#Policies for IPv6 tethering allow netd netd:capability { setgid setuid }; dontaudit netd self:capability sys_module; binder_use(netd); allow netd qtitetherservice_service:service_manager find; allow netd netd:packet_socket create_socket_perms; unix_socket_connect(netd, cnd, cnd) allow netd wfdservice:fd use; allow netd wfdservice:tcp_socket rw_socket_perms; # allow to read /data/misc/ipa/tether_stats file allow netd ipacm_data_file:dir r_dir_perms; allow netd ipacm_data_file:file r_file_perms; #allow netd to use privileged sock ioctls allowxperm netd self: { unix_stream_socket } ioctl priv_sock_ioctls; # needed for netd to start FST Manager via system property allow netd netd_prop:property_service set; allow netd self:capability fsetid; allow netd hostapd:unix_dgram_socket sendto; # Allow netd to chmod dir /data/misc/dhcp allow netd dhcp_data_file:dir create_dir_perms; type_transition netd wifi_data_file:dir wpa_socket "sockets"; allow netd wpa_socket:dir create_dir_perms; allow netd wpa_socket:sock_file create_file_perms;