Lines Matching refs:to
3 # Allow a transition from olddomain to newdomain
6 # cause it to occur automatically - use domain_auto_trans
10 # Old domain may exec the file and transition to the new domain.
15 # New domain can send SIGCHLD to its caller.
25 # Automatically transition from olddomain to newdomain
37 # Allow domain to create a file labeled file_type in a
40 # cause it to occur automatically - use file_type_auto_trans
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
66 # Allow the specified domain to read directories, files
75 # Define and allow access to a unique type for
85 # Set up a transition from init to the daemon domain
120 # socket to serverdomain.
122 # Note: If you see denial records that distill to the
128 # This sequence is indicative of attempting to set a property.
147 # Allows source domain to set the
158 # Allows source domain to read the
168 # socket to serverdomain.
176 # Allow domain to use Binder IPC.
178 # Call the servicemanager and transfer references to it.
184 # rw access to /dev/binder and /dev/ashmem is presently granted to
190 # Allow clientdomain to perform binder IPC to serverdomain.
192 # Call the server domain and optionally transfer references to it.
194 # Allow the serverdomain to transfer references to the client on the reply.
203 # Used to allow binder IPC to the various system services.
210 # Allow domain to manage wake locks
220 # Allow domain to check SELinux permissions via selinuxfs.
229 # Allow domain to check SELinux contexts via selinuxfs.
237 # Allow domain to set SELinux to enforcing.
245 # Allow domain to set SELinux booleans.
253 # Read only access to all policy files and
262 # Ability to manage mmac policy files,
274 # Allow domain to create and use a pty, isolated from any other domain ptys.
283 # allowed to everyone via domain.te.
293 # SELinux rules which apply only to recovery mode
299 # SELinux rules which apply only to userdebug or eng builds
306 # Ability to write to android log
315 # Ability to run logcat and read from android
324 # Ability to control
328 # to permit control commands
334 # Ability to use keystore.
336 # to call getpidcon.
347 # Ability to use DrmService which requires
348 # DrmService to call getpidcon.