summaryrefslogtreecommitdiff
path: root/libs/input/PointerController.cpp
diff options
context:
space:
mode:
author Sanjana Sunil <sanjanasunil@google.com> 2022-04-06 15:35:26 +0000
committer Sanjana Sunil <sanjanasunil@google.com> 2022-09-06 11:23:31 +0000
commit70e4145b8c85f648456ab403b8ca796dab924481 (patch)
tree5e0853ac50cfcb7681d412c402ec6fada7bee4b5 /libs/input/PointerController.cpp
parent264350b0455c8db6ab78c3e8ddc15713d8ed16f3 (diff)
Isolate sdk sandbox data
Similar to app data isolation, sdk sandbox data isolation is done to prevent the sandbox from checking the existence of other apps via paths containing the app package name like: * Sandbox data paths such as /data/misc_ce/0/sdksandbox/<app-package-name> * Regular app data paths * JIT profile data paths and checking if EACCESS or ENOENT error comes up. This is done by mounting tmpfs on each of these data paths in a separate mount namespace and then bind mounting the required data for that process from the data mirror. For example, in the case of an sdk sandbox process, tmpfs is mounted on misc_ce, misc_de storage, app data paths and JIT profile paths. Then, a sandbox data path is created and data for that process is bind mounted from the mirror. In the case of app processes, access to sdk sandbox storage is restricted through selinux. Bug: 214241165 Test: atest SdkSandboxStorageHostTest Change-Id: I79fd5967b157c711cc75e340da7411f2b2f3bf00
Diffstat (limited to 'libs/input/PointerController.cpp')
0 files changed, 0 insertions, 0 deletions