You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: man/oci-runtime-tool-generate.1.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,6 +132,10 @@ read the configuration from `config.json`.
132
132
**--linux-realtime-runtime**=REALTIMERUNTIME
133
133
Specifies a period of time in microseconds for the longest continuous period in which the tasks in a cgroup have access to CPU resources.
134
134
135
+
**--masked-paths**=[]
136
+
Specifies paths can not be read inside container. e.g. --masked-paths=/proc/kcore
137
+
This option can be specified multiple times.
138
+
135
139
**--mount**=*PATH*
136
140
Use a mount namespace where *PATH* is an existing mount namespace file
137
141
to join. The special *PATH* empty-string creates a new namespace.
@@ -206,6 +210,10 @@ read the configuration from `config.json`.
206
210
207
211
When the operator executes **oci-runtime-tool generate --privileged**, OCI will enable access to all devices on the host as well as disable some of the confinement mechanisms like AppArmor, SELinux, and seccomp from blocking access to privileged processes. This gives the container processes nearly all the same access to the host as processes generating outside of a container on the host.
208
212
213
+
**--readonly-paths**=[]
214
+
Specifies paths readonly inside container. e.g. --readonly-paths=/proc/sys
215
+
This option can be specified multiple times.
216
+
209
217
**--read-only**=true|false
210
218
Mount the container's root filesystem as read only.
0 commit comments