Skip to content
Snippets Groups Projects
  1. Jun 06, 2016
  2. Jun 03, 2016
  3. Jun 02, 2016
  4. Jun 01, 2016
  5. May 31, 2016
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · 38ac77e4
      Daniel Micay authored
      This allows the shell user to control whether unprivileged access to
      perf events is allowed.
      
      To enable unprivileged access to perf:
      
          adb shell setprop security.perf_harden 0
      
      To disable it again:
      
          adb shell setprop security.perf_harden 1
      
      This allows Android to disable this kernel attack surface by default,
      while still allowing profiling tools to work automatically. It can also
      be manually toggled, but most developers won't ever need to do that if
      tools end up incorporating this.
      
      Bug: 29054680
      
      Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
      38ac77e4
  6. May 27, 2016
  7. May 26, 2016
  8. May 24, 2016
    • Fyodor Kupolov's avatar
      SELinux policies for /data/preloads directory · 72f0fbb2
      Fyodor Kupolov authored
      am: 49ac2a3d
      
      * commit '49ac2a3d':
        SELinux policies for /data/preloads directory
      
      Change-Id: Ib928cda316ef31f361ad09ef29b264eb9df754d5
      72f0fbb2
    • Fyodor Kupolov's avatar
      SELinux policies for /data/preloads directory · 49ac2a3d
      Fyodor Kupolov authored
      A new directory is created in user data partition that contains preloaded
      content such as a retail mode demo video and pre-loaded APKs.
      
      The new directory is writable/deletable by system server. It can only be
      readable (including directory list) by privileged or platform apps
      
      Bug: 28855287
      Change-Id: I3816cd3a1ed5b9a030965698a66265057214f037
      49ac2a3d
  9. May 17, 2016
  10. May 16, 2016
  11. May 14, 2016
  12. May 13, 2016
Loading