summaryrefslogtreecommitdiff
path: root/tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp
diff options
context:
space:
mode:
authorAlan Stokes <alanstokes@google.com>2018-12-19 09:31:21 +0000
committerAlan Stokes <alanstokes@google.com>2019-01-21 11:58:31 +0000
commite9d3314dc94d20539e45d952b31531e312bb86b3 (patch)
tree581f9445d4de2e1a6c58daafcbf89c4bc232a8ba /tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp
parent6fee8818700e435c5c4f8aa590259af4dd9e3eae (diff)
Add logging of dynamic loading of native code.
This uses the SELinux audit messages generated when an untrusted app, targeting SDK 28 or lower, executes native code from an app data directory. "Executes" here covers memory mapping a file with execute permission (including using dl_open) or calling execve. As with dynamic loading of DEX code we write a hash of the contents of the file executed to the event log. The existing unit and integration tests are extended to verify the new behaviour. Bug: 111338677 Test: atest -p services/core/java/com/android/server/pm/dex Change-Id: Ifbb3b338135db413be2cd83b1a8e7499d61d88dd
Diffstat (limited to 'tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp')
0 files changed, 0 insertions, 0 deletions