mirror of
https://github.com/systemd/systemd.git
synced 2025-01-23 02:04:32 +03:00
CONTAINER_INTERFACE: clarify that /proc/sys can be writable with namespacing
When user and network namespaces are enabled, the kernel makes the global keys read-only, and makes the namespaced ones available for the guest already.
This commit is contained in:
parent
7e7e31521a
commit
cc970310a4
@ -22,10 +22,12 @@ manager, please consider supporting the following interfaces.
|
||||
(that file overrides whatever is pre-initialized by the container manager).
|
||||
|
||||
2. Make sure to pre-mount `/proc/`, `/sys/`, and `/sys/fs/selinux/` before
|
||||
invoking systemd, and mount `/proc/sys/`, `/sys/`, and `/sys/fs/selinux/`
|
||||
read-only in order to prevent the container from altering the host kernel's
|
||||
configuration settings. (As a special exception, if your container has
|
||||
network namespaces enabled, feel free to make `/proc/sys/net/` writable).
|
||||
invoking systemd, and mount `/sys/`, `/sys/fs/selinux/` and `/proc/sys/`
|
||||
read-only (the latter via e.g. a read-only bind mount on itself) in order
|
||||
to prevent the container from altering the host kernel's configuration
|
||||
settings. (As a special exception, if your container has network namespaces
|
||||
enabled, feel free to make `/proc/sys/net/` writable. If it also has user, ipc,
|
||||
uts and pid namespaces enabled, the entire `/proc/sys` can be left writable).
|
||||
systemd and various other subsystems (such as the SELinux userspace) have
|
||||
been modified to behave accordingly when these file systems are read-only.
|
||||
(It's OK to mount `/sys/` as `tmpfs` btw, and only mount a subset of its
|
||||
|
Loading…
x
Reference in New Issue
Block a user