mirror of
https://github.com/systemd/systemd.git
synced 2024-12-22 17:35:35 +03:00
8aee931e7a
This adds a small, socket-activated Varlink daemon that can delegate UID ranges for user namespaces to clients asking for it. The primary call is AllocateUserRange() where the user passes in an uninitialized userns fd, which is then set up. There are other calls that allow assigning a mount fd to a userns allocated that way, to set up permissions for a cgroup subtree, and to allocate a veth for such a user namespace. Since the UID assignments are supposed to be transitive, i.e. not permanent, care is taken to ensure that users cannot create inodes owned by these UIDs, so that persistancy cannot be acquired. This is implemented via a BPF-LSM module that ensures that any member of a userns allocated that way cannot create files unless the mount it operates on is owned by the userns itself, or is explicitly allowelisted. BPF LSM program with contributions from Alexei Starovoitov.
24 lines
703 B
SYSTEMD
24 lines
703 B
SYSTEMD
# SPDX-License-Identifier: LGPL-2.1-or-later
|
|
#
|
|
# This file is part of systemd.
|
|
#
|
|
# systemd is free software; you can redistribute it and/or modify it
|
|
# under the terms of the GNU Lesser General Public License as published by
|
|
# the Free Software Foundation; either version 2.1 of the License, or
|
|
# (at your option) any later version.
|
|
|
|
[Unit]
|
|
Description=Namespace Resource Manager Socket
|
|
Documentation=man:systemd-nsresourced.service(8)
|
|
DefaultDependencies=no
|
|
Conflicts=shutdown.target
|
|
Before=sockets.target shutdown.target
|
|
|
|
[Socket]
|
|
ListenStream=/run/systemd/io.systemd.NamespaceResource
|
|
Symlinks=/run/systemd/userdb/io.systemd.NamespaceResource
|
|
SocketMode=0666
|
|
|
|
[Install]
|
|
WantedBy=sockets.target
|