runc/selinux
Dan Walsh 7f60c92d65 Do not check if SELinux is enabled on lowlevel calls to set processlabel
docker exec changes the mount namespace which fools selinux bindings
into thinking SELinux is disabled.  Bindings should just check if
a label is passed in and attempt to use it.  Docker will not call these
functions with a label if SELinux is disabled.

Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
2014-10-11 06:04:52 -04:00
..
selinux.go Do not check if SELinux is enabled on lowlevel calls to set processlabel 2014-10-11 06:04:52 -04:00
selinux_test.go Add linux build tags for selinux 2014-07-16 16:24:28 -07:00