]> git.ipfire.org Git - thirdparty/lxc.git/commitdiff
document the new lxc.aa_allow_incomplete flag
authorSerge Hallyn <serge.hallyn@ubuntu.com>
Mon, 22 Sep 2014 14:18:07 +0000 (14:18 +0000)
committerStéphane Graber <stgraber@ubuntu.com>
Mon, 22 Sep 2014 21:29:30 +0000 (17:29 -0400)
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
doc/lxc.container.conf.sgml.in

index 8dbab5f013c1b28ddb58c3d9ee8becde0283eefb..49fe493cd4a0e2e678d5b2568849480f35df1766 100644 (file)
@@ -1041,6 +1041,27 @@ proc proc proc nodev,noexec,nosuid 0 0
              <programlisting>lxc.aa_profile = unconfined</programlisting>
          </listitem>
        </varlistentry>
+       <varlistentry>
+         <term>
+           <option>lxc.aa_allow_incomplete</option>
+         </term>
+         <listitem>
+           <para>
+             Apparmor profiles are pathname based.  Therefore many file
+             restrictions require mount restrictions to be effective against
+             a determined attacker.  However, these mount restrictions are not
+             yet implemented in the upstream kernel.  Without the mount
+             restrictions, the apparmor profiles still protect against accidental
+             damager.
+           </para>
+           <para>
+             If this flag is 0 (default), then the container will not be
+             started if the kernel lacks the apparmor mount features, so that a
+             regression after a kernel upgrade will be detected.  To start the
+             container under partial apparmor protection, set this flag to 1.
+           </para>
+         </listitem>
+       </varlistentry>
       </variablelist>
     </refsect2>