Lines Matching refs:All

5 # All types used for devices.
10 # All types used for processes.
13 # All types used for filesystems.
18 # All types used for context= mounts.
21 # All types used for files that can exist on a labeled fs.
27 # All types used for domain entry points.
30 # All types used for /data files.
32 # All types in /data, not in /data/vendor
34 # All types in /vendor
37 # All types use for sysfs files.
40 # All types use for debugfs files.
46 # All types used for nodes/hosts.
49 # All types used for network interfaces.
52 # All types used for network ports.
55 # All types used for property service
60 # All properties defined in core SELinux policy. Should not be
64 # All properties used to configure log filtering.
67 # All service_manager types created by system_server
79 # All types used for services managed by servicemanager.
84 # All types used for services managed by hwservicemanager
87 # All HwBinder services guaranteed to be passthrough. These services always run
92 # All HwBinder services guaranteed to be offered only by core domain components
95 # All types used for services managed by vndservicemanager
99 # All domains that can override MLS restrictions.
103 # All types that can override MLS restrictions.
107 # All domains used for apps.
110 # All third party apps.
113 # All domains used for apps with network access.
116 # All domains used for apps with bluetooth access.
119 # All domains used for binder service domains.
127 # All core domains (as opposed to vendor/device-specific domains)
130 # All socket devices owned by core domain components
133 # All vendor domains which violate the requirement of not using Binder
137 # All vendor domains which violate the requirement of not using sockets for
142 # All vendor domains which violate the requirement of not executing
168 # All HAL servers
170 # All HAL clients