mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-25 22:17:58 +00:00
c106dbd095
# Description Since the binary split additional syscalls are getting blocked in relation to the workers. With the hardened systemd file it shows the following warning: ``` Cannot fully enable landlock, a Linux kernel security feature. Running validation of malicious PVF code has a higher risk of compromising this machine. Consider upgrading the kernel version for maximum security. status=Ok(NotEnforced) abi=1 ``` For it to work we need to allow additionally: - mount - umount2 - pivot_root and set `RestrictNamespaces=false` Added new line `SystemCallFilter=pivot_root` because otherwise it would get blocked by ~\@\privileged Co-authored-by: s0me0ne-unkn0wn <48632512+s0me0ne-unkn0wn@users.noreply.github.com> Co-authored-by: Bastian Köcher <git@kchr.de>
39 lines
966 B
Desktop File
39 lines
966 B
Desktop File
[Unit]
|
|
Description=Polkadot Node
|
|
After=network.target
|
|
Documentation=https://github.com/paritytech/polkadot
|
|
|
|
[Service]
|
|
EnvironmentFile=-/etc/default/polkadot
|
|
ExecStart=/usr/bin/polkadot $POLKADOT_CLI_ARGS
|
|
User=polkadot
|
|
Group=polkadot
|
|
Restart=always
|
|
RestartSec=120
|
|
CapabilityBoundingSet=
|
|
LockPersonality=true
|
|
NoNewPrivileges=true
|
|
PrivateDevices=true
|
|
PrivateMounts=true
|
|
PrivateTmp=true
|
|
PrivateUsers=true
|
|
ProtectClock=true
|
|
ProtectControlGroups=true
|
|
ProtectHostname=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
ProtectSystem=strict
|
|
RemoveIPC=true
|
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
|
|
RestrictNamespaces=false
|
|
RestrictSUIDSGID=true
|
|
SystemCallArchitectures=native
|
|
SystemCallFilter=@system-service
|
|
SystemCallFilter=landlock_add_rule landlock_create_ruleset landlock_restrict_self seccomp mount umount2
|
|
SystemCallFilter=~@clock @module @reboot @swap @privileged
|
|
SystemCallFilter=pivot_root
|
|
UMask=0027
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|