An operation for filesystem tucking
An operation for filesystem tucking
Posted Mar 31, 2023 17:00 UTC (Fri) by Karellen (subscriber, #67644)Parent article: An operation for filesystem tucking
I wonder, why not mount the new overlay on top of the old overlay, and then unmount the old overlay from beneath it, instead?
That should provide the same atomic, no possibility of missing overlay, semantics, but without the extra flags and options, shouldn't it?
If unmounting covered filesystems is not currently allowed, then some new code may be needed to allow that, but it's not immediately obvious to me why that approach would be longer or more complex than the proposed "tucking" mechanism?
Posted Mar 31, 2023 20:59 UTC (Fri)
by epa (subscriber, #39769)
[Link] (10 responses)
Posted Mar 31, 2023 21:14 UTC (Fri)
by NYKevin (subscriber, #129325)
[Link] (1 responses)
Posted Apr 1, 2023 6:41 UTC (Sat)
by epa (subscriber, #39769)
[Link]
Posted Apr 1, 2023 10:49 UTC (Sat)
by Karellen (subscriber, #67644)
[Link] (7 responses)
Posted Apr 1, 2023 20:03 UTC (Sat)
by NYKevin (subscriber, #129325)
[Link] (6 responses)
Posted Apr 3, 2023 12:57 UTC (Mon)
by mgedmin (subscriber, #34497)
[Link] (1 responses)
Posted Apr 3, 2023 17:49 UTC (Mon)
by NYKevin (subscriber, #129325)
[Link]
Posted Apr 3, 2023 22:13 UTC (Mon)
by stefanha (subscriber, #55072)
[Link] (3 responses)
This seems fragile to me, but then, in place updates are always tricky.
Posted Apr 4, 2023 7:38 UTC (Tue)
by smurf (subscriber, #17840)
[Link] (2 responses)
Posted Apr 9, 2023 7:49 UTC (Sun)
by NYKevin (subscriber, #129325)
[Link] (1 responses)
One wonders why userspace container systems don't just put a symlink inside of the filesystem image. You could have, for example, two mount points A and B, and a symlink to whichever mount point is currently in use. When you want to upgrade to a new version, you mount it on the other mount point, and then flip the symlink. Perhaps the container software doesn't want to dictate the use of such symlinks? But that seems like a rather... insubstantial reason to make this the kernel's problem, IMHO.
Posted Apr 9, 2023 10:46 UTC (Sun)
by smurf (subscriber, #17840)
[Link]
On the other hand if you have a tuck-mount you can do an atomic unmount afterwards, but only if there's no current user. That guarantees that you don't run into inconsistent libraries et al. even when you can't control exactly when a program (re)starts.
Posted Apr 1, 2023 12:56 UTC (Sat)
by smurf (subscriber, #17840)
[Link]
When mounting on top there probably are open files on the overlaid file system. You now have a mix of open old and unopened new content, which is a surefire recipe for eventual disaster.
Posted Apr 4, 2023 13:38 UTC (Tue)
by nim-nim (subscriber, #34454)
[Link]
IMHO the article does not state clearly that local changes (for example /etc) are likely to exist in a RW layer mounted over the old overlay, so you still need to tuck under it. Nobody really succeeded in strict separation between RO and RW directories for complex setups, that‘s an ideal people are still chasing.
Also since I suppose unmounting the old overlay is faster than mounting the new one, that means you can wait for the new overlay to be mounted under the old one in all affected containers in the system, and them pop the old one in one go.
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking
An operation for filesystem tucking