diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 8dbab5f01..49fe493cd 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1041,6 +1041,27 @@ proc proc proc nodev,noexec,nosuid 0 0 lxc.aa_profile = unconfined + + + + + + + Apparmor profiles are pathname based. Therefore many file + restrictions require mount restrictions to be effective against + a determined attacker. However, these mount restrictions are not + yet implemented in the upstream kernel. Without the mount + restrictions, the apparmor profiles still protect against accidental + damager. + + + If this flag is 0 (default), then the container will not be + started if the kernel lacks the apparmor mount features, so that a + regression after a kernel upgrade will be detected. To start the + container under partial apparmor protection, set this flag to 1. + + +