From 525872bfab49ce44390a29f322816ae951a4bc38 Mon Sep 17 00:00:00 2001 From: Lennart Poettering Date: Tue, 21 Feb 2017 17:48:59 +0100 Subject: [PATCH] man: document that ProtectKernelTunables= and ProtectControlGroups= implies MountAPIVFS= See: #5384 --- man/systemd.exec.xml | 25 ++++++++++++++----------- 1 file changed, 14 insertions(+), 11 deletions(-) diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index edeced5..5d4986b 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -1151,16 +1151,18 @@ /proc/sys, /sys, /proc/sysrq-trigger, /proc/latency_stats, /proc/acpi, /proc/timer_stats, /proc/fs and /proc/irq will - be made read-only to all processes of the unit. Usually, tunable kernel variables should only be written at - boot-time, with the sysctl.d5 - mechanism. Almost no services need to write to these at runtime; it is hence recommended to turn this on for - most services. For this setting the same restrictions regarding mount propagation and privileges apply as for - ReadOnlyPaths= and related calls, see above. Defaults to off. - If turned on and if running in user mode, or in system mode, but without the CAP_SYS_ADMIN - capability (e.g. setting User=), NoNewPrivileges=yes - is implied. Note that this option does not prevent kernel tuning through IPC interfaces - and external programs. However InaccessiblePaths= can be used to - make some IPC file system objects inaccessible. + be made read-only to all processes of the unit. Usually, tunable kernel variables should be initialized only at + boot-time, for example with the + sysctl.d5 mechanism. Few + services need to write to these at runtime; it is hence recommended to turn this on for most services. For this + setting the same restrictions regarding mount propagation and privileges apply as for + ReadOnlyPaths= and related calls, see above. Defaults to off. If turned on and if running + in user mode, or in system mode, but without the CAP_SYS_ADMIN capability (e.g. services + for which User= is set), NoNewPrivileges=yes is implied. Note that this + option does not prevent indirect changes to kernel tunables effected by IPC calls to other processes. However, + InaccessiblePaths= may be used to make relevant IPC file system objects inaccessible. If + ProtectKernelTunables= is set, MountAPIVFS=yes is + implied. @@ -1196,7 +1198,8 @@ unit. Except for container managers no services should require write access to the control groups hierarchies; it is hence recommended to turn this on for most services. For this setting the same restrictions regarding mount propagation and privileges apply as for ReadOnlyPaths= and related calls, see - above. Defaults to off. + above. Defaults to off. If ProtectControlGroups= is set, MountAPIVFS=yes is + implied. -- 2.7.4