You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Address an issue originally seen in the k3s 1.3 and 1.4 forks of
containerd/cri, k3s-io/k3s#2240.
This is a backport of containerd/containerd#4699
Even with updated container-selinux policy, container-local /dev/shm will get
mounted with container_runtime_tmpfs_t because it is a tmpfs created by the
runtime and not the container (thus, container_runtime_t transition rules apply).
The relabel mitigates such, allowing envoy proxy to work correctly (and other
programs that wish to write to their /dev/shm) under selinux.
Signed-off-by: Jacob Blain Christen <[email protected]>
0 commit comments