]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
units: turn on ProtectKernelModules= for most long-running services
authorLennart Poettering <lennart@poettering.net>
Thu, 9 Feb 2017 10:09:50 +0000 (11:09 +0100)
committerLennart Poettering <lennart@poettering.net>
Thu, 9 Feb 2017 15:12:03 +0000 (16:12 +0100)
units/systemd-coredump@.service.in
units/systemd-hostnamed.service.in
units/systemd-journal-gatewayd.service.in
units/systemd-journal-remote.service.in
units/systemd-journal-upload.service.in
units/systemd-localed.service.in
units/systemd-networkd.service.m4.in
units/systemd-resolved.service.m4.in
units/systemd-timedated.service.in
units/systemd-timesyncd.service.in

index 760769191c298e261459cba29054bb3bb6c37639..f12b28d6a6ba0c8f38e60c3400d8dfbfa14e851f 100644 (file)
@@ -24,3 +24,4 @@ ProtectSystem=strict
 RuntimeMaxSec=5min
 SystemCallArchitectures=native
 ReadWritePaths=/var/lib/systemd/coredump
+ProtectKernelModules=yes
index 6904785e4519ab3d35c81f29b1cc85b5b1804a90..85410adc72bb671796968244ee737a74519290d8 100644 (file)
@@ -22,6 +22,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index ecc5b56c9c77ba62da5f1d247b0c1f44cab1383c..99099967e7384c493666b34edcdeedc85f11723c 100644 (file)
@@ -22,6 +22,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index 323e308871e17406983748f57b7a371e477253c2..5404bf1c035bb884e3ba60c52aea5d9f34dd604e 100644 (file)
@@ -22,6 +22,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index d7e0b290e9229b768a1ed5aa2629dc369092abb3..b9eab2154280b57c2b3b746fa1a95fd59f15e644 100644 (file)
@@ -22,6 +22,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index d6441d9f5fad88763376ceb48f9cb2739e83087d..a41e30bfdf55e200ab52fdb20e12a899c70442ee 100644 (file)
@@ -22,6 +22,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index 153ddeb3236d58bb70e7f1e962a61d91d9871077..d33deb97b6361b3b8dfd6b5d92202301b51c5733 100644 (file)
@@ -31,6 +31,7 @@ CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_N
 ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET
index dfd2f4ad0aaf81d6fb13303ee58ddc7765242dc9..08f0a85aea3c5ea27fbaeaa45921eb09a873913e 100644 (file)
@@ -31,6 +31,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6
index 336a23129083d29fea6bcce303176b867927c115..2881e122dc9e33171f78c37f7cf3f8999b2310d2 100644 (file)
@@ -20,6 +20,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes
index 41d41806c1fcb92aeaeabcbf234e0938b1a455f2..ab48a7aa30274b214e76cfa575eedaf908c4d1d9 100644 (file)
@@ -30,6 +30,7 @@ ProtectSystem=strict
 ProtectHome=yes
 ProtectControlGroups=yes
 ProtectKernelTunables=yes
+ProtectKernelModules=yes
 MemoryDenyWriteExecute=yes
 RestrictRealtime=yes
 RestrictNamespaces=yes