blob: 66bdea40b665cfa46a7547b611728d3a9abcfa45 [file] [log] [blame]
Subash Abhinov Kasiviswanathan2c3fed32014-03-12 17:13:13 -06001#Policies for IPv6 tethering
2allow netd netd:capability { setgid setuid };
Biswajit Paul64f83f62014-10-13 14:36:16 -07003dontaudit netd self:capability sys_module;
Bryse Flowers31f25fc2016-05-21 19:00:49 -07004binder_use(netd);
5allow netd qtitetherservice_service:service_manager find;
Ravi Kumar Siddojigari91ffd842014-10-15 17:38:15 +05306
Avijit Kanti Das441bad42015-05-12 14:07:41 -07007allow netd netd:packet_socket create_socket_perms;
8
Boxiang Panbd056452014-10-31 18:01:46 -07009unix_socket_connect(netd, cnd, cnd)
Manu Prasad6b869a82014-12-05 18:53:01 +053010
11allow netd wfdservice:fd use;
12allow netd wfdservice:tcp_socket rw_socket_perms;
Ravinder Konkabbe60732015-05-27 17:18:26 +053013
14# allow to read /data/misc/ipa/tether_stats file
15allow netd ipacm_data_file:dir r_dir_perms;
16allow netd ipacm_data_file:file r_file_perms;
Hamad Kadmany567ffc72015-08-27 15:36:39 +030017
Ashwanth Goliad2c7ef2016-06-03 12:55:06 +053018#allow netd to use privileged sock ioctls
19allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls;
20
Hamad Kadmany567ffc72015-08-27 15:36:39 +030021# needed for netd to start FST Manager via system property
22allow netd netd_prop:property_service set;
Sravanthi Palakonda7e92d042015-11-06 16:56:06 +053023
24allow netd self:capability fsetid;
25allow netd hostapd:unix_dgram_socket sendto;
26
27# Allow netd to chmod dir /data/misc/dhcp
28allow netd dhcp_data_file:dir create_dir_perms;
29
30type_transition netd wifi_data_file:dir wpa_socket "sockets";
31allow netd wpa_socket:dir create_dir_perms;
32allow netd wpa_socket:sock_file create_file_perms;