summaryrefslogtreecommitdiff
path: root/src/core/namespace.h
diff options
context:
space:
mode:
authorDjalal Harouni <tixxdz@opendz.org>2016-11-06 23:31:55 +0100
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2016-11-08 21:57:32 -0500
commitaf964954c6a44bd664efe89052ced9584a966baa (patch)
treee54b31af3547951962576bf0486765284cc6b489 /src/core/namespace.h
parentd85a0f802851e79efdb09acaa1ce517f7127ad28 (diff)
core: on DynamicUser= make sure that protecting sensitive paths is enforced (#4596)
This adds a variable that is always set to false to make sure that protect paths inside sandbox are always enforced and not ignored. The only case when it is set to true is on DynamicUser=no and RootDirectory=/chroot is set. This allows users to use more our sandbox features inside RootDirectory= The only exception is ProtectSystem=full|strict and when DynamicUser=yes is implied. Currently RootDirectory= is not fully compatible with these due to two reasons: * /chroot/usr|etc has to be present on ProtectSystem=full * /chroot// has to be a mount point on ProtectSystem=strict.
Diffstat (limited to 'src/core/namespace.h')
-rw-r--r--src/core/namespace.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/core/namespace.h b/src/core/namespace.h
index 6310638e9a..2c278fd457 100644
--- a/src/core/namespace.h
+++ b/src/core/namespace.h
@@ -44,6 +44,7 @@ typedef enum ProtectSystem {
} ProtectSystem;
struct NameSpaceInfo {
+ bool ignore_protect_paths:1;
bool private_dev:1;
bool protect_control_groups:1;
bool protect_kernel_tunables:1;