% minijail-config-file v0 # Used jailing parameters: # -e: enter new network namespace (for process that # doesn't need network access); # -i: minijail0 exits right after forking. # -l: new IPC namespace (isolates IPC resources). # -N: new cgroup namespace. # -n: set no new privileges (no_new_privs bit). # -p: Enter new pid namespace (implies -vr). # --profile=minimalistic-mountns: Enables mount and process namespace # which includes /var/empty, /, proc (RO), /dev/log, /tmp (tmpfs). # -u: change userid to . # -g: change gid to . # -G: inherit supplementary groups from new uid. # -c: cap_sys_nice=e (1 << 23). # --uts: enters new UTS namespace. It makes changes to the host/domain # name not affect the rest of the system. # -k: regular mount (source, target, filesystemtype, mountflags, data) # -b /run/dbus: mount /run/dbus to be able to communicate with D-bus. # -b /run/mmc/sockets: mount /run/mmc/sockets to be able to create sockets. e i l N n p uts u = mmc_service g = mmc_service G c = cap_sys_nice=e profile = minimalistic-mountns mount = tmpfs,/run,tmpfs,MS_NODEV|MS_NOSUID|MS_NOEXEC,mode=755,size=10M bind-mount = /run/dbus bind-mount = /run/mmc/sockets,/run/mmc/sockets,1