diff --git a/pkg/server/container_create.go b/pkg/server/container_create.go index c4f730d0d..1b79793e2 100644 --- a/pkg/server/container_create.go +++ b/pkg/server/container_create.go @@ -523,7 +523,7 @@ func clearReadOnly(m *runtimespec.Mount) { opt = append(opt, o) } } - m.Options = opt + m.Options = append(opt, "rw") } // addDevices set device mapping without privilege. diff --git a/pkg/server/container_create_test.go b/pkg/server/container_create_test.go index 1baeb5d47..92f81678d 100644 --- a/pkg/server/container_create_test.go +++ b/pkg/server/container_create_test.go @@ -635,14 +635,14 @@ func TestPrivilegedBindMount(t *testing.T) { } spec := g.Spec() if test.expectedSysFSRO { - checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"ro"}, nil) + checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"ro"}, []string{"rw"}) } else { - checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", nil, []string{"ro"}) + checkMount(t, spec.Mounts, "sysfs", "/sys", "sysfs", []string{"rw"}, []string{"ro"}) } if test.expectedCgroupFSRO { - checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"ro"}, nil) + checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"ro"}, []string{"rw"}) } else { - checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", nil, []string{"ro"}) + checkMount(t, spec.Mounts, "cgroup", "/sys/fs/cgroup", "cgroup", []string{"rw"}, []string{"ro"}) } } }