To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms Bug: 5555668 Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b |
||
|---|---|---|
| .. | ||
| etc | ||
| Android.mk | ||
| init.rc | ||
| ueventd.rc | ||