X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd-nspawn.xml;h=96ccc5cef7f2e85866b0277d1bdfeba27bfc04fe;hp=c95a7c0e9a5148600a1adf3e0a2340190b142a42;hb=82adf6af7c72b852449346835f33184a841b4796;hpb=0d3f7bb3a5bc6d5c0712f88a080fed388981bca3 diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index c95a7c0e9..96ccc5cef 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -249,23 +249,23 @@ - - + + - Sets the mandatory - access control (MAC/SELinux) file - label to be used by virtual API file - systems in the container. + Sets the SELinux + security context to be used to label + processes in the container. - - + + - Sets the mandatory - access control (MAC/SELinux) label to be used by - processes in the container. + Sets the SELinux security + context to be used to label files in + the virtual API file systems in the + container. @@ -495,7 +495,7 @@ # chcon system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -R /srv/container # systemd-nspawn -L system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -Z system_u:system_r:svirt_lxc_net_t:s0:c0,c1 -D /srv/container /bin/sh - This runs a container with SELinux sandbox labels. + This runs a container with SELinux sandbox security contexts.