From 222ddc91a818cba50fe23c5166f7662d3da84622 Mon Sep 17 00:00:00 2001 From: Christian Brauner Date: Sat, 3 Sep 2016 08:00:20 +0200 Subject: [PATCH] doc: add lxc.no_new_privs to lxc.container.conf Signed-off-by: Christian Brauner --- doc/lxc.container.conf.sgml.in | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 1b740a57e..fcccd8ba9 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1310,6 +1310,34 @@ mknod errno 0 + + PR_SET_NO_NEW_PRIVS + + With PR_SET_NO_NEW_PRIVS active execve() promises not to grant + privileges to do anything that could not have been done without + the execve() call (for example, rendering the set-user-ID and + set-group-ID mode bits, and file capabilities non-functional). + Once set, this bit cannot be unset. The setting of this bit is + inherited by children created by fork() and clone(), and preserved + across execve(). + Note that PR_SET_NO_NEW_PRIVS is applied after the container has + changed into its intended AppArmor profile or SElinux context. + + + + + + + + + Specify whether the PR_SET_NO_NEW_PRIVS flag should be set for the + container. Set to 1 to activate. + + + + + + UID mappings -- 2.47.3