Lines Matching refs:All

5 # All types used for devices.
13 # All types used for processes.
16 # All types used for filesystems.
21 # All types used for context= mounts.
24 # All types used for files that can exist on a labeled fs.
30 # All types used for domain entry points.
33 # All types used for /data files.
36 # All types in /data, not in /data/vendor
40 # All types used for app private data files in seapp_contexts.
45 # All types in /system
48 # All types in /vendor
51 # All types used for procfs files.
62 # All types used for sysfs files.
68 # All types use for debugfs files.
71 # All types used for tracefs files.
77 # All types used for nodes/hosts.
80 # All types used for network interfaces.
83 # All types used for network ports.
86 # All types used for property service
91 # All properties defined in core SELinux policy. Should not be
95 # All properties used to configure log filtering.
98 # All properties that are not specific to device but are added from
103 # Properties used for representing ownership. All properties should have one
106 # All properties defined by /system.
110 # All /system-defined properties used only in /system.
114 # All /system-defined properties which can't be written outside /system.
118 # All /system-defined properties with no restrictions.
122 # All keystore2_key labels.
125 # All properties defined by /product.
133 # All properties defined by /vendor.
137 # All /vendor-defined properties used only in /vendor.
141 # All /vendor-defined properties which can't be written outside /vendor.
145 # All /vendor-defined properties with no restrictions.
149 # All service_manager types created by system_server
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
186 # All HwBinder services that untrusted apps can't directly access
189 # All types used for services managed by vndservicemanager
193 # All domains that can override MLS restrictions.
197 # All types that can override MLS restrictions.
201 # All domains used for apps.
204 # All third party apps (except isolated_app and ephemeral_app)
207 # All domains used for apps with network access.
210 # All domains used for apps with bluetooth access.
213 # All domains used for binder service domains.
221 # All core domains (as opposed to vendor/device-specific domains)
224 # All vendor hwservice.
227 # All socket devices owned by core domain components
231 # All vendor domains which violate the requirement of not using sockets for
237 # All vendor domains which violate the requirement of not executing
243 # All domains which violate the requirement of not sharing files by path
249 # All system domains which violate the requirement of not executing vendor
255 # All system domains which violate the requirement of not writing vendor
261 # All system domains which violate the requirement of not writing to
301 # All HAL servers
303 # All HAL clients
393 # All types used for super partition block devices.
396 # All types used for DMA-BUF heaps
400 # All types used for DSU metadata files.