blob: 2d443c5f0be55775f7739fb4dda17818725ead08 [file] [log] [blame] [edit]
% minijail-config-file v0
# Make sure minijail0 exits right away and won't block upstart.
i
# Create a cgroup namespace.
N
# Create a UTS namespace to isolate changes to the host / domain name.
uts
# Create an IPC namespace (isolate System V IPC objects/POSIX message queues).
l
# Remount /proc read-only (prevents any messing with it).
r
# Creates new, empty tmp directory (technically, mounts tmpfs).
t
# Prevent that execve gains privileges, required for seccomp filters.
n
# Apply seccomp policy.
S = /usr/share/policy/system-proxy-seccomp.policy
# Use a minimalistic mount namespace.
profile = minimalistic-mountns
no-fs-restrictions
# Mount /run as tmpfs read-only.
mount = tmpfs,/run,tmpfs,MS_NOSUID|MS_NODEV|MS_NOEXEC
# Bind-mount /run/dbus read-only for D-Bus to work.
bind-mount = /run/dbus
# Bind-mount /sbin read-only to start sandboxed processes using minijail0.
bind-mount = /sbin
# Bind-mount /run/shill for DNS resolution.
# TODO(259354228): Remove once resolv.conf migration to dns-proxy is done.
bind-mount = /run/shill
# Bind-mount /run/dns-proxy for DNS resolution.
bind-mount = /run/dns-proxy
# Run as system-proxy user and group.
u = system-proxy
g = system-proxy
# Inherit system-proxy's supplementary groups, in particular
# 'password-viewers' to read the login password.
G
# Run with root permissions so that the daemon can start sandboxed processes.
c = cap_sys_admin=e
# -e is not specified because the service needs to connect to servers.