- Jun 06, 2016
-
-
Jeff Vander Stoep authored
Grant permissions observed. Bug: 28760354 Change-Id: Ifdead51f873eb587556309c48fb84ff1542ae303
-
Narayan Kamath authored
Merge "Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927" into nyc-mr1-dev-plus-aosp am: 302251cd * commit '302251cd': Change-Id: Idcd722f34483aa71d00e939b2ac8594e20596299
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: a6f1e6c5 am: 9b0aeda0 * commit '9b0aeda0': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: I46b327a9effcb1bad1be498d2ed088df096f593a
-
Android Build Merger (Role) authored
Merge "Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927" into nyc-mr1-dev-plus-aosp
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: a6f1e6c5 * commit 'a6f1e6c5': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Id3742ffeb275db5a2dfe3136b515d26718e1116b
-
Narayan Kamath authored
Merge "sepolicy: broaden system_server access to foreign_dex_data_file." into nyc-dev am: ed413a82 am: 80fc2927 * commit '80fc2927': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Ib83dedaab25850dac45a296b809aa84be3d95562
-
Narayan Kamath authored
am: ed413a82 * commit 'ed413a82': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: If6ef21fdca0da453a6bbf2093c2704a3e72c9bcf
-
Narayan Kamath authored
am: ed413a82 * commit 'ed413a82': sepolicy: broaden system_server access to foreign_dex_data_file. Change-Id: Ibd428847a8292cdb47a03aadba133705f653447b
-
Narayan Kamath authored
-
- Jun 03, 2016
-
-
Jeff Vander Stoep authored
Merge "Merge "Allow shell to set log.tag.* properties" into nyc-dev am: a34afee0 am: 39423a91" into nyc-mr1-dev-plus-aosp am: 3936efc1 * commit '3936efc1': Change-Id: Iddf4994f8d8434637cd045c151c453409478b2e4
-
Jeff Vander Stoep authored
am: 434384db * commit '434384db': Allow shell to set log.tag.* properties Change-Id: I13e240a00517296ba7e335301648885808480cd0
-
Android Build Merger (Role) authored
Merge "Merge "Allow shell to set log.tag.* properties" into nyc-dev am: a34afee0 am: 39423a91" into nyc-mr1-dev-plus-aosp
-
Jeff Vander Stoep authored
am: dd579f9c * commit 'dd579f9c': Allow shell to set log.tag.* properties Change-Id: Ia91078ee69563148a778be66a3af7884b137d82b
-
Jeff Vander Stoep authored
am: 39423a91 * commit '39423a91': Allow shell to set log.tag.* properties Change-Id: I6a48cccb6584ef146904b0648fa6b79e30006408
-
Jeff Vander Stoep authored
am: a34afee0 * commit 'a34afee0': Allow shell to set log.tag.* properties Change-Id: Id898bf9b62dc87cf884021150d29eefb4f703042
-
Jeff Vander Stoep authored
am: a34afee0 * commit 'a34afee0': Allow shell to set log.tag.* properties Change-Id: Ic716c9b5b90883c2be5a7ec2a88aa0cfbb31ce5e
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Also allow shell to set persist.log.tag.* Bug: 28942894 Change-Id: Ifdb2c87871f159dd15338db372921297aea3bc6b
-
- Jun 02, 2016
-
-
Narayan Kamath authored
The system_server needs to rename these files when an app is upgraded. bug: 28998083 Change-Id: Idb0c1ae774228faaecc359e4e35603dbb534592a
-
Daniel Micay authored
Merge "expose control over unpriv perf access to shell am: 7005e25e am: c66f13af" into nyc-mr1-dev-plus-aosp am: 9daf92ca * commit '9daf92ca': Change-Id: Id7948e96d548e63c8b5c1bbd0ad5fe5abde81207
-
Daniel Micay authored
am: 56cdd2df * commit '56cdd2df': expose control over unpriv perf access to shell Change-Id: I7b145238ef1b3fbbf9c7427627856b24112fbe72
-
Android Build Merger (Role) authored
Merge "expose control over unpriv perf access to shell am: 7005e25e am: c66f13af" into nyc-mr1-dev-plus-aosp
