X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd-nspawn.xml;h=96ccc5cef7f2e85866b0277d1bdfeba27bfc04fe;hp=c95a7c0e9a5148600a1adf3e0a2340190b142a42;hb=82adf6af7c72b852449346835f33184a841b4796;hpb=0d3f7bb3a5bc6d5c0712f88a080fed388981bca3
diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml
index c95a7c0e9..96ccc5cef 100644
--- a/man/systemd-nspawn.xml
+++ b/man/systemd-nspawn.xml
@@ -249,23 +249,23 @@
-
-
+
+
- Sets the mandatory
- access control (MAC/SELinux) file
- label to be used by virtual API file
- systems in the container.
+ Sets the SELinux
+ security context to be used to label
+ processes in the container.
-
-
+
+
- Sets the mandatory
- access control (MAC/SELinux) label to be used by
- processes in the container.
+ Sets the SELinux security
+ context to be used to label files in
+ the virtual API file systems in the
+ container.
@@ -495,7 +495,7 @@
# chcon system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -R /srv/container
# systemd-nspawn -L system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -Z system_u:system_r:svirt_lxc_net_t:s0:c0,c1 -D /srv/container /bin/sh
- This runs a container with SELinux sandbox labels.
+ This runs a container with SELinux sandbox security contexts.