;
    
    # Allow clients to use a socket provided by the bluetooth app.
    allow bluetoothdomain bluetooth:unix_stream_socket { read write shutdown };
    
    # tethering
    allow bluetooth self:{ tun_socket udp_socket } { ioctl create };
    allow bluetooth efs_file:dir search;
    
    # Talk to init over the property socket.
    unix_socket_connect(bluetooth, property, init)
    
    # proc access.
    allow bluetooth proc_bluetooth_writable:file rw_file_perms;
    
    # bluetooth file transfers
    allow bluetooth sdcard_internal:dir create_dir_perms;
    allow bluetooth sdcard_internal:file create_file_perms;
    
    # Allow write access to bluetooth specific properties
    allow bluetooth bluetooth_prop:property_service set;
    
    ###
    ### Neverallow rules
    ###
    ### These are things that the bluetooth app should NEVER be able to do
    ###
    
    # Superuser capabilities.
    # bluetooth requires net_admin.
    neverallow bluetooth self:capability ~net_admin;