android_kernel_google_msm/kernel/sched
Tom Marshall 75ec7fa33f kernel: Only expose su when daemon is running
Note: this is for the 3.4 kernel

It has been claimed that the PG implementation of 'su' has security
vulnerabilities even when disabled.  Unfortunately, the people that
find these vulnerabilities often like to keep them private so they
can profit from exploits while leaving users exposed to malicious
hackers.

In order to reduce the attack surface for vulnerabilites, it is
therefore necessary to make 'su' completely inaccessible when it
is not in use (except by the root and system users).

Change-Id: Ia7d50ba46c3d932c2b0ca5fc8e9ec69ec9045f85
2017-05-19 18:41:25 -06:00
..
auto_group.c sched: Clean up parameter passing of proc_sched_autogroup_set_nice() 2012-03-02 12:23:49 +01:00
auto_group.h
clock.c
core.c kernel: Only expose su when daemon is running 2017-05-19 18:41:25 -06:00
cpupri.c
cpupri.h
debug.c sched: Remove sched_switch 2012-01-27 13:28:53 +01:00
fair.c sched: provide per cpu-cgroup option to notify on migrations 2013-05-23 06:08:25 +00:00
features.h sched: Fix more load-balancing fallout 2012-04-26 12:54:52 +02:00
idle_task.c
Makefile sched_avg: add run queue averaging. 2013-03-15 17:13:29 -07:00
rt.c sched: Remove redundant update_runtime notifier 2016-10-29 23:12:26 +08:00
sched.h sched: Remove redundant update_runtime notifier 2016-10-29 23:12:26 +08:00
sched_avg.c sched_avg: add run queue averaging. 2013-03-15 17:13:29 -07:00
stats.c sched: Remove sched_switch 2012-01-27 13:28:53 +01:00
stats.h
stop_task.c sched: Fix migration thread runtime bogosity 2014-07-09 14:32:18 -07:00