diff --git a/pkg/server/container_create.go b/pkg/server/container_create.go index cb5b1f9a5..770f2edb2 100644 --- a/pkg/server/container_create.go +++ b/pkg/server/container_create.go @@ -523,7 +523,7 @@ func clearReadOnly(m *runtimespec.Mount) { opt = append(opt, o) } } - m.Options = opt + m.Options = append(opt, "rw") } // addDevices set device mapping without privilege. diff --git a/pkg/server/container_create_test.go b/pkg/server/container_create_test.go index a0a3871ff..d7bde6daa 100644 --- a/pkg/server/container_create_test.go +++ b/pkg/server/container_create_test.go @@ -627,14 +627,14 @@ func TestPrivilegedBindMount(t *testing.T) { } spec := g.Spec() if test.expectedSysFSRO { - checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"ro"}, nil) + checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"ro"}, []string{"rw"}) } else { - checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", nil, []string{"ro"}) + checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"rw"}, []string{"ro"}) } if test.expectedCgroupFSRO { - checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"ro"}, nil) + checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"ro"}, []string{"rw"}) } else { - checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", nil, []string{"ro"}) + checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"rw"}, []string{"ro"}) } } }