mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
5020edca76
Commite2989c4d48
says: > With the suffix added, the possibility to hit the race is extremely > low, and we don't have to do any locking. Probability theory just laughed in my face this weekend, as this has actually happened once in6050000
containers created, on a high-end hardware with 1000 parallel "docker create" running (took a few days). One way to work around this is increase the randomness by adding more characters, which will further decrease the probability, but won't eliminate it entirely. Another is to fix it upstream (done, see the link below, but the fix might not be packported to Ubuntu). Overall, as much as I like this solution, I think we need to revert it :-\ See-also: https://github.com/sfjro/aufs5-standalone/commit/abf61326f49535 This reverts commite2989c4d48
. Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
656 lines
18 KiB
Go
656 lines
18 KiB
Go
// +build linux
|
|
|
|
/*
|
|
|
|
aufs driver directory structure
|
|
|
|
.
|
|
├── layers // Metadata of layers
|
|
│ ├── 1
|
|
│ ├── 2
|
|
│ └── 3
|
|
├── diff // Content of the layer
|
|
│ ├── 1 // Contains layers that need to be mounted for the id
|
|
│ ├── 2
|
|
│ └── 3
|
|
└── mnt // Mount points for the rw layers to be mounted
|
|
├── 1
|
|
├── 2
|
|
└── 3
|
|
|
|
*/
|
|
|
|
package aufs // import "github.com/docker/docker/daemon/graphdriver/aufs"
|
|
|
|
import (
|
|
"bufio"
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"os"
|
|
"os/exec"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/docker/docker/daemon/graphdriver"
|
|
"github.com/docker/docker/pkg/archive"
|
|
"github.com/docker/docker/pkg/chrootarchive"
|
|
"github.com/docker/docker/pkg/containerfs"
|
|
"github.com/docker/docker/pkg/directory"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
"github.com/docker/docker/pkg/locker"
|
|
"github.com/docker/docker/pkg/mount"
|
|
"github.com/docker/docker/pkg/system"
|
|
rsystem "github.com/opencontainers/runc/libcontainer/system"
|
|
"github.com/opencontainers/selinux/go-selinux/label"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/vbatts/tar-split/tar/storage"
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
var (
|
|
// ErrAufsNotSupported is returned if aufs is not supported by the host.
|
|
ErrAufsNotSupported = fmt.Errorf("AUFS was not found in /proc/filesystems")
|
|
// ErrAufsNested means aufs cannot be used bc we are in a user namespace
|
|
ErrAufsNested = fmt.Errorf("AUFS cannot be used in non-init user namespace")
|
|
backingFs = "<unknown>"
|
|
|
|
enableDirpermLock sync.Once
|
|
enableDirperm bool
|
|
|
|
logger = logrus.WithField("storage-driver", "aufs")
|
|
)
|
|
|
|
func init() {
|
|
graphdriver.Register("aufs", Init)
|
|
}
|
|
|
|
// Driver contains information about the filesystem mounted.
|
|
type Driver struct {
|
|
root string
|
|
uidMaps []idtools.IDMap
|
|
gidMaps []idtools.IDMap
|
|
ctr *graphdriver.RefCounter
|
|
pathCacheLock sync.Mutex
|
|
pathCache map[string]string
|
|
naiveDiff graphdriver.DiffDriver
|
|
locker *locker.Locker
|
|
mntL sync.Mutex
|
|
}
|
|
|
|
// Init returns a new AUFS driver.
|
|
// An error is returned if AUFS is not supported.
|
|
func Init(root string, options []string, uidMaps, gidMaps []idtools.IDMap) (graphdriver.Driver, error) {
|
|
// Try to load the aufs kernel module
|
|
if err := supportsAufs(); err