[lxc-devel] [PATCH] document the new lxc.aa_allow_incomplete flag
Serge Hallyn
serge.hallyn at ubuntu.com
Mon Sep 22 14:18:07 UTC 2014
Signed-off-by: Serge Hallyn <serge.hallyn at ubuntu.com>
---
doc/lxc.container.conf.sgml.in | 21 +++++++++++++++++++++
1 file changed, 21 insertions(+)
diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in
index 121f882..e418aaf 100644
--- a/doc/lxc.container.conf.sgml.in
+++ b/doc/lxc.container.conf.sgml.in
@@ -1055,6 +1055,27 @@ proc proc proc nodev,noexec,nosuid 0 0
<programlisting>lxc.aa_profile = unconfined</programlisting>
</listitem>
</varlistentry>
+ <varlistentry>
+ <term>
+ <option>lxc.aa_allow_incomplete</option>
+ </term>
+ <listitem>
+ <para>
+ Apparmor profiles are pathname based. Therefore many file
+ restrictions require mount restrictions to be effective against
+ a determined attacker. However, these mount restrictions are not
+ yet implemented in the upstream kernel. Without the mount
+ restrictions, the apparmor profiles still protect against accidental
+ damager.
+ </para>
+ <para>
+ If this flag is 0 (default), then the container will not be
+ started if the kernel lacks the apparmor mount features, so that a
+ regression after a kernel upgrade will be detected. To start the
+ container under partial apparmor protection, set this flag to 1.
+ </para>
+ </listitem>
+ </varlistentry>
</variablelist>
</refsect2>
--
2.1.0
More information about the lxc-devel
mailing list