-
Daniel Micay authored
am: c66f13af * commit 'c66f13af': expose control over unpriv perf access to shell Change-Id: I3654c8352ec79c7f4ad6d58adaf7798aed16af42
-
Daniel Micay authored
am: c1350181 * commit 'c1350181': expose control over unpriv perf access to shell Change-Id: Ic81044579ac69efc5c7aef3a34248c6bdfa917d5
-
Daniel Micay authored
am: 7005e25e * commit '7005e25e': expose control over unpriv perf access to shell Change-Id: Ic14de78aab253b9e59135adde8d6ece536434624
-
Daniel Micay authored
am: 7005e25e * commit '7005e25e': expose control over unpriv perf access to shell Change-Id: I2ea512b705a480da5c7818601c584f696c7ba3b7
-
Jeff Vander Stoep authored
am: bd5e74bb * commit 'bd5e74bb': expose control over unpriv perf access to shell Change-Id: I987bc536270fcab5530604bf4d4a0f74f528bc29
-
Daniel Micay authored
am: 1fcd8095 * commit '1fcd8095': expose control over unpriv perf access to shell Change-Id: I96514ce5be1df668e86d745084a2a025adfdae28
-
Jeff Vander Stoep authored
Change-Id: I35015c89b3b036816665deccc5e20cd2e90ca208
-
Daniel Micay authored
(Cherry picked from commit 38ac77e4) This allows the shell user to control whether unprivileged access to perf events is allowed. To enable unprivileged access to perf: adb shell setprop security.perf_harden 0 To disable it again: adb shell setprop security.perf_harden 1 This allows Android to disable this kernel attack surface by default, while still allowing profiling tools to work automatically. It can also be manually toggled, but most developers won't ever need to do that if tools end up incorporating this. Bug: 29054680 Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
-
- Jun 01, 2016
-
-
Daniel Micay authored
am: 38ac77e4 * commit '38ac77e4': expose control over unpriv perf access to shell Change-Id: I3fb4eb3edfcf68ce678e8cf1566a29e70d6cf1c3
-
David Sehr authored
am: 2d759f50 * commit '2d759f50': Change-Id: Id5733bace310d6615e5cf0eedca1aedf1990b805
-
David Sehr authored
am: c6138575 * commit 'c6138575': SELinux policy for /data/misc/profman Change-Id: If6d0fd15fdba2b880bedcde2c6194aa0feb559e2
-
David Sehr authored
am: 90b00895 * commit '90b00895': Change-Id: Icf7020f3af736ace01ab6e63c0a6be1a01397a07
-
David Sehr authored
am: b8097f05 * commit 'b8097f05': SELinux policy for /data/misc/profman Change-Id: Ic2060d7a1caeb8c25c99f1dd369e80decb154ab5
-
David Sehr authored
am: a5d07925 * commit 'a5d07925': SELinux policy for /data/misc/profman Change-Id: I1329afb3191abaa1b08ce9a706228a02a0c53a47
-
David Sehr authored
am: a5d07925 * commit 'a5d07925': SELinux policy for /data/misc/profman Change-Id: I323b969ba609518da59880e47d6e13686e1203e8
-
David Sehr authored
Bug: 28748264 Change-Id: I872c25666707beb737f3ce7a4f706c0135df7ad5
-
- May 31, 2016
-
-
Daniel Micay authored
This allows the shell user to control whether unprivileged access to perf events is allowed. To enable unprivileged access to perf: adb shell setprop security.perf_harden 0 To disable it again: adb shell setprop security.perf_harden 1 This allows Android to disable this kernel attack surface by default, while still allowing profiling tools to work automatically. It can also be manually toggled, but most developers won't ever need to do that if tools end up incorporating this. Bug: 29054680 Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
-
- May 27, 2016
-
-
Marco Nelissen authored
am: 178e7960 * commit '178e7960': Change-Id: I65d074fbb98350e7633593338e04ada32510dea9
-