gvisor/runsc/boot
Fabricio Voznika e4d3ca7263 Prevent internal tmpfs mount to override files in /tmp
Runsc wants to mount /tmp using internal tmpfs implementation for
performance. However, it risks hiding files that may exist under
/tmp in case it's present in the container. Now, it only mounts
over /tmp iff:
  - /tmp was not explicitly asked to be mounted
  - /tmp is empty

If any of this is not true, then /tmp maps to the container's
image /tmp.

Note: checkpoint doesn't have sentry FS mounted to check if /tmp
is empty. It simply looks for explicit mounts right now.
PiperOrigin-RevId: 229607856
Change-Id: I10b6dae7ac157ef578efc4dfceb089f3b94cde06
2019-01-16 12:48:32 -08:00
..
filter Use RET_KILL_PROCESS if available in kernel 2018-11-20 22:56:51 -08:00
BUILD Open source system call tests. 2018-12-10 14:42:34 -08:00
compat.go Add unsupported syscall events for get/setsockopt 2018-11-20 14:04:12 -08:00
compat_amd64.go Add unsupported syscall events for get/setsockopt 2018-11-20 14:04:12 -08:00
compat_test.go Add unsupported syscall events for get/setsockopt 2018-11-20 14:04:12 -08:00
config.go Automated rollback of changelist 225089593 2019-01-02 15:48:00 -08:00
controller.go Simplify synchronization between runsc and sandbox process 2018-12-28 13:48:24 -08:00
debug.go
events.go
fds.go
fs.go Prevent internal tmpfs mount to override files in /tmp 2019-01-16 12:48:32 -08:00
limits.go Rename limits.MemoryPagesLocked to limits.MemoryLocked. 2018-12-20 13:28:46 -08:00
loader.go Automated rollback of changelist 225089593 2019-01-02 15:48:00 -08:00
loader_test.go Prevent internal tmpfs mount to override files in /tmp 2019-01-16 12:48:32 -08:00
network.go
strace.go