summaryrefslogtreecommitdiffhomepage
path: root/runsc/boot/config.go
diff options
context:
space:
mode:
authorgVisor bot <gvisor-bot@google.com>2019-10-16 22:20:51 +0000
committergVisor bot <gvisor-bot@google.com>2019-10-16 22:20:51 +0000
commita02f8d0dbefc8a56940a579f07ac1c35be92a112 (patch)
tree8e44280b5dfecea49eca930c60bfeb4cbfe03e77 /runsc/boot/config.go
parentd8af87b44fcae3f7666005fa0e54d242c3708699 (diff)
parent9fb562234e7858dbc60e8771f851629464edf205 (diff)
Merge release-20190806.1-281-g9fb5622 (automated)
Diffstat (limited to 'runsc/boot/config.go')
-rw-r--r--runsc/boot/config.go5
1 files changed, 5 insertions, 0 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go
index 38278d0a2..01a29e8d5 100644
--- a/runsc/boot/config.go
+++ b/runsc/boot/config.go
@@ -231,6 +231,10 @@ type Config struct {
// ReferenceLeakMode sets reference leak check mode
ReferenceLeakMode refs.LeakMode
+ // OverlayfsStaleRead causes cached FDs to reopen after a file is opened for
+ // write to workaround overlayfs limitation on kernels before 4.19.
+ OverlayfsStaleRead bool
+
// TestOnlyAllowRunAsCurrentUserWithoutChroot should only be used in
// tests. It allows runsc to start the sandbox process as the current
// user, and without chrooting the sandbox process. This can be
@@ -271,6 +275,7 @@ func (c *Config) ToFlags() []string {
"--rootless=" + strconv.FormatBool(c.Rootless),
"--alsologtostderr=" + strconv.FormatBool(c.AlsoLogToStderr),
"--ref-leak-mode=" + refsLeakModeToString(c.ReferenceLeakMode),
+ "--overlayfs-stale-read=" + strconv.FormatBool(c.OverlayfsStaleRead),
}
// Only include these if set since it is never to be used by users.
if c.TestOnlyAllowRunAsCurrentUserWithoutChroot {