You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: config.md
+6-3Lines changed: 6 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -227,8 +227,11 @@ For Linux-based systems, the `process` object supports the following process-spe
227
227
Entries in the array contain the following properties:
228
228
* **`allowedAccess`** (array of strings, OPTIONAL) is an array of FS typed actions that are allowed by a rule.
229
229
* **`paths`** (array of strings, OPTIONAL) is an array of files or parent directories of the file hierarchies to restrict.
230
-
***`abi`** (object, OPTIONAL) the `abi` field defines the specific Landlock ABI version.
231
-
This should be used by the runtime to check if the kernel supports the specified sets of Landlock features and then enforce those following a best-effort security approach.
230
+
***`disableBestEffort`** (bool, OPTIONAL) the `disableBestEffort` field disables the best-effort security approach for Landlock access rights.
231
+
This is for conditions when the Landlock access rights explicitly configured by the container are not supported or available in the running kernel.
232
+
If the best-effort security approach is enabled (`false`), the runtime SHOULD enforce the strongest rules configured up to the current kernel support, and only be [logged as a warning](runtime.md#warnings) for those not supported.
233
+
If disabled (`true`), the runtime MUST [generate an error](runtime.md#errors) if one or more rules specified by the container is not supported.
234
+
Default is `false`, i.e., following a best-effort security approach.
232
235
233
236
### <aname="configUser" />User
234
237
@@ -323,7 +326,7 @@ _Note: symbolic name for uid and gid, such as uname and gname respectively, are
0 commit comments