Posts

Showing posts with the label Adapting Operating System Requirements

Adapting Operating System Requirements

Image
Adapting Operating System Requirements Android Debug Bridge, commonly known as adb, is the central Android development tool, both for application and operating system development. adb remount command is used for remounting Android system partition from read-only to writable. This is very important for operating system development, since it enables modifying and updating only one library until the issue is resolved, instead of flashing the whole partition, which lasts significantly longer and slows down the development. When Android Nougat was brought up using UBIFS for the first time, it has been noticed that adb remount was not functional. Investigation determined that the origin of the issue came from a security update provided by Google [3]. The update fixed a security breach where files under read-only file system could have been altered by writing raw bytes to block devices. As a final result, hacker wouldbe obtaining Android root access, which provides the highest possible acces...

Adapting Operating System Requirements

Image
Adapting Operating System Requirements Android Debug Bridge, commonly known as adb, is the central Android development tool, both for application and operating system development. adb remount command is used for remounting Android system partition from read-only to writable. This is very important for operating system development, since it enables modifying and updating only one library until the issue is resolved, instead of flashing the whole partition, which lasts significantly longer and slows down the development. When Android Nougat was brought up using UBIFS for the first time, it has been noticed that adb remount was not functional. Investigation determined that the origin of the issue came from a security update provided by Google [3]. The update fixed a security breach where files under read-only file system could have been altered by writing raw bytes to block devices. As a final result, hacker wouldbe obtaining Android root access, which provides the highest possible acces...