Lines Matching refs:system_app
7 typeattribute system_app coredomain;
9 app_domain(system_app)
10 net_domain(system_app)
11 binder_service(system_app)
14 allow system_app rootfs:dir getattr;
17 allow system_app system_app_data_file:dir create_dir_perms;
18 allow system_app system_app_data_file:{ file lnk_file } create_file_perms;
21 allow system_app misc_user_data_file:dir create_dir_perms;
22 allow system_app misc_user_data_file:file create_file_perms;
25 allow system_app mnt_media_rw_file:dir search;
30 allow system_app apex_data_file:dir search;
31 allow system_app staging_data_file:file r_file_perms;
34 allow system_app wallpaper_file:file r_file_perms;
37 allow system_app icon_file:file r_file_perms;
40 set_prop(system_app, bluetooth_a2dp_offload_prop)
41 set_prop(system_app, bluetooth_audio_hal_prop)
42 set_prop(system_app, bluetooth_prop)
43 set_prop(system_app, debug_prop)
44 set_prop(system_app, system_prop)
45 set_prop(system_app, exported_bluetooth_prop)
46 set_prop(system_app, exported_system_prop)
47 set_prop(system_app, exported2_system_prop)
48 set_prop(system_app, exported3_system_prop)
49 set_prop(system_app, logd_prop)
50 set_prop(system_app, net_radio_prop)
51 set_prop(system_app, system_radio_prop)
52 set_prop(system_app, exported_system_radio_prop)
53 set_prop(system_app, log_tag_prop)
54 userdebug_or_eng(`set_prop(system_app, logpersistd_logging_prop)')
55 auditallow system_app net_radio_prop:property_service set;
56 auditallow system_app system_radio_prop:property_service set;
57 auditallow system_app exported_system_radio_prop:property_service set;
59 set_prop(system_app, dynamic_system_prop)
62 set_prop(system_app, ctl_default_prop)
63 set_prop(system_app, ctl_bugreport_prop)
66 allow system_app anr_data_file:dir ra_dir_perms;
67 allow system_app anr_data_file:file create_file_perms;
70 allow system_app asec_apk_file:file r_file_perms;
73 binder_call(system_app, statsd)
76 binder_call(system_app, incidentd)
79 binder_call(system_app, gpuservice)
81 allow system_app servicemanager:service_manager list;
83 allow system_app {
97 # suppress denials for services system_app should not be accessing.
98 dontaudit system_app {
109 allow system_app keystore:keystore_key {
130 allow system_app {
135 allow system_app cgroup:file w_file_perms;
137 control_logd(system_app)
138 read_runtime_log_tags(system_app)
139 get_prop(system_app, device_logging_prop)
143 allow system_app system_server:udp_socket {
150 # app domains which access /dev/fuse should not run as system_app
151 neverallow system_app fuse_device:chr_file *;