Fix privileged container sysfs can't be rw because pod is ro by default#11271
Fix privileged container sysfs can't be rw because pod is ro by default#11271AkihiroSuda merged 1 commit intocontainerd:mainfrom
Conversation
|
Hi @fengwei0328. Thanks for your PR. I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
CI is failing |
5854bf3 to
b05dbdf
Compare
4d99780 to
b8a320c
Compare
All problems have been solved @AkihiroSuda @djdongjin |
djdongjin
left a comment
There was a problem hiding this comment.
Left a few comments.
Also I didn't quite understand the issue. Why would setting ro option in a sandbox/pause container mount impact your container mount? And why fixing the sandbox mount also fix the issue in your container? Is it because when you launch a container, it inherient these mounts from the sandbox?
Even if the |
|
/ok-to-test |
53c560f to
2602220
Compare
Signed-off-by: fengwei0328 <[email protected]>
|
The CI failure is due to vagrantcloud throttling: #11364
|
/retest |
PTAL, thanks! @AkihiroSuda @djdongjin |
|
PTAL, thanks! @AkihiroSuda |
Problem seems to have been solved |
|
@AkihiroSuda should we cherrypick this to 2.0.x given it's a bug fix? |
|
/cherry-pick release/2.0 |
|
@AkihiroSuda: new pull request created: #11456 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
note: This fix aligns behavior with cri-o (cri-o/cri-o#2627) and with the spec, systemd doesn't seem to start udevd even if it has |
fix #11270