If unknown process owns these well-known name, unexpected deny can be occured.
So, subdivide deny policy.
Change-Id: I8e6cc73d80d60d348e2b510cabc77c73a6cb32ca
</policy>
<policy context="default">
<deny own_prefix="org.bt.frwk"/>
- <deny send_destination_prefix="org.bt.frwk"/>
+ <allow own_prefix="org.bt.frwk"/>
+ <deny send_destination_prefix="org.bt.frwk" send_interface="org.bluez.Profile1"/>
<deny own_prefix="org.frwk.gatt_service"/>
- <deny send_destination_prefix="org.frwk.gatt_service"/>
+ <allow own_prefix="org.frwk.gatt_service"/>
+ <deny send_destination_prefix="org.frwk.gatt_service" send_interface="org.bluez.GattDescriptor1"/>
+ <deny send_destination_prefix="org.frwk.gatt_service" send_interface="org.bluez.GattCharacteristic1"/>
</policy>
</busconfig>