Skip to content
Snippets Groups Projects
  1. Jun 03, 2016
  2. Jun 02, 2016
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · c66f13af
      Daniel Micay authored
      am: 7005e25e
      
      * commit '7005e25e':
        expose control over unpriv perf access to shell
      
      Change-Id: Ic14de78aab253b9e59135adde8d6ece536434624
      c66f13af
    • Jeff Vander Stoep's avatar
      resolve merge conflicts of bc0e1136 to nyc-dev-plus-aosp · 1fcd8095
      Jeff Vander Stoep authored
      Change-Id: I35015c89b3b036816665deccc5e20cd2e90ca208
      1fcd8095
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · 7005e25e
      Daniel Micay authored
      (Cherry picked from commit 38ac77e4)
      
      This allows the shell user to control whether unprivileged access to
      perf events is allowed.
      
      To enable unprivileged access to perf:
      
          adb shell setprop security.perf_harden 0
      
      To disable it again:
      
          adb shell setprop security.perf_harden 1
      
      This allows Android to disable this kernel attack surface by default,
      while still allowing profiling tools to work automatically. It can also
      be manually toggled, but most developers won't ever need to do that if
      tools end up incorporating this.
      
      Bug: 29054680
      
      Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
      7005e25e
  3. Jun 01, 2016
  4. May 31, 2016
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · 38ac77e4
      Daniel Micay authored
      This allows the shell user to control whether unprivileged access to
      perf events is allowed.
      
      To enable unprivileged access to perf:
      
          adb shell setprop security.perf_harden 0
      
      To disable it again:
      
          adb shell setprop security.perf_harden 1
      
      This allows Android to disable this kernel attack surface by default,
      while still allowing profiling tools to work automatically. It can also
      be manually toggled, but most developers won't ever need to do that if
      tools end up incorporating this.
      
      Bug: 29054680
      
      Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
      38ac77e4
  5. May 27, 2016
  6. May 26, 2016
  7. May 24, 2016
    • Fyodor Kupolov's avatar
      SELinux policies for /data/preloads directory · 72f0fbb2
      Fyodor Kupolov authored
      am: 49ac2a3d
      
      * commit '49ac2a3d':
        SELinux policies for /data/preloads directory
      
      Change-Id: Ib928cda316ef31f361ad09ef29b264eb9df754d5
      72f0fbb2
    • Fyodor Kupolov's avatar
      SELinux policies for /data/preloads directory · 49ac2a3d
      Fyodor Kupolov authored
      A new directory is created in user data partition that contains preloaded
      content such as a retail mode demo video and pre-loaded APKs.
      
      The new directory is writable/deletable by system server. It can only be
      readable (including directory list) by privileged or platform apps
      
      Bug: 28855287
      Change-Id: I3816cd3a1ed5b9a030965698a66265057214f037
      49ac2a3d
  8. May 17, 2016
  9. May 16, 2016
  10. May 14, 2016
  11. May 13, 2016
Loading