From 93c709b23108300d780011a41069ae4239ad1096 Mon Sep 17 00:00:00 2001 From: Serge Hallyn Date: Mon, 22 Sep 2014 14:18:07 +0000 Subject: [PATCH] document the new lxc.aa_allow_incomplete flag MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Signed-off-by: Serge Hallyn Acked-by: Stéphane Graber --- doc/lxc.container.conf.sgml.in | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 8dbab5f01..49fe493cd 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1041,6 +1041,27 @@ proc proc proc nodev,noexec,nosuid 0 0 lxc.aa_profile = unconfined + + + + + + + Apparmor profiles are pathname based. Therefore many file + restrictions require mount restrictions to be effective against + a determined attacker. However, these mount restrictions are not + yet implemented in the upstream kernel. Without the mount + restrictions, the apparmor profiles still protect against accidental + damager. + + + If this flag is 0 (default), then the container will not be + started if the kernel lacks the apparmor mount features, so that a + regression after a kernel upgrade will be detected. To start the + container under partial apparmor protection, set this flag to 1. + + + -- 2.47.2