Fix nested minijail0 execution
We've got an internal testcase that uses minijail0 inside an Android.mk rule. That was failing since we turned on the linux sandbox, as /proc was mounted read-only, which prevented setting up the uid/gid mappings for a child namespace. Fixes: 122985455 Test: treehugger & forrest of breaking build Change-Id: Ia77a91a7f4eeeb8a24e84075d8272287f5087587
This commit is contained in:
@@ -127,6 +127,9 @@ func (c *Cmd) wrapSandbox() {
|
||||
// in soong_ui
|
||||
"-e",
|
||||
|
||||
// Mount /proc read-write, necessary to run a nested nsjail or minijail0
|
||||
"--proc_rw",
|
||||
|
||||
// Use a consistent user & group.
|
||||
// Note that these are mapped back to the real UID/GID when
|
||||
// doing filesystem operations, so they're rather arbitrary.
|
||||
|
Reference in New Issue
Block a user