On 03/08/2018 05:55 AM, Zvonko Kosic wrote:
> I've seen the presentation by James Morrison about  namespacing SELinux and I 
> have a question regarding a special case we have in our environment. 
> 
> We have third party prestart runtime hooks for docker which bind mount
> files from the host into the container image, which have the wrong label. 
> 
> To change the SELinux labels on the host is not an option because
> it breaks stuff on the host. 
> 
> Wil the SELinux namespacing work on files that are bind mounted?

I believe the answer is yes, since my patches support per-namespace in-core 
inode SIDs and James' additional patches support per-namespace on-disk xattrs 
(so the bind-mounted files can have two distinct labels, one of which will be 
presented to processes in the root/init namespace and the other to processes 
within the child namespace).  That said, this is all very much work in progress.


Reply via email to