From: Ngai-Mint Kwan <28817515-nmkwan@users.noreply.gitlab.com> Date: Tue, 1 Jul 2025 16:55:23 +0000 (+0000) Subject: docs: fix typo in qemu-passthrough-security X-Git-Tag: v11.6.0-rc1~141 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=6f64315ba7c02481f483d7e236f0f35cbd0e97da;p=thirdparty%2Flibvirt.git docs: fix typo in qemu-passthrough-security Signed-off-by: Ngai-Mint Kwan --- diff --git a/docs/kbase/qemu-passthrough-security.rst b/docs/kbase/qemu-passthrough-security.rst index ae395de4a1..9e13abb8af 100644 --- a/docs/kbase/qemu-passthrough-security.rst +++ b/docs/kbase/qemu-passthrough-security.rst @@ -139,7 +139,7 @@ As a last resort it is possible to disable security protection host wide which will affect all virtual machines. These settings are all made in ``/etc/libvirt/qemu.conf`` -* SELinux - set ``security_default_confied = 0`` to make QEMU run unconfined by +* SELinux - set ``security_default_confined = 0`` to make QEMU run unconfined by default, while still allowing explicit opt-in to SELinux for VMs. * DAC - set ``user = root`` and ``group = root`` to make QEMU run as the root