]> git.ipfire.org Git - thirdparty/lxc.git/commitdiff
doc: add lxc.no_new_privs to lxc.container.conf
authorChristian Brauner <christian.brauner@canonical.com>
Sat, 3 Sep 2016 06:00:20 +0000 (08:00 +0200)
committerChristian Brauner <christian.brauner@canonical.com>
Mon, 5 Sep 2016 20:56:24 +0000 (22:56 +0200)
Signed-off-by: Christian Brauner <christian.brauner@canonical.com>
doc/lxc.container.conf.sgml.in

index 1b740a57e20de4fade8c4547c3a298b306c081db..fcccd8ba995dfd04a11d52bd4e284e8ef400c3ed 100644 (file)
@@ -1310,6 +1310,34 @@ mknod errno 0
       </variablelist>
     </refsect2>
 
+    <refsect2>
+      <title>PR_SET_NO_NEW_PRIVS</title>
+      <para>
+              With PR_SET_NO_NEW_PRIVS active execve() promises not to grant
+              privileges to do anything that could not have been done without
+              the execve() call (for example, rendering the set-user-ID and
+              set-group-ID mode bits, and file capabilities non-functional).
+              Once set, this bit cannot be unset. The setting of this bit is
+              inherited by children created by fork() and clone(), and preserved
+              across execve().
+              Note that PR_SET_NO_NEW_PRIVS is applied after the container has
+              changed into its intended AppArmor profile or SElinux context.
+      </para>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>lxc.no_new_privs</option>
+          </term>
+          <listitem>
+            <para>
+              Specify whether the PR_SET_NO_NEW_PRIVS flag should be set for the
+              container. Set to 1 to activate.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+    </refsect2>
+
     <refsect2>
       <title>UID mappings</title>
       <para>