summaryrefslogtreecommitdiff
path: root/cmd
diff options
context:
space:
mode:
authorbaude <bbaude@redhat.com>2018-01-31 14:21:47 -0600
committerAtomic Bot <atomic-devel@projectatomic.io>2018-02-06 01:17:54 +0000
commitbf00c976dd7509b7d84d1fa5254f1ac26fc494e5 (patch)
tree168e559fbfcdbc0e0f07cd5cbce03f982677ef58 /cmd
parent3609b82fe6f5fe268cdbe9f8aba43140c4e81f90 (diff)
downloadpodman-bf00c976dd7509b7d84d1fa5254f1ac26fc494e5.tar.gz
podman-bf00c976dd7509b7d84d1fa5254f1ac26fc494e5.tar.bz2
podman-bf00c976dd7509b7d84d1fa5254f1ac26fc494e5.zip
sysfs should be mounted rw for privileged
sysfs should be mounted rw for a privileged container. Signed-off-by: baude <bbaude@redhat.com> Closes: #279 Approved by: rhatdan
Diffstat (limited to 'cmd')
-rw-r--r--cmd/podman/spec.go14
1 files changed, 13 insertions, 1 deletions
diff --git a/cmd/podman/spec.go b/cmd/podman/spec.go
index d21d8b6da..56e8c8d05 100644
--- a/cmd/podman/spec.go
+++ b/cmd/podman/spec.go
@@ -156,12 +156,24 @@ func addDevice(g *generate.Generator, device string) error {
// Parses information needed to create a container into an OCI runtime spec
func createConfigToOCISpec(config *createConfig) (*spec.Spec, error) {
+ cgroupPerm := "ro"
g := generate.New()
+ if config.Privileged {
+ cgroupPerm = "rw"
+ g.RemoveMount("/sys")
+ sysMnt := spec.Mount{
+ Destination: "/sys",
+ Type: "sysfs",
+ Source: "sysfs",
+ Options: []string{"nosuid", "noexec", "nodev", "rw"},
+ }
+ g.AddMount(sysMnt)
+ }
cgroupMnt := spec.Mount{
Destination: "/sys/fs/cgroup",
Type: "cgroup",
Source: "cgroup",
- Options: []string{"nosuid", "noexec", "nodev", "relatime", "ro"},
+ Options: []string{"nosuid", "noexec", "nodev", "relatime", cgroupPerm},
}
g.AddMount(cgroupMnt)
g.SetProcessCwd(config.WorkDir)