| #Policies for IPv6 tethering |
| allow netd netd:capability { setgid setuid }; |
| dontaudit netd self:capability sys_module; |
| binder_use(netd); |
| allow netd qtitetherservice_service:service_manager find; |
| |
| allow netd netd:packet_socket create_socket_perms_no_ioctl; |
| |
| #unix_socket_connect(netd, cnd, cnd) |
| |
| allow netd wfdservice:fd use; |
| #allow netd wfdservice:tcp_socket rw_socket_perms; |
| hal_client_domain(netd, wifidisplayhalservice); |
| |
| # allow to read /data/misc/ipa/tether_stats file |
| allow netd ipacm_data_file:dir r_dir_perms; |
| allow netd ipacm_data_file:file r_file_perms; |
| |
| #allow netd to use privileged sock ioctls |
| allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls; |
| |
| # needed for netd to start FST Manager via system property |
| allow netd netd_prop:property_service set; |
| |
| allow netd self:capability fsetid; |
| #allow netd hostapd:unix_dgram_socket sendto; |
| |
| # Allow netd to chmod dir /data/misc/dhcp |
| allow netd dhcp_data_file:dir create_dir_perms; |
| |
| type_transition netd wifi_data_file:dir wpa_socket "sockets"; |
| allow netd wpa_socket:dir create_dir_perms; |
| #allow netd wpa_socket:sock_file create_file_perms; |