This repository was archived by the owner on Mar 9, 2022. It is now read-only.
Commit 1ec7ede
committed
[release/1.4 backport] selinux: relabel /dev/shm
Address an issue originally seen in the k3s 1.3 and 1.4 forks of
containerd/cri, k3s-io/k3s#2240.
This is a backport of containerd/containerd#4699
Even with updated container-selinux policy, container-local /dev/shm will get
mounted with container_runtime_tmpfs_t because it is a tmpfs created by the
runtime and not the container (thus, container_runtime_t transition rules apply).
The relabel mitigates such, allowing envoy proxy to work correctly (and other
programs that wish to write to their /dev/shm) under selinux.
Signed-off-by: Jacob Blain Christen <[email protected]>1 parent 61363b3 commit 1ec7ede
2 files changed
Lines changed: 16 additions & 12 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
101 | 101 | | |
102 | 102 | | |
103 | 103 | | |
104 | | - | |
105 | | - | |
106 | | - | |
| 104 | + | |
| 105 | + | |
| 106 | + | |
| 107 | + | |
107 | 108 | | |
108 | 109 | | |
109 | 110 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
457 | 457 | | |
458 | 458 | | |
459 | 459 | | |
460 | | - | |
461 | | - | |
462 | | - | |
| 460 | + | |
| 461 | + | |
| 462 | + | |
| 463 | + | |
463 | 464 | | |
464 | 465 | | |
465 | 466 | | |
| |||
482 | 483 | | |
483 | 484 | | |
484 | 485 | | |
485 | | - | |
486 | | - | |
487 | | - | |
| 486 | + | |
| 487 | + | |
| 488 | + | |
| 489 | + | |
488 | 490 | | |
489 | 491 | | |
490 | 492 | | |
| |||
555 | 557 | | |
556 | 558 | | |
557 | 559 | | |
558 | | - | |
559 | | - | |
560 | | - | |
| 560 | + | |
| 561 | + | |
| 562 | + | |
| 563 | + | |
561 | 564 | | |
562 | 565 | | |
563 | 566 | | |
| |||
0 commit comments