Files
docker-cli/components/engine/daemon
Daniel J Walsh 3e0fab4d2e /dev should not be readonly with --readonly flag
/dev is mounted on a tmpfs inside of a container.  Processes inside of containers
some times need to create devices nodes, or to setup a socket that listens on /dev/log
Allowing these containers to run with the --readonly flag makes sense.  Making a tmpfs
readonly does not add any security to the container, since there is plenty of places
where the container can write tmpfs content.

I have no idea why /dev was excluded.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Upstream-commit: 5f3bd2473ee2a1b9f37ba0130e934133d0e01f89
Component: engine
2017-11-02 10:28:51 -04:00
..
2017-09-08 18:23:21 -04:00
2017-10-24 15:39:34 -04:00
2017-10-18 10:26:58 +08:00
2017-09-06 12:05:19 -04:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-05-16 14:25:32 -07:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-07-31 13:16:46 -07:00
2017-07-31 13:16:46 -07:00
2017-10-19 11:09:29 -07:00
2017-07-31 13:16:46 -07:00
2017-08-21 18:18:50 -04:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-18 17:09:27 -07:00
2017-08-24 15:08:31 -04:00
2017-10-09 13:47:28 -07:00
2017-07-18 12:09:26 +08:00
2017-07-31 13:16:46 -07:00
2017-09-12 12:09:59 -04:00
2017-10-24 15:39:34 -04:00
2017-07-31 13:16:46 -07:00
2016-12-27 21:46:52 +08:00
2017-07-31 13:16:46 -07:00
2017-05-16 11:30:06 -07:00
2017-07-31 13:16:46 -07:00
2017-10-24 15:39:34 -04:00
2017-09-07 09:44:08 +08:00
2017-09-06 12:05:19 -04:00
2017-09-06 12:05:19 -04:00
2017-07-03 13:13:09 -07:00
2017-05-16 15:11:39 -07:00
2017-06-07 11:45:33 -04:00