From: Lennart Poettering Date: Mon, 22 Apr 2024 09:48:20 +0000 (+0200) Subject: man: document that StateDirectory= trumps ProtectSystem=strict explicitly X-Git-Tag: v256-rc1~71^2~9 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=04366e06938c64ff1140a7b82c6cbfd898449c92;p=thirdparty%2Fsystemd.git man: document that StateDirectory= trumps ProtectSystem=strict explicitly Fixes: #29798 --- diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 7e49d8e267f..c11c7db706f 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -1396,14 +1396,16 @@ CapabilityBoundingSet=~CAP_B CAP_C mounted read-only, except for the API file system subtrees /dev/, /proc/ and /sys/ (protect these directories using PrivateDevices=, ProtectKernelTunables=, - ProtectControlGroups=). This setting ensures that any modification of the vendor-supplied - operating system (and optionally its configuration, and local mounts) is prohibited for the service. It is - recommended to enable this setting for all long-running services, unless they are involved with system updates - or need to modify the operating system in other ways. If this option is used, - ReadWritePaths= may be used to exclude specific directories from being made read-only. This - setting is implied if DynamicUser= is set. This setting cannot ensure protection in all - cases. In general it has the same limitations as ReadOnlyPaths=, see below. Defaults to - off. + ProtectControlGroups=). This setting ensures that any modification of the + vendor-supplied operating system (and optionally its configuration, and local mounts) is prohibited + for the service. It is recommended to enable this setting for all long-running services, unless they + are involved with system updates or need to modify the operating system in other ways. If this option + is used, ReadWritePaths= may be used to exclude specific directories from being + made read-only. Similar, StateDirectory=, LogsDirectory=, … and + related directory settings (see below) also exclude the specific directories from the effect of + ProtectSystem=. This setting is implied if DynamicUser= is + set. This setting cannot ensure protection in all cases. In general it has the same limitations as + ReadOnlyPaths=, see below. Defaults to off.