On Thursday, February 25, 2016 01:02:49 PM Daniel J Walsh wrote: > audit2allow -wla > type=AVC msg=audit(1456422969.279:1434): avc: denied { entrypoint } > for pid=23847 comm="exe" path="/usr/bin/bash" dev="dm-2" ino=25165968 > scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c895 > tcontext=system_u:object_r:svirt_sandbox_file_t:s0:c337,c895 > tclass=file permissive=0 > Was caused by: > Unknown - would be allowed by active policy > Possible mismatch between this policy and the one under > which the audit message was generated. > > Possible mismatch between current in-memory boolean > settings vs. permanent ones. > > When trying to run a docker container on Rawhide, I am seeing this AVC. > The policy as audit2allow -w shows allows svirt_sandbox_file_t as an > entrypoint for svirt_lxc_net_t. > > # sesearch -A -s svirt_lxc_net_t -t svirt_sandbox_file_t -c file -p > entrypoint > Found 1 semantic av rules: > allow svirt_sandbox_domain file_type : file entrypoint ; > > But when I run try to start the container, docker blocks the access. I > don't see any constraints that would block this, and don't think > NO_NEW_PRIV is enabled any way, and I don't think it would be involved > here. If you are making it as far as file:entrypoint then NNP shouldn't be an issue, you've already passed that SELinux control point. Are you doing something new in Docker, or is the same code that worked on a previous kernel version? If so, which kernel do you know worked? -- paul moore security @ redhat _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.