I know we discussed this a few months ago, but I can not seem to find the emails. With current container runtime policy, we are adding type-bounds checks for containers, so that docker --no-new-privs will work with SELInux. The problem we are now seeing is I have docker running as container_runtime_t and it is executing the container as container_t. typebounds container_runtime_t container_t; But sometimes a user executes a command like docker run --entrypoint="/wait-for-it.sh" -v /usr/local/wait-for-it.sh:/wait-for-it.sh:ro fedora Where /usr/local/wait-for-it.sh is labeled as usr_t, or it could be bin_t. I seen an AVC that says type=AVC msg=audit(1486244245.275:7129): avc: denied { entrypoint } for pid=20532 comm="exe" path="/wait-for-it.sh" dev="dm-0" ino=50618329 scontext=system_u:system_r:container_t:s0:c116,c857 tcontext=unconfined_u:object_r:usr_t:s0 tclass=file permissive=0 Was caused by: Unknown - would be allowed by active policy Possible mismatch between this policy and the one under which the audit message was generated. Possible mismatch between current in-memory boolean settings vs. permanent ones. The reason this is being blocked is container_runtime_t is not allowed to be entered from usr_t. The typebounds call removes the entrypoint from container_t and the container fails. To fix this I would need to allow container_runtime_t to be entered by lots of new types. Since container_runtime_t is an unconfined domain by default I don't want to have to add all of these entrypoints. I also want to allow container_t to be transitioned to via unconfined_t, and again, I don't want these entrypoints added for unconfined_t. I feel that entrypoint should be ignored for typebounds just like target domains are. Since they cause you too loosen the policy of the parent domain. _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.