Lines Matching refs:to
21 # cgroup filesystem initialization prior to setting the cgroup root directory label.
28 # Initial setenforce by init prior to switching to init domain.
29 # We use dontaudit instead of allow to prevent a kernel spawned userspace
33 # Write to /proc/1/oom_adj prior to switching to init domain.
38 # As part of rebooting, init writes "u" to /proc/sysrq-trigger to
44 # Allow writing to /dev/__kmsg__ which was created prior to
48 # Set checkreqprot by init.rc prior to switching to init domain.
57 # Allow the kernel to read OBB files from app directories. (b/17428116)
68 # Access to /data/media.
69 # This should be removed if sdcardfs is modified to alter the secontext for its
70 # accesses to the underlying FS.
79 # initial_sid_contexts), but nothing ever transitions to it.
83 # ever execute a program outside the rootfs without changing to another domain.
87 # for the program and domain_auto_trans() to it.
88 # - You failed to setcon u:r:init:s0 in your init.rc and thus your init
89 # program was left in the kernel domain and is now trying to execute
91 # - You are running an exploit which switched to the init task credentials
92 # and is then trying to exec a shell or other program. You lose!