systemd-nsresourced.service(8) — Linux manual page

NAME | SYNOPSIS | DESCRIPTION | SEE ALSO | NOTES | COLOPHON

SYSTEMD-....SERVICE(8) systemd-nsresourced.serviceSYSTEMD-....SERVICE(8)

NAME         top

       systemd-nsresourced.service, systemd-nsresourced - User Namespace
       Resource Delegation Service

SYNOPSIS         top

       systemd-nsresourced.service

       /usr/lib/systemd/systemd-nsresourced

DESCRIPTION         top

       systemd-nsresourced is a system service that permits transient
       delegation of a a UID/GID range to a user namespace (see
       user_namespaces(7)) allocated by a client, via a Varlink IPC API.

       Unprivileged clients may allocate a user namespace, and then
       request a UID/GID range to be assigned to it via this service.
       The user namespace may then be used to run containers and other
       sandboxes, and/or apply it to an id-mapped mount.

       Allocations of UIDs/GIDs this way are transient: when a user
       namespace goes away, its UID/GID range is returned to the pool of
       available ranges. In order to ensure that clients cannot gain
       persistency in their transient UID/GID range a BPF-LSM based
       policy is enforced that ensures that user namespaces set up this
       way can only write to file systems they allocate themselves or
       that are explicitly allowlisted via systemd-nsresourced.

       systemd-nsresourced automatically ensures that any registered UID
       ranges show up in the system's NSS database via the User/Group
       Record Lookup API via Varlink[1].

       Currently, only UID/GID ranges consisting of either exactly 1 or
       exactly 65536 UIDs/GIDs can be registered with this service.
       Moreover, UIDs and GIDs are always allocated together, and
       symmetrically.

       The service provides API calls to allowlist mounts (referenced
       via their mount file descriptors as per Linux fsmount() API), to
       pass ownership of a cgroup subtree to the user namespace and to
       delegate a virtual Ethernet device pair to the user namespace.
       When used in combination this is sufficient to implement fully
       unprivileged container environments, as implemented by
       systemd-nspawn(1), fully unprivileged RootImage= (see
       systemd.exec(5)) or fully unprivileged disk image tools such as
       systemd-dissect(1).

       This service provides one Varlink[2] service:
       io.systemd.NamespaceResource allows registering user namespaces,
       and assign mounts, cgroups and network interfaces to it.

SEE ALSO         top

       systemd(1), systemd-mountfsd.service(8), systemd-nspawn(1),
       systemd.exec(5), systemd-dissect(1), user_namespaces(7)

NOTES         top

        1. User/Group Record Lookup API via Varlink
           https://systemd.io/USER_GROUP_API

        2. Varlink
           https://varlink.org/

COLOPHON         top

       This page is part of the systemd (systemd system and service
       manager) project.  Information about the project can be found at
       ⟨http://www.freedesktop.org/wiki/Software/systemd⟩.  If you have
       a bug report for this manual page, see
       ⟨http://www.freedesktop.org/wiki/Software/systemd/#bugreports⟩.
       This page was obtained from the project's upstream Git repository
       ⟨https://github.com/systemd/systemd.git⟩ on 2024-06-14.  (At that
       time, the date of the most recent commit that was found in the
       repository was 2024-06-13.)  If you discover any rendering
       problems in this HTML version of the page, or you believe there
       is a better or more up-to-date source for the page, or you have
       corrections or improvements to the information in this COLOPHON
       (which is not part of the original manual page), send a mail to
       [email protected]

systemd 257~devel                                 SYSTEMD-....SERVICE(8)

Pages that refer to this page: systemd-nspawn(1)systemd.directives(7)systemd.index(7)systemd-mountfsd.service(8)