Lines Matching full:domain
10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
66 # Allow the specified domain to read directories, files
74 # unconfined_domain(domain)
75 # Allow the specified domain to do anything.
83 # tmpfs_domain(domain)
85 # this domain when creating tmpfs / shmem / ashmem files.
94 # init_daemon_domain(domain)
95 # Set up a transition from init to the daemon domain
103 # app_domain(domain)
112 # relabelto_domain(domain)
113 # Allows this domain to use the relabelto permission
119 # platform_app_domain(domain)
127 # net_domain(domain)
134 # bluetooth_domain(domain)
159 # binder_use(domain)
160 # Allow domain to use Binder IPC.
167 # all domains in domain.te.
174 # Call the server domain and optionally transfer references to it.
183 # binder_service(domain)
184 # Mark a domain as being a Binder service domain.
191 # selinux_check_access(domain)
192 # Allow domain to check SELinux permissions via selinuxfs.
201 # selinux_check_context(domain)
202 # Allow domain to check SELinux contexts via selinuxfs.
210 # selinux_getenforce(domain)
211 # Allow domain to check whether SELinux is enforcing.
218 # selinux_setenforce(domain)
219 # Allow domain to set SELinux to enforcing.
227 # selinux_setbool(domain)
228 # Allow domain to set SELinux booleans.
236 # security_access_policy(domain)
250 # selinux_manage_policy(domain)
266 # mmac_manage_policy(domain)
278 # access_logcat(domain)
287 # access_kmsg(domain)
297 # write_klog(domain)