android_kernel_google_msm/kernel/sched
Tom Marshall 75ec7fa33f kernel: Only expose su when daemon is running
Note: this is for the 3.4 kernel

It has been claimed that the PG implementation of 'su' has security
vulnerabilities even when disabled.  Unfortunately, the people that
find these vulnerabilities often like to keep them private so they
can profit from exploits while leaving users exposed to malicious
hackers.

In order to reduce the attack surface for vulnerabilites, it is
therefore necessary to make 'su' completely inaccessible when it
is not in use (except by the root and system users).

Change-Id: Ia7d50ba46c3d932c2b0ca5fc8e9ec69ec9045f85
2017-05-19 18:41:25 -06:00
..
auto_group.c
auto_group.h
clock.c
core.c kernel: Only expose su when daemon is running 2017-05-19 18:41:25 -06:00
cpupri.c
cpupri.h
debug.c
fair.c
features.h
idle_task.c
Makefile
rt.c sched: Remove redundant update_runtime notifier 2016-10-29 23:12:26 +08:00
sched.h sched: Remove redundant update_runtime notifier 2016-10-29 23:12:26 +08:00
sched_avg.c
stats.c
stats.h
stop_task.c sched: Fix migration thread runtime bogosity 2014-07-09 14:32:18 -07:00