Lines Matching refs:All
5 # All types used for devices.
10 # All types used for processes.
13 # All types used for filesystems.
18 # All types used for context= mounts.
21 # All types used for files that can exist on a labeled fs.
27 # All types used for domain entry points.
30 # All types used for /data files.
33 # All types in /data, not in /data/vendor
35 # All types in /vendor
38 # All types use for sysfs files.
41 # All types use for debugfs files.
47 # All types used for nodes/hosts.
50 # All types used for network interfaces.
53 # All types used for network ports.
56 # All types used for property service
61 # All properties defined in core SELinux policy. Should not be
65 # All properties used to configure log filtering.
68 # All service_manager types created by system_server
80 # All types used for services managed by servicemanager.
85 # All types used for services managed by hwservicemanager
88 # All HwBinder services guaranteed to be passthrough. These services always run
93 # All HwBinder services guaranteed to be offered only by core domain components
96 # All types used for services managed by vndservicemanager
100 # All domains that can override MLS restrictions.
104 # All types that can override MLS restrictions.
108 # All domains used for apps.
111 # All third party apps.
114 # All domains used for apps with network access.
117 # All domains used for apps with bluetooth access.
120 # All domains used for binder service domains.
128 # All core domains (as opposed to vendor/device-specific domains)
131 # All socket devices owned by core domain components
134 # All vendor domains which violate the requirement of not using Binder
139 # All vendor domains which violate the requirement of not using sockets for
145 # All vendor domains which violate the requirement of not executing
186 # All HAL servers
188 # All HAL clients