Lines Matching refs:All

5 # All types used for devices.
10 # All types used for processes.
13 # All types used for filesystems.
18 # All types used for context= mounts.
21 # All types used for files that can exist on a labeled fs.
27 # All types used for domain entry points.
30 # All types used for /data files.
33 # All types in /data, not in /data/vendor
36 # All types in /vendor
39 # All types used for procfs files.
43 # All types used for sysfs files.
46 # All types use for debugfs files.
52 # All types used for nodes/hosts.
55 # All types used for network interfaces.
58 # All types used for network ports.
61 # All types used for property service
66 # All properties defined in core SELinux policy. Should not be
70 # All properties used to configure log filtering.
73 # All properties that are not specific to device but are added from
78 # All service_manager types created by system_server
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
110 # All domains that can override MLS restrictions.
114 # All types that can override MLS restrictions.
118 # All domains used for apps.
121 # All third party apps.
124 # All domains used for apps with network access.
127 # All domains used for apps with bluetooth access.
130 # All domains used for binder service domains.
138 # All core domains (as opposed to vendor/device-specific domains)
141 # All socket devices owned by core domain components
145 # All vendor domains which violate the requirement of not using Binder
150 # All vendor domains which violate the requirement of not using sockets for
156 # All vendor domains which violate the requirement of not executing
162 # All domains which violate the requirement of not sharing files by path
168 # All system domains which violate the requirement of not executing vendor
174 # All system domains which violate the requirement of not writing vendor
215 # All HAL servers
217 # All HAL clients