32 lines
1 KiB
Text
32 lines
1 KiB
Text
#Policies for IPv6 tethering
|
|
allow netd netd:capability { setgid setuid };
|
|
dontaudit netd self:capability sys_module;
|
|
binder_use(netd);
|
|
allow netd qtitetherservice_service:service_manager find;
|
|
|
|
allow netd netd:packet_socket create_socket_perms;
|
|
|
|
unix_socket_connect(netd, cnd, cnd)
|
|
|
|
allow netd wfdservice:fd use;
|
|
allow netd wfdservice:tcp_socket rw_socket_perms;
|
|
|
|
# allow to read /data/misc/ipa/tether_stats file
|
|
allow netd ipacm_data_file:dir r_dir_perms;
|
|
allow netd ipacm_data_file:file r_file_perms;
|
|
|
|
#allow netd to use privileged sock ioctls
|
|
allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls;
|
|
|
|
# needed for netd to start FST Manager via system property
|
|
set_prop(netd, netd_prop)
|
|
|
|
allow netd self:capability fsetid;
|
|
allow netd hostapd:unix_dgram_socket sendto;
|
|
|
|
# Allow netd to chmod dir /data/misc/dhcp
|
|
allow netd dhcp_data_file:dir create_dir_perms;
|
|
|
|
type_transition netd wifi_data_file:dir wpa_socket "sockets";
|
|
allow netd wpa_socket:dir create_dir_perms;
|
|
allow netd wpa_socket:sock_file create_file_perms;
|