Reverting CVE-2017-0630
Reason for revert - issue with asb
Bug: 72460579
Bug: 182189037
Test: sts-tradefed
Change-Id: I33e966ffb67ee0f567768a76fe48bb2a2e307bac
Merged-In: I33e966ffb67ee0f567768a76fe48bb2a2e307bac
diff --git a/hostsidetests/securitybulletin/src/android/security/cts/Poc17_05.java b/hostsidetests/securitybulletin/src/android/security/cts/Poc17_05.java
index 1ec6d89..797e58d 100644
--- a/hostsidetests/securitybulletin/src/android/security/cts/Poc17_05.java
+++ b/hostsidetests/securitybulletin/src/android/security/cts/Poc17_05.java
@@ -29,35 +29,6 @@
@RunWith(DeviceJUnit4ClassRunner.class)
public class Poc17_05 extends SecurityTestCase {
- /**
- * b/34277115
- */
- @Test
- @SecurityTest(minPatchLevel = "2017-05")
- public void testPocCVE_2017_0630() throws Exception {
- if (containsDriver(getDevice(), "/sys/kernel/debug/tracing/printk_formats")) {
- String printkFormats = AdbUtils.runCommandLine(
- "cat /sys/kernel/debug/tracing/printk_formats", getDevice());
- String[] pointerStrings = printkFormats.split("\n");
- assertNotKernelPointer(new Callable<String>() {
- int index;
- @Override
- public String call() {
- for (; index < pointerStrings.length; index++) {
- String line = pointerStrings[index];
- String pattern = "0x";
- int startIndex = line.indexOf(pattern);
- if (startIndex == -1) {
- continue;
- }
- return line.substring(startIndex + pattern.length());
- }
- return null;
- }
- }, null);
- }
- }
-
/*
* CVE-2016-5862
*/