From 6f64315ba7c02481f483d7e236f0f35cbd0e97da Mon Sep 17 00:00:00 2001 From: Ngai-Mint Kwan <28817515-nmkwan@users.noreply.gitlab.com> Date: Tue, 1 Jul 2025 16:55:23 +0000 Subject: [PATCH] docs: fix typo in qemu-passthrough-security Signed-off-by: Ngai-Mint Kwan --- docs/kbase/qemu-passthrough-security.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/kbase/qemu-passthrough-security.rst b/docs/kbase/qemu-passthrough-security.rst index ae395de4a1..9e13abb8af 100644 --- a/docs/kbase/qemu-passthrough-security.rst +++ b/docs/kbase/qemu-passthrough-security.rst @@ -139,7 +139,7 @@ As a last resort it is possible to disable security protection host wide which will affect all virtual machines. These settings are all made in ``/etc/libvirt/qemu.conf`` -* SELinux - set ``security_default_confied = 0`` to make QEMU run unconfined by +* SELinux - set ``security_default_confined = 0`` to make QEMU run unconfined by default, while still allowing explicit opt-in to SELinux for VMs. * DAC - set ``user = root`` and ``group = root`` to make QEMU run as the root -- 2.47.3