Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-01-22 | Don't bind-mount runsc into a sandbox mntns | Andrei Vagin | |
PiperOrigin-RevId: 230437407 Change-Id: Id9d8ceeb018aad2fe317407c78c6ee0f4b47aa2b | |||
2019-01-18 | runsc: create a new proc mount if the sandbox process is running in a new pidns | Andrei Vagin | |
PiperOrigin-RevId: 229971902 Change-Id: Ief4fac731e839ef092175908de9375d725eaa3aa | |||
2019-01-14 | runsc: set up a minimal chroot from the sandbox process | Andrei Vagin | |
In this case, new mounts are not created in the host mount namspaces, so tearDownChroot isn't needed, because chroot will be destroyed with a sandbox mount namespace. In additional, pivot_root can't be called instead of chroot. PiperOrigin-RevId: 229250871 Change-Id: I765bdb587d0b8287a6a8efda8747639d37c7e7b6 |