gvisor/runsc/container
Fabricio Voznika e420cc3e5d Add support for mount propagation
Properly handle propagation options for root and mounts. Now usage of
mount options shared, rshared, and noexec cause error to start. shared/
rshared breaks sandbox=>host isolation. slave however can be supported
because changes propagate from host to sandbox.

Root FS setup moved inside the gofer. Apart from simplifying the code,
it keeps all mounts inside the namespace. And they are torn down when
the namespace is destroyed (DestroyFS is no longer needed).

PiperOrigin-RevId: 239037661
Change-Id: I8b5ee4d50da33c042ea34fa68e56514ebe20e6e0
2019-03-18 12:30:43 -07:00
..
BUILD Add support for mount propagation 2019-03-18 12:30:43 -07:00
console_test.go Use correct company name in copyright header 2018-10-19 16:35:11 -07:00
container.go Add support for mount propagation 2019-03-18 12:30:43 -07:00
container_test.go Add support for mount propagation 2019-03-18 12:30:43 -07:00
hook.go Use correct company name in copyright header 2018-10-19 16:35:11 -07:00
multi_container_test.go Start a sandbox process in a new userns only if CAP_SETUID is set 2019-01-18 16:08:39 -08:00
shared_volume_test.go Make cacheRemoteRevalidating detect changes to file size 2019-01-25 17:23:07 -08:00
status.go Use correct company name in copyright header 2018-10-19 16:35:11 -07:00
test_app.go Use correct company name in copyright header 2018-10-19 16:35:11 -07:00