[M96-LTS] authpolicyd: Use /mnt/empty for pivot_root.

/tmp is writable so can be affected by the rest of the system. The
recommendation is to use /mnt/empty for pivot_root.

This was added initially in
https://chromium-review.googlesource.com/c/chromiumos/platform2/+/1113917
which was not actually reviewed by the security team.

This should cause no functional changes since what's needed for
pivot_root is just an empty directory.

BUG=chromium:1330050
TEST=CQ

Change-Id: I0d82855132809ed57a1f0e827acda997193dadc6
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform2/+/3686275
Commit-Queue: Felipe Andrade <fsandrade@chromium.org>
Auto-Submit: Jorge Lucangeli Obes <jorgelo@chromium.org>
Tested-by: Jorge Lucangeli Obes <jorgelo@chromium.org>
Commit-Queue: Jorge Lucangeli Obes <jorgelo@chromium.org>
(cherry picked from commit 2bbb8829c458193eba66bec1ad0e26711112e98c)
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform2/+/3758083
Tested-by: Roger Felipe Zanoni da Silva <rzanoni@google.com>
Commit-Queue: Roger Felipe Zanoni da Silva <rzanoni@google.com>
Reviewed-by: Simon Hangl <simonha@google.com>
Owners-Override: Simon Hangl <simonha@google.com>
diff --git a/authpolicy/etc/init/authpolicyd.conf b/authpolicy/etc/init/authpolicyd.conf
index d1c1c05..731c0e7 100644
--- a/authpolicy/etc/init/authpolicyd.conf
+++ b/authpolicy/etc/init/authpolicyd.conf
@@ -63,7 +63,7 @@
   args="${args} -c 180"
 
   # Create a pivot_root at the target folder.
-  args="${args} -P /tmp/authpolicyd_chroot"
+  args="${args} -P /mnt/empty"
 
   # Make sure mounts are remounted as slave mounts, so that the user's
   # cryptohome can propagate into the jail. Note that