Lines Matching refs:All

5 # All types used for devices.
10 # All types used for processes.
13 # All types used for filesystems.
18 # All types used for context= mounts.
21 # All types used for files that can exist on a labeled fs.
27 # All types used for domain entry points.
30 # All types used for /data files.
33 # All types in /data, not in /data/vendor
37 # All types in /system
40 # All types in /vendor
43 # All types used for procfs files.
54 # All types used for sysfs files.
57 # All types use for debugfs files.
63 # All types used for nodes/hosts.
66 # All types used for network interfaces.
69 # All types used for network ports.
72 # All types used for property service
77 # All properties defined in core SELinux policy. Should not be
81 # All properties used to configure log filtering.
84 # All properties that are not specific to device but are added from
89 # Properties used for representing ownership. All properties should have one
92 # All properties defined by /system.
95 # All /system-defined properties used only in /system.
98 # All /system-defined properties which can't be written outside /system.
101 # All /system-defined properties with no restrictions.
104 # All properties defined by /product.
112 # All properties defined by /vendor.
115 # All /vendor-defined properties used only in /vendor.
118 # All /vendor-defined properties which can't be written outside /vendor.
121 # All /vendor-defined properties with no restrictions.
124 # All service_manager types created by system_server
142 # All types used for services managed by servicemanager.
147 # All types used for services managed by hwservicemanager
150 # All HwBinder services guaranteed to be passthrough. These services always run
155 # All HwBinder services guaranteed to be offered only by core domain components
158 # All HwBinder services that untrusted apps can't directly access
161 # All types used for services managed by vndservicemanager
165 # All domains that can override MLS restrictions.
169 # All types that can override MLS restrictions.
173 # All domains used for apps.
176 # All third party apps.
179 # All domains used for apps with network access.
182 # All domains used for apps with bluetooth access.
185 # All domains used for binder service domains.
193 # All core domains (as opposed to vendor/device-specific domains)
196 # All socket devices owned by core domain components
200 # All vendor domains which violate the requirement of not using Binder
205 # All vendor domains which violate the requirement of not using sockets for
211 # All vendor domains which violate the requirement of not executing
217 # All domains which violate the requirement of not sharing files by path
223 # All system domains which violate the requirement of not executing vendor
229 # All system domains which violate the requirement of not writing vendor
235 # All system domains which violate the requirement of not writing to
275 # All HAL servers
277 # All HAL clients
364 # All types used for super partition block devices.