From 26b8190841fa6e00a66a4a46b343bde117b855fc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= Date: Wed, 29 Apr 2020 18:22:46 +0200 Subject: [PATCH] man: mention that ProtectSystem= also takes care of /efi --- man/systemd.exec.xml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 3e2ae93bf0..4818f3423c 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -891,10 +891,11 @@ CapabilityBoundingSet=~CAP_B CAP_C ProtectSystem= Takes a boolean argument or the special values full or - strict. If true, mounts the /usr and /boot - directories read-only for processes invoked by this unit. If set to full, the - /etc directory is mounted read-only, too. If set to strict the entire - file system hierarchy is mounted read-only, except for the API file system subtrees /dev, + strict. If true, mounts the /usr and the boot loader + directories (/boot and /efi) read-only for processes + invoked by this unit. If set to full, the /etc directory is + mounted read-only, too. If set to strict the entire file system hierarchy is + mounted read-only, except for the API file system subtrees /dev, /proc and /sys (protect these directories using PrivateDevices=, ProtectKernelTunables=, ProtectControlGroups=). This setting ensures that any modification of the vendor-supplied