diff options
author | Nick Kralevich <nnk@google.com> | 2014-05-27 16:51:11 -0700 |
---|---|---|
committer | Nick Kralevich <nnk@google.com> | 2014-05-27 16:51:11 -0700 |
commit | 1a6184baf3e01bf7786fb14de4216bcb4e3b2f70 (patch) | |
tree | 7e8c5eab60c6c7f2484be79ab1e63905576030df | |
parent | d917d64fafb2eca22c9c75a8527eb4e920a9f079 (diff) | |
download | system_core-1a6184baf3e01bf7786fb14de4216bcb4e3b2f70.zip system_core-1a6184baf3e01bf7786fb14de4216bcb4e3b2f70.tar.gz system_core-1a6184baf3e01bf7786fb14de4216bcb4e3b2f70.tar.bz2 |
Remove dmesg_restrict
dmesg_restrict is too coarse of a control. In Android's case,
we want to allow the shell user to see dmesg output, but disallow
others from seeing it.
Rather than rely on dmesg_restrict, use SELinux to control access
to dmesg instead. See corresponding change in external/sepolicy .
Bug: 10020939
Change-Id: I9d4bbbd41cb02b707cdfee79f826a39c1ec2f177
-rw-r--r-- | rootdir/init.rc | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/rootdir/init.rc b/rootdir/init.rc index ed756e0..2585353 100644 --- a/rootdir/init.rc +++ b/rootdir/init.rc @@ -98,7 +98,6 @@ loglevel 3 write /proc/sys/kernel/sched_child_runs_first 0 write /proc/sys/kernel/randomize_va_space 2 write /proc/sys/kernel/kptr_restrict 2 - write /proc/sys/kernel/dmesg_restrict 1 write /proc/sys/vm/mmap_min_addr 32768 write /proc/sys/net/ipv4/ping_group_range "0 2147483647" write /proc/sys/net/unix/max_dgram_qlen 300 |