1. 10 Jul, 2015 1 commit
  2. 07 Jul, 2015 2 commits
  3. 06 Jul, 2015 6 commits
  4. 30 Jun, 2015 2 commits
  5. 29 Jun, 2015 1 commit
  6. 27 Jun, 2015 1 commit
  7. 26 Jun, 2015 2 commits
    • Jeff Sharkey's avatar
      Remove unused methods to fix build. · 169944af
      Jeff Sharkey authored
      Change-Id: I6e1f85a7cc3428d558460737da3b3193d035b73e
      169944af
    • Jeff Sharkey's avatar
      Let's reinvent storage, yet again! · f38f29c8
      Jeff Sharkey authored
      Now that we're treating storage as a runtime permission, we need to
      grant read/write access without killing the app.  This is really
      tricky, since we had been using GIDs for access control, and they're
      set in stone once Zygote drops privileges.
      
      The only thing left that can change dynamically is the filesystem
      itself, so let's do that.  This means changing the FUSE daemon to
      present itself as three different views:
      
      /mnt/runtime_default/foo - view for apps with no access
      /mnt/runtime_read/foo - view for apps with read access
      /mnt/runtime_write/foo - view for apps with write access
      
      There is still a single location for all the backing files, and
      filesystem permissions are derived the same way for each view, but
      the file modes are masked off differently for each mountpoint.
      
      During Zygote fork, it wires up the appropriate storage access into
      an isolated mount namespace based on the current app permissions.  When
      the app is granted permissions dynamically at runtime, the system
      asks vold to jump into the existing mount namespace and bind mount
      the newly granted access model into place.
      
      Bug: 21858077
      Change-Id: I5a016f0958a92fd390c02b5ae159f8008bd4f4b7
      f38f29c8
  8. 25 Jun, 2015 8 commits
  9. 24 Jun, 2015 3 commits
  10. 23 Jun, 2015 3 commits
  11. 22 Jun, 2015 7 commits
  12. 19 Jun, 2015 1 commit
  13. 18 Jun, 2015 3 commits