android_system_core/rootdir
Jeff Sharkey b9f438ff84 Protect runtime storage mount points.
We have a bunch of magic that mounts the correct view of storage
access based on the runtime permissions of an app, but we forgot to
protect the real underlying data sources; oops.

This series of changes just bumps the directory heirarchy one level
to give us /mnt/runtime which we can mask off as 0700 to prevent
people from jumping to the exposed internals.

Also add CTS tests to verify that we're protecting access to
internal mount points like this.

Bug: 22964288
Change-Id: I32068e63a3362b37e8ebca1418f900bb8537b498
2015-08-06 11:45:31 -07:00
..
etc Remove long-obsolete file. 2015-04-23 20:57:12 -07:00
Android.mk rootdir: make sure the /oem mountpoint is always available 2015-05-06 13:43:15 -07:00
init.environ.rc.in Progress towards dynamic storage support. 2015-03-30 19:48:38 -07:00
init.rc Protect runtime storage mount points. 2015-08-06 11:45:31 -07:00
init.trace.rc rootdir: init.trace.rc too early 2015-06-02 14:40:10 -07:00
init.usb.rc init.usb.rc: Change product id to for add only config 2014-09-05 12:33:46 -07:00
init.zygote32.rc Move zygote init config to its own file. 2014-03-31 12:31:11 +01:00
init.zygote32_64.rc Change app_process reference to app_process32. 2014-05-14 16:41:18 +01:00
init.zygote64.rc Move zygote init config to its own file. 2014-03-31 12:31:11 +01:00
init.zygote64_32.rc Add a zygote 64/32 bit config. 2014-05-21 11:20:42 +01:00
ueventd.rc rootdir: add permission for /dev/dvb* 2015-05-07 16:49:00 +09:00