Lines Matching refs:system_app

7 typeattribute system_app coredomain, mlstrustedsubject;
9 app_domain(system_app)
10 net_domain(system_app)
11 binder_service(system_app)
14 allow system_app rootfs:dir getattr;
17 allow system_app system_app_data_file:dir create_dir_perms;
18 allow system_app system_app_data_file:{ file lnk_file } create_file_perms;
21 allow system_app misc_user_data_file:dir create_dir_perms;
22 allow system_app misc_user_data_file:file create_file_perms;
25 allow system_app mnt_media_rw_file:dir search;
30 allow system_app apex_data_file:dir search;
31 allow system_app staging_data_file:file r_file_perms;
34 allow system_app wallpaper_file:file r_file_perms;
37 allow system_app icon_file:file r_file_perms;
40 set_prop(system_app, bluetooth_a2dp_offload_prop)
41 set_prop(system_app, bluetooth_audio_hal_prop)
42 set_prop(system_app, bluetooth_prop)
43 set_prop(system_app, debug_prop)
44 set_prop(system_app, system_prop)
45 set_prop(system_app, exported_bluetooth_prop)
46 set_prop(system_app, exported_system_prop)
47 set_prop(system_app, exported2_system_prop)
48 set_prop(system_app, exported3_system_prop)
49 set_prop(system_app, logd_prop)
50 set_prop(system_app, net_radio_prop)
51 set_prop(system_app, usb_control_prop)
52 set_prop(system_app, usb_prop)
53 set_prop(system_app, log_tag_prop)
54 userdebug_or_eng(`set_prop(system_app, logpersistd_logging_prop)')
55 auditallow system_app net_radio_prop:property_service set;
56 auditallow system_app usb_control_prop:property_service set;
57 auditallow system_app usb_prop:property_service set;
59 set_prop(system_app, dynamic_system_prop)
62 set_prop(system_app, ctl_default_prop)
63 set_prop(system_app, ctl_bugreport_prop)
66 get_prop(system_app, gsid_prop)
69 allow system_app anr_data_file:dir ra_dir_perms;
70 allow system_app anr_data_file:file create_file_perms;
73 allow system_app asec_apk_file:file r_file_perms;
75 # Allow system_app (adb data loader) to write data to /data/incremental
76 allow system_app apk_data_file:file write;
79 allow system_app incremental_control_file:file r_file_perms;
82 binder_call(system_app, statsd)
85 binder_call(system_app, incidentd)
88 hal_client_domain(system_app, hal_dumpstate)
90 allow system_app servicemanager:service_manager list;
92 allow system_app {
107 # suppress denials for services system_app should not be accessing.
108 dontaudit system_app {
119 allow system_app keystore:keystore_key {
140 allow system_app {
145 allow system_app cgroup:file w_file_perms;
147 control_logd(system_app)
148 read_runtime_log_tags(system_app)
149 get_prop(system_app, device_logging_prop)
153 allow system_app system_server:udp_socket {
157 get_prop(system_app, oem_unlock_prop)
163 # app domains which access /dev/fuse should not run as system_app
164 neverallow system_app fuse_device:chr_file *;
170 neverallow system_app shell_data_file:dir { no_w_dir_perms open search read };
171 neverallow system_app shell_data_file:file { open read ioctl lock };