summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
author Victor Hsieh <victorhsieh@google.com> 2020-06-17 11:04:49 -0700
committer Victor Hsieh <victorhsieh@google.com> 2020-06-18 12:21:28 -0700
commit02a58171a9d41ad0048d6a1a48d79dee585c22a5 (patch)
tree13e04b8dc27bdc34f3e49658154b376df780b90d
parent4add155920047750977340d2930bdf08fb9bef74 (diff)
Do not force to verify priv apps on boot
Originally, priv apps are forced to stay verified upon reboot. fs-verity helps to postpond to verification to access time and is done by kernel. In case if fs-verity is stripped, we fall back to classic signature verification, which is slow as it touches the whole apk. As we are just starting to roll out FSI, fs-verity is not served yet and we'll be on the slow path until it's done, which will take a while. For now, disable the force verification to priv apps. Test: build Bug: 154310064 Change-Id: Ibafdb79ba2e042286c9a635ec8d9159f0af6ef06
-rw-r--r--services/core/java/com/android/server/pm/PackageManagerServiceUtils.java4
1 files changed, 2 insertions, 2 deletions
diff --git a/services/core/java/com/android/server/pm/PackageManagerServiceUtils.java b/services/core/java/com/android/server/pm/PackageManagerServiceUtils.java
index 1fce07b0cbf1..03f4708c09c4 100644
--- a/services/core/java/com/android/server/pm/PackageManagerServiceUtils.java
+++ b/services/core/java/com/android/server/pm/PackageManagerServiceUtils.java
@@ -595,8 +595,8 @@ public class PackageManagerServiceUtils {
/** Returns true to force apk verification if the package is considered privileged. */
static boolean isApkVerificationForced(@Nullable PackageSetting ps) {
- return ps != null && ps.isPrivileged() && (
- isApkVerityEnabled() || isLegacyApkVerityEnabled());
+ // TODO(b/154310064): re-enable.
+ return false;
}
/**