summaryrefslogtreecommitdiffstats
path: root/man/systemd.exec.xml
diff options
context:
space:
mode:
authorMike Yuan <me@yhndnzj.com>2023-10-04 23:04:12 +0200
committerMike Yuan <me@yhndnzj.com>2023-10-04 23:31:05 +0200
commit723c3cd03ce38235df948147150054ce95cb41df (patch)
treed8ce1a291866a6c2514dfe6d855c7dca43087e7e /man/systemd.exec.xml
parentman/systemd.exec: suffix one more directory with / (diff)
downloadsystemd-723c3cd03ce38235df948147150054ce95cb41df.tar.xz
systemd-723c3cd03ce38235df948147150054ce95cb41df.zip
man/systemd.exec: document that API fs are required to setup namespacing
Closes #27997
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r--man/systemd.exec.xml9
1 files changed, 6 insertions, 3 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 54f1dc7e5c..1988d624cf 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -1659,12 +1659,15 @@ StateDirectory=aaa/bbb ccc</programlisting>
i.e. writable mounts appearing on the host will be writable in the unit's namespace too, even when propagated
below a path marked with <varname>ReadOnlyPaths=</varname>! Restricting access with these options hence does
not extend to submounts of a directory that are created later on. This means the lock-down offered by that
- setting is not complete, and does not offer full protection. </para>
+ setting is not complete, and does not offer full protection.</para>
<para>Note that the effect of these settings may be undone by privileged processes. In order to set up an
effective sandboxed environment for a unit it is thus recommended to combine these settings with either
- <varname>CapabilityBoundingSet=~CAP_SYS_ADMIN</varname> or
- <varname>SystemCallFilter=~@mount</varname>.</para>
+ <varname>CapabilityBoundingSet=~CAP_SYS_ADMIN</varname> or <varname>SystemCallFilter=~@mount</varname>.</para>
+
+ <para>Please be extra careful when applying these options to API file systems (a list of them could be
+ found in <varname>MountAPIVPS=</varname>), since they may be required for basic system functionalities.
+ Moreover, <filename>/run/</filename> needs to be writable for setting up mount namespace and propagation.</para>
<para>Simple allow-list example using these directives:
<programlisting>[Service]