#Policies for IPv6 tethering allow netd netd:capability { setgid setuid }; dontaudit netd self:capability sys_module; binder_use(netd); allow netd qtitetherservice_service:service_manager find; allow netd netd:packet_socket create_socket_perms_no_ioctl; #unix_socket_connect(netd, cnd, cnd) allow netd wfdservice:fd use; #allow netd wfdservice:tcp_socket rw_socket_perms; hal_client_domain(netd, wifidisplayhalservice); #allow netd to use privileged sock ioctls allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls; # needed for netd to start FST Manager via system property set_prop(netd, netd_prop) allow netd self:capability fsetid; #allow netd hostapd:unix_dgram_socket sendto; # Allow netd to chmod dir /data/misc/dhcp allow netd dhcp_data_file:dir create_dir_perms; type_transition netd wifi_data_file:dir wpa_socket "sockets"; allow netd wpa_socket:dir create_dir_perms; #allow netd wpa_socket:sock_file create_file_perms;