Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-01-31 | gvisor/gofer: Use pivot_root instead of chroot | Andrei Vagin | |
PiperOrigin-RevId: 231864273 Change-Id: I8545b72b615f5c2945df374b801b80be64ec3e13 | |||
2019-01-22 | Don't bind-mount runsc into a sandbox mntns | Andrei Vagin | |
PiperOrigin-RevId: 230437407 Change-Id: Id9d8ceeb018aad2fe317407c78c6ee0f4b47aa2b | |||
2019-01-18 | runsc: create a new proc mount if the sandbox process is running in a new pidns | Andrei Vagin | |
PiperOrigin-RevId: 229971902 Change-Id: Ief4fac731e839ef092175908de9375d725eaa3aa | |||
2019-01-14 | runsc: set up a minimal chroot from the sandbox process | Andrei Vagin | |
In this case, new mounts are not created in the host mount namspaces, so tearDownChroot isn't needed, because chroot will be destroyed with a sandbox mount namespace. In additional, pivot_root can't be called instead of chroot. PiperOrigin-RevId: 229250871 Change-Id: I765bdb587d0b8287a6a8efda8747639d37c7e7b6 |