github.com/containers/podman/v5@v5.1.0-rc1/docs/source/markdown/options/security-opt.md (about)

     1  ####> This option file is used in:
     2  ####>   podman create, pod clone, pod create, run
     3  ####> If file is edited, make sure the changes
     4  ####> are applicable to all of those.
     5  #### **--security-opt**=*option*
     6  
     7  Security Options
     8  
     9  - **apparmor=unconfined** : Turn off apparmor confinement for the <<container|pod>>
    10  - **apparmor**=_alternate-profile_ : Set the apparmor confinement profile for the <<container|pod>>
    11  
    12  - **label=user:**_USER_: Set the label user for the <<container|pod>> processes
    13  - **label=role:**_ROLE_: Set the label role for the <<container|pod>> processes
    14  - **label=type:**_TYPE_: Set the label process type for the <<container|pod>> processes
    15  - **label=level:**_LEVEL_: Set the label level for the <<container|pod>> processes
    16  - **label=filetype:**_TYPE_: Set the label file type for the <<container|pod>> files
    17  - **label=disable**: Turn off label separation for the <<container|pod>>
    18  
    19  Note: Labeling can be disabled for all <<|pods/>>containers by setting label=false in the **containers.conf** (`/etc/containers/containers.conf` or `$HOME/.config/containers/containers.conf`) file.
    20  
    21  - **label=nested**: Allows SELinux modifications within the container. Containers are allowed to modify SELinux labels on files and processes, as long as SELinux policy allows. Without **nested**, containers view SELinux as disabled, even when it is enabled on the host. Containers are prevented from setting any labels.
    22  
    23  - **mask**=_/path/1:/path/2_: The paths to mask separated by a colon. A masked path cannot be accessed inside the container<<s within the pod|>>.
    24  
    25  - **no-new-privileges**: Disable container processes from gaining additional privileges.
    26  
    27  - **seccomp=unconfined**: Turn off seccomp confinement for the <<container|pod>>.
    28  - **seccomp=profile.json**: JSON file to be used as a seccomp filter. Note that the `io.podman.annotations.seccomp` annotation is set with the specified value as shown in `podman inspect`.
    29  
    30  - **proc-opts**=_OPTIONS_ : Comma-separated list of options to use for the /proc mount. More details
    31    for the possible mount options are specified in the **proc(5)** man page.
    32  
    33  - **unmask**=_ALL_ or _/path/1:/path/2_, or shell expanded paths (/proc/*): Paths to unmask separated by a colon. If set to **ALL**, it unmasks all the paths that are masked or made read-only by default.
    34    The default masked paths are **/proc/acpi, /proc/kcore, /proc/keys, /proc/latency_stats, /proc/sched_debug, /proc/scsi, /proc/timer_list, /proc/timer_stats, /sys/firmware, and /sys/fs/selinux**, **/sys/devices/virtual/powercap**.  The default paths that are read-only are **/proc/asound**, **/proc/bus**, **/proc/fs**, **/proc/irq**, **/proc/sys**, **/proc/sysrq-trigger**, **/sys/fs/cgroup**.
    35  
    36  Note: Labeling can be disabled for all containers by setting **label=false** in the **containers.conf**(5) file.