diff options
author | Adin Scannell <ascannell@google.com> | 2020-03-30 12:36:30 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-03-30 12:37:57 -0700 |
commit | 3fac85da951f9f56d0232718ea7584250cf11f31 (patch) | |
tree | aef282ad8f9dda532fb7d629d6d4aa58ab5e7487 /runsc | |
parent | 4aee3706406d6b102540ad5bea272b7c893da827 (diff) |
kvm: handle exit reasons even under EINTR.
In the case of other signals (preemption), inject a normal bounce and
defer the signal until the vCPU has been returned from guest mode.
PiperOrigin-RevId: 303799678
Diffstat (limited to 'runsc')
-rw-r--r-- | runsc/sandbox/sandbox.go | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/runsc/sandbox/sandbox.go b/runsc/sandbox/sandbox.go index 8de75ae57..6c15727fa 100644 --- a/runsc/sandbox/sandbox.go +++ b/runsc/sandbox/sandbox.go @@ -444,12 +444,6 @@ func (s *Sandbox) createSandboxProcess(conf *boot.Config, args *Args, startSyncF nextFD++ } - // TODO(b/151157106): syscall tests fail by timeout if asyncpreemptoff - // isn't set. - if conf.Platform == "kvm" { - cmd.Env = append(cmd.Env, "GODEBUG=asyncpreemptoff=1") - } - // The current process' stdio must be passed to the application via the // --stdio-fds flag. The stdio of the sandbox process itself must not // be connected to the same FDs, otherwise we risk leaking sandbox |