mirror_lxc/config/apparmor
Stoiko Ivanov 3646e8acef apparmor: Allow ro remount of boot_id
The rule added in 863845075d did not cover all
necessary mount calls for /proc/sys/kernel/random/boot_id
(in src/lxc/conf.c: lxc_setup_boot_id) - the ro remount is missing.

Signed-off-by: Stoiko Ivanov <s.ivanov@proxmox.com>
2020-07-22 14:13:39 +02:00
..
abstractions apparmor: Allow ro remount of boot_id 2020-07-22 14:13:39 +02:00
profiles apparmor: update current profiles 2018-07-25 12:13:17 +02:00
container-rules apparmor: allow writes to sem* and msg* sysctls 2014-04-29 16:45:16 -05:00
container-rules.base apparmor: allow writes to sem* and msg* sysctls 2014-04-29 16:45:16 -05:00
lxc-containers apparmor: Add profiles 2014-01-16 17:49:23 -05:00
lxc-generate-aa-rules.py apparmor: catch config file opening error 2019-02-12 23:09:04 +01:00
Makefile.am apparmor: account for specified rootfs path (closes #2617) 2018-09-20 15:56:05 -07:00
README apparmor: auto-generate the blacklist rules 2014-04-01 13:49:43 -04:00
usr.bin.lxc-start apparmor: Add profiles 2014-01-16 17:49:23 -05:00

The abstractions/container-base file is partially automatically
generated.  The two source files are container-rules.base and
abstractions/container-base.in.  If these file are updated,
then

1. Generate a new container-rules file using

./lxc-generate-aa-rules.py container-rules.base > container-rules

2. Concatenate container-base.in with container-rules using

cat abstractions/container-base.in container-rules > abstractions/container-base