platform_system_sepolicy/prebuilts/api
Mohammad Samiul Islam d2ffd35cc0 Create a separate label for sandbox root directory
Currently, app process can freely execute path at
`/data/misc_ce/0/sdksandbox/<package-name>` since it's labeled as system
file. They can't read or write, but use 403/404
error to figure out if an app is installed or not.

By changing the selinux label of the parent directory:
`/data/misc_ce/0/sdksandbox`, we can restrict app process from executing
inside the directory and avoid the privacy leak.

Sandbox process should only have "search" permission on the new label so
that it can pass through it to its data directory located in
`/data/misc_ce/0/sdksandbox/<package-name>/<per-sdk-dir>`.

Bug: 214241165
Test: atest SdkSandboxStorageHostTest
Test: `adb shell cd /data/misc_ce/0/sdksandbox` gives error
Test: manual test to verify webview still works
Change-Id: Id8771b322d4eb5532eaf719f203ca94035e2a8ed
Merged-In: Id8771b322d4eb5532eaf719f203ca94035e2a8ed
2022-05-19 16:01:15 +01:00
..
28.0 Remove compat test from treble sepolicy tests 2022-02-16 04:09:29 +00:00
29.0 Merge "Remove compat test from treble sepolicy tests" am: 8e6b55a13d 2022-02-17 01:46:44 +00:00
30.0 Merge "Remove compat test from treble sepolicy tests" am: 8e6b55a13d 2022-02-17 01:46:44 +00:00
31.0 Merge "Remove compat test from treble sepolicy tests" am: 8e6b55a13d 2022-02-17 01:46:44 +00:00
32.0 Remove compat test from treble sepolicy tests 2022-02-16 04:09:29 +00:00
33.0 Create a separate label for sandbox root directory 2022-05-19 16:01:15 +01:00