aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2018-07-12 21:03:53 +0200
committerLennart Poettering <lennart@poettering.net>2018-07-17 21:41:23 +0200
commit9236cabf78ae69119729923d434e2d7d56f10f82 (patch)
tree303bce2c938fcde7577c911cbe1758a715e6f664 /man/systemd.exec.xml
parentresolvectl: Take empty string argument to clear lists in "dns", "domain" and ... (diff)
downloadsystemd-9236cabf78ae69119729923d434e2d7d56f10f82.tar.gz
systemd-9236cabf78ae69119729923d434e2d7d56f10f82.tar.bz2
systemd-9236cabf78ae69119729923d434e2d7d56f10f82.zip
man: elaborate a bit on the effect of PrivateNetwork=
Triggered by this thread: https://lists.freedesktop.org/archives/systemd-devel/2018-July/040992.html
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r--man/systemd.exec.xml10
1 files changed, 7 insertions, 3 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 23c9f5a45..ccf79b21d 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -1046,9 +1046,13 @@ BindReadOnlyPaths=/var/lib/systemd</programlisting>
Defaults to false. It is possible to run two or more units within the same private network namespace by using
the <varname>JoinsNamespaceOf=</varname> directive, see
<citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry> for
- details. Note that this option will disconnect all socket families from the host, this includes AF_NETLINK and
- AF_UNIX. The latter has the effect that AF_UNIX sockets in the abstract socket namespace will become
- unavailable to the processes (however, those located in the file system will continue to be accessible).</para>
+ details. Note that this option will disconnect all socket families from the host, including
+ <constant>AF_NETLINK</constant> and <constant>AF_UNIX</constant>. Effectively, for
+ <constant>AF_NETLINK</constant> this means that device configuration events received from
+ <citerefentry><refentrytitle>systemd-udevd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry> are
+ not delivered to the unit's processes. And for <constant>AF_UNIX</constant> this has the effect that
+ <constant>AF_UNIX</constant> sockets in the abstract socket namespace of the host will become unavailable to
+ the unit's processes (however, those located in the file system will continue to be accessible).</para>
<para>Note that the implementation of this setting might be impossible (for example if network namespaces are
not available), and the unit should be written in a way that does not solely rely on this setting for