X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd-nspawn.xml;h=ca99da4909cac88b654779a86d0508945ec53f64;hb=8a96d94e4c33173d1426b7e0a6325405804ba224;hp=bec233c1ca9eb9c056df7dc72a385483b3de8a16;hpb=f4889f656b477887b02caa5e9d27387309c75a87;p=elogind.git diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index bec233c1c..ca99da490 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -248,6 +248,27 @@ + + + + + Sets the SELinux + security context to be used to label + processes in the container. + + + + + + + + Sets the SELinux security + context to be used to label files in + the virtual API file systems in the + container. + + + @@ -395,6 +416,39 @@ more than once. + + + + + Turns off any status + output by the tool itself. When this + switch is used, then the only output + by nspawn will be the console output + of the container OS + itself. + + + + + + Allows the container + to share certain system facilities + with the host. More specifically, this + turns off PID namespacing, UTS + namespacing and IPC namespacing, and + thus allows the guest to see and + interact more easily with processes + outside of the container. Note that + using this option makes it impossible + to start up a full Operating System in the + container, as an init system cannot + operate in this mode. It is only + useful to run specific programs or + applications this way, without + involving an init + system in the container. + + @@ -456,6 +510,14 @@ btrfs snapshot. + + Example 6 + + # chcon system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -R /srv/container +# systemd-nspawn -L system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -Z system_u:system_r:svirt_lxc_net_t:s0:c0,c1 -D /srv/container /bin/sh + + This runs a container with SELinux sandbox security contexts. + Exit status