diff options
author | Lennart Poettering <lennart@poettering.net> | 2023-04-20 19:07:33 +0200 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2024-04-06 16:08:24 +0200 |
commit | 8aee931e7ae1adb01eeac0e1e4c0aef6ed3969ec (patch) | |
tree | 8cbb0fc640eaf1351df84c61f384d19880031e07 /man/rules | |
parent | build-sys: pick up vmlinux.h from running kernel BTF or user (diff) | |
download | systemd-8aee931e7ae1adb01eeac0e1e4c0aef6ed3969ec.tar.xz systemd-8aee931e7ae1adb01eeac0e1e4c0aef6ed3969ec.zip |
nsresourced: add new daemon for granting clients user namespaces and assigning resources to them
This adds a small, socket-activated Varlink daemon that can delegate UID
ranges for user namespaces to clients asking for it.
The primary call is AllocateUserRange() where the user passes in an
uninitialized userns fd, which is then set up.
There are other calls that allow assigning a mount fd to a userns
allocated that way, to set up permissions for a cgroup subtree, and to
allocate a veth for such a user namespace.
Since the UID assignments are supposed to be transitive, i.e. not
permanent, care is taken to ensure that users cannot create inodes owned
by these UIDs, so that persistancy cannot be acquired. This is
implemented via a BPF-LSM module that ensures that any member of a
userns allocated that way cannot create files unless the mount it
operates on is owned by the userns itself, or is explicitly
allowelisted.
BPF LSM program with contributions from Alexei Starovoitov.
Diffstat (limited to 'man/rules')
-rw-r--r-- | man/rules/meson.build | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/man/rules/meson.build b/man/rules/meson.build index 1ca5b105b3..e6c0ac9b52 100644 --- a/man/rules/meson.build +++ b/man/rules/meson.build @@ -1007,6 +1007,10 @@ manpages = [ ['systemd-networkd.service', '8', ['systemd-networkd'], 'ENABLE_NETWORKD'], ['systemd-notify', '1', [], ''], ['systemd-nspawn', '1', [], ''], + ['systemd-nsresourced.service', + '8', + ['systemd-nsresourced'], + 'ENABLE_NSRESOURCED'], ['systemd-oomd.service', '8', ['systemd-oomd'], 'ENABLE_OOMD'], ['systemd-path', '1', [], ''], ['systemd-pcrlock', |