aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYu Watanabe <watanabe.yu+github@gmail.com>2018-02-27 16:59:03 +0900
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2018-02-27 08:59:03 +0100
commite568a92d994608d96719585362389be5e5d3d0e7 (patch)
treeded996c150d63abe85353d242b23166008568dc6 /man/systemd.exec.xml
parentMerge pull request #8285 from poettering/logind-close-fixes (diff)
downloadsystemd-e568a92d994608d96719585362389be5e5d3d0e7.tar.gz
systemd-e568a92d994608d96719585362389be5e5d3d0e7.tar.bz2
systemd-e568a92d994608d96719585362389be5e5d3d0e7.zip
man: suggests TemporaryFileSystem= when people want to nest bind mounts inside InaccessiblePaths= (#8288)
Suggested by @sourcejedi in #8242. Closes #7895, #7153, and #2780.
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r--man/systemd.exec.xml10
1 files changed, 7 insertions, 3 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index ba07d0feb..daae94e37 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -916,9 +916,13 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting>
reading only, writing will be refused even if the usual file access controls would permit this. Nest
<varname>ReadWritePaths=</varname> inside of <varname>ReadOnlyPaths=</varname> in order to provide writable
subdirectories within read-only directories. Use <varname>ReadWritePaths=</varname> in order to whitelist
- specific paths for write access if <varname>ProtectSystem=strict</varname> is used. Paths listed in
- <varname>InaccessiblePaths=</varname> will be made inaccessible for processes inside the namespace (along with
- everything below them in the file system hierarchy).</para>
+ specific paths for write access if <varname>ProtectSystem=strict</varname> is used.</para>
+
+ <para>Paths listed in <varname>InaccessiblePaths=</varname> will be made inaccessible for processes inside
+ the namespace along with everything below them in the file system hierarchy. This may be more restrictive than
+ desired, because it is not possible to nest <varname>ReadWritePaths=</varname>, <varname>ReadOnlyPaths=</varname>,
+ <varname>BindPaths=</varname>, or <varname>BindReadOnlyPaths=</varname> inside it. For a more flexible option,
+ see <varname>TemporaryFileSystem=</varname>.</para>
<para>Note that restricting access with these options does not extend to submounts of a directory that are
created later on. Non-directory paths may be specified as well. These options may be specified more than once,