Lines Matching full:domain
10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
66 # Allow the specified domain to read directories, files
74 # tmpfs_domain(domain)
76 # this domain when creating tmpfs / shmem / ashmem files.
84 # init_daemon_domain(domain)
85 # Set up a transition from init to the daemon domain
93 # app_domain(domain)
104 # net_domain(domain)
111 # bluetooth_domain(domain)
138 # Allows source domain to set the
156 # binder_use(domain)
157 # Allow domain to use Binder IPC.
166 # all domains in domain.te.
173 # Call the server domain and optionally transfer references to it.
182 # binder_service(domain)
183 # Mark a domain as being a Binder service domain.
190 # wakelock_use(domain)
191 # Allow domain to manage wake locks
200 # selinux_check_access(domain)
201 # Allow domain to check SELinux permissions via selinuxfs.
209 # selinux_check_context(domain)
210 # Allow domain to check SELinux contexts via selinuxfs.
217 # selinux_setenforce(domain)
218 # Allow domain to set SELinux to enforcing.
225 # selinux_setbool(domain)
226 # Allow domain to set SELinux booleans.
233 # security_access_policy(domain)
242 # selinux_manage_policy(domain)
255 # mmac_manage_policy(domain)
268 # access_kmsg(domain)
278 # create_pty(domain)
279 # Allow domain to create and use a pty, isolated from any other domain ptys.
281 # Each domain gets a unique devpts type.
288 # allowed to everyone via domain.te.
309 # write_logd(domain)
318 # read_logd(domain)
327 # control_logd(domain)
337 # use_keystore(domain)
350 # use_drmservice(domain)