- 14 Oct, 2016 1 commit
-
-
gitbuildkicker authored
-
- 11 Jul, 2016 1 commit
-
-
gitbuildkicker authored
-
- 28 Jun, 2016 2 commits
-
-
Daniel Xie authored
-
Daniel Micay authored
(cherry picked from commit af45d3c9ddbae3e810ec269a0ef4f6ec1886888c) This allows the shell user to control whether unprivileged access to perf events is allowed. To enable unprivileged access to perf: adb shell setprop security.perf_harden 0 To disable it again: adb shell setprop security.perf_harden 1 This allows Android to disable this kernel attack surface by default, while still allowing profiling tools to work automatically. It can also be manually toggled, but most developers won't ever need to do that if tools end up incorporating this. Bug: 29054680 Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
-
- 03 May, 2016 1 commit
-
-
Johan Redestig authored
and as a consequence open up for other appdomains (e.g. platform_app) to write system properties. (cherrypicked from commit 0d8e9adf) Change-Id: Ie6ad4d17247165564456e5b0d78f705a82cdcde7
-
- 21 Oct, 2015 1 commit
-
-
Bill Yi authored
-
- 14 Oct, 2015 1 commit
-
-
Nick Kralevich authored
Bug: 24866874 Change-Id: Ic13ad4d3292fe8284e5771a28abaebb0ec9590f0
-
- 28 Aug, 2015 33 commits
-
-
Nick Kralevich authored
* commit '58aa4481':
-
Nick Kralevich authored
* commit 'ed21ab14':
-
Stephen Smalley authored
* commit 'f35d737d':
-
Nick Kralevich authored
* commit 'fd352211':
-
Nick Kralevich authored
* commit 'f992c4fa':
-
Nick Kralevich authored
* commit 'c9b882dc':
-
Stephen Smalley authored
* commit 'a669507e':
-
Nick Kralevich authored
* commit 'f83e617f':
-
Nick Kralevich authored
* commit 'aa03e496':
-
Nick Kralevich authored
* commit 'a045ca42':
-
Stephen Smalley authored
* commit 'b5dd69a1':
-
Nick Kralevich authored
* commit '4008b6c6':
-
Nick Kralevich authored
* commit '0edbecf2':
-
Nick Kralevich authored
* commit 'e2ba13b9':