diff options
author | Lennart Poettering <lennart@poettering.net> | 2016-06-10 18:00:12 +0200 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2016-06-13 16:25:54 +0200 |
commit | 4e069746fe0de1f60bd1b75c113b0f40ffe86736 (patch) | |
tree | f0b1a36f742e516b0c674bff7a3e2db2adacc92d /units/systemd-machined.service.in | |
parent | core: improve seccomp syscall grouping a bit (diff) | |
download | systemd-4e069746fe0de1f60bd1b75c113b0f40ffe86736.tar.xz systemd-4e069746fe0de1f60bd1b75c113b0f40ffe86736.zip |
units: tighten system call filters a bit
Take away kernel keyring access, CPU emulation system calls and various debug
system calls from the various daemons we have.
Diffstat (limited to 'units/systemd-machined.service.in')
-rw-r--r-- | units/systemd-machined.service.in | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/units/systemd-machined.service.in b/units/systemd-machined.service.in index 82dca05338..cd4a097f5a 100644 --- a/units/systemd-machined.service.in +++ b/units/systemd-machined.service.in @@ -18,7 +18,7 @@ BusName=org.freedesktop.machine1 CapabilityBoundingSet=CAP_KILL CAP_SYS_PTRACE CAP_SYS_ADMIN CAP_SETGID CAP_SYS_CHROOT CAP_DAC_READ_SEARCH CAP_DAC_OVERRIDE CAP_CHOWN CAP_FOWNER CAP_FSETID CAP_MKNOD WatchdogSec=3min MemoryDenyWriteExecute=yes -SystemCallFilter=~@clock @module @mount @obsolete @raw-io ptrace +SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module @mount @obsolete @raw-io # Note that machined cannot be placed in a mount namespace, since it # needs access to the host's mount namespace in order to implement the |