Description of problem: Selinux is preventing docker exec from working: May 29 14:57:32 node-3.rha audit[8250]: <audit-1400> avc: denied { read write } for pid=8250 comm="sh" path="/dev/pts/2" dev="devpts" ino=5 scontext=system_u:system_r:svirt_lxc_net_t:s0:c58,c493 tcontext=system_u:object_r:docker_devpts_t:s0 tclass=chr_file permissive=0 May 29 14:57:32 node-3.rha audit[8250]: <audit-1400> avc: denied { read write } for pid=8250 comm="sh" path="/dev/pts/2" dev="devpts" ino=5 scontext=system_u:system_r:svirt_lxc_net_t:s0:c58,c493 tcontext=system_u:object_r:docker_devpts_t:s0 tclass=chr_file permissive=0 May 29 14:57:32 node-3.rha audit[8250]: <audit-1400> avc: denied { read write } for pid=8250 comm="sh" path="/dev/pts/2" dev="devpts" ino=5 scontext=system_u:system_r:svirt_lxc_net_t:s0:c58,c493 tcontext=system_u:object_r:docker_devpts_t:s0 tclass=chr_file permissive=0 May 29 14:57:32 node-3.rha audit[8250]: <audit-1400> avc: denied { read write } for pid=8250 comm="sh" path="/dev/pts/2" dev="devpts" ino=5 scontext=system_u:system_r:svirt_lxc_net_t:s0:c58,c493 tcontext=system_u:object_r:docker_devpts_t:s0 tclass=chr_file permissive=0 Version-Release number of selected component (if applicable): [cloud-user@node-3 ~]$ rpm -q selinux-policy-targetted package selinux-policy-targetted is not installed [cloud-user@node-3 ~]$ rpm -q selinux-policy-targeted selinux-policy-targeted-3.13.1-126.fc22.noarch How reproducible: Every time Steps to Reproduce: 1. docker exec -ti my_container /bin/sh Actual results: Nothing displayed at all, not even an error message. Expected results: A shell. Additional info: Fedora Atomic 22 release.
What version of docker? This should be fixed in the latest docker-1.6.2 version of docker with the updated docker-selinux package.
This might be a duplicate of bug 1216265
*** This bug has been marked as a duplicate of bug 1216265 ***