Rename domain "system" to "system_server".

Now that the "system" domain is just about the system_server, it's
clearer if the domain is called "system_server".

This CL depends on the renaming in external/sepolicy performed in
https://android-review.googlesource.com/#/c/65502/

Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
diff --git a/BoardConfig.mk b/BoardConfig.mk
index b548a76..8cb4111 100644
--- a/BoardConfig.mk
+++ b/BoardConfig.mk
@@ -59,5 +59,6 @@
         sensors_config.te \
         shell.te \
         surfaceflinger.te \
-        system.te \
+        system_app.te \
+        system_server.te \
         zygote.te
diff --git a/sepolicy/compatibility.te b/sepolicy/compatibility.te
index 2f6c079..d99e696 100644
--- a/sepolicy/compatibility.te
+++ b/sepolicy/compatibility.te
@@ -77,12 +77,12 @@
 allow surfaceflinger nfc:binder call;
 allow surfaceflinger sysfs:file write;
 
-#============= system ==============
-allow system adbd_socket:sock_file write;
-allow system init:unix_stream_socket { read write };
-allow system proc:file write;
-allow system security_file:lnk_file read;
-allow system unlabeled:file { read getattr open };
+#============= system_server ==============
+allow system_server adbd_socket:sock_file write;
+allow system_server init:unix_stream_socket { read write };
+allow system_server proc:file write;
+allow system_server security_file:lnk_file read;
+allow system_server unlabeled:file { read getattr open };
 
 #============= system_app ==============
 allow system_app unlabeled:file { read getattr open };
diff --git a/sepolicy/system.te b/sepolicy/system.te
deleted file mode 100644
index c370b77..0000000
--- a/sepolicy/system.te
+++ /dev/null
@@ -1,5 +0,0 @@
-allow { system system_app }knv_device:chr_file rw_file_perms;
-allow system sysfs_devices_system_cpu:file w_file_perms;
-allow system sysfs_devices_system_cpu:dir r_dir_perms;
-allow system elan_ip_device:chr_file rw_file_perms;
-allow system diag_device:chr_file rw_file_perms;
diff --git a/sepolicy/system_app.te b/sepolicy/system_app.te
new file mode 100644
index 0000000..5d72dcb
--- /dev/null
+++ b/sepolicy/system_app.te
@@ -0,0 +1 @@
+allow system_app knv_device:chr_file rw_file_perms;
diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te
new file mode 100644
index 0000000..50564e4
--- /dev/null
+++ b/sepolicy/system_server.te
@@ -0,0 +1,5 @@
+allow system_server knv_device:chr_file rw_file_perms;
+allow system_server sysfs_devices_system_cpu:file w_file_perms;
+allow system_server sysfs_devices_system_cpu:dir r_dir_perms;
+allow system_server elan_ip_device:chr_file rw_file_perms;
+allow system_server diag_device:chr_file rw_file_perms;