4ce59d45a779cea662dbd56e61a98ba2a966b09b |
|
25-Feb-2017 |
Pavel Grafov <pgrafov@google.com> |
Request logs from logd with 3s overlap to avoid missing events. Example: If we got a batch with timestamps [1, 4, 8] and an event with timestamp 7 was delayed and was added to the buffer later, if we request the next batch starting from timestamp 8 or 9 that event will be lost. The last 3 seconds of events are kept and checked against the next batch. Test: afw-test-tradefed-ci run afw-do-security-logging Change-Id: I55727cfc6143c172edc7dabfd995776f9a0f7eab Bug: 35373582 Bug: 35026180 Bug: 35648675
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|
9cdba2722f86e101b82f9cbc61775ecffa8aac43 |
|
07-Mar-2017 |
Pavel Grafov <pgrafov@google.com> |
Retry SECURITY_LOGS_AVAILABLE if DO doesn't request the logs Test: manually, with TestDPC. Bug: 34186771 Change-Id: I99ec406b05f7b072c2c729f6336d1a5cf0f7c3d4
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|
d36dd15d9bf9f65270b9bee16d6419b96b18bd86 |
|
15-Dec-2016 |
Esteban Talavera <etalavera@google.com> |
Make device wide DO features available if all users affiliated Currently, those features are available on single user devices only (since they collect privacy sensitive data device wide). Now making them available as long as all users are affiliated. It'll take a certain amount of time between user creation and the DPC of that new user setting the appropriate affiliation ids. The DO won't be able to access the logs during that time (and won't get any "logs ready" callback). Once the affiliation ids are set, if they match, logs become available again - this includes logs collected while the user was being setup. Some logs might be lost though if the amount of data exceeds the internal limit. Test: runtest -c com.android.server.devicepolicy.DevicePolicyManagerTest frameworks-services Test: cts-tradefed run cts -a armeabi-v7a --module CtsDevicePolicyManagerTestCases --test com.android.cts.devicepolicy.DeviceOwnerTest Bug: 32326223 Change-Id: Idfe881dd6497d3ad2bead10addfd37b98b8a6e2b
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|
6235a94ffaed1d82cee2317481c18776f601da1b |
|
15-Mar-2016 |
Michal Karpinski <mkarpinski@google.com> |
Unifying method names and comments to security logging, not device logging Also move SecurityLog to android.app.admin package. Bug: 27531824 Bug: 27532560 Bug: 27532564 Bug: 27532425 Change-Id: I2677afdb5685bc5d21e52c41b381b57a41e364b6
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|
a0ea967d111b9f8e01ebbb1ac8d393270e1788b6 |
|
19-Feb-2016 |
Michal Karpinski <mkarpinski@google.com> |
Removing lock contention in SecurityLogMonitor After being interrupted the monitor thread tried to acquire a lock that is held by interrupting thread, resulting in timeouting on join(). Bug: 27061904 Change-Id: Ifbd578d5f5a266083b207fedd8ebb6d26ab08c31
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|
c3cd05f8a45ab789aae1cb553df86f94667d595a |
|
11-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Add DevicePolicyManager APIs for process logging. Add Device Owner APIs for controlling and retrieving the logs. Retrieving the logs should be rate limited unless we are at the risk of losing logs due to constrained buffer space. Bug: 22860162 Change-Id: I80658f5a14e86d7cfd42402fbc5e98dc11698c0e
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/SecurityLogMonitor.java
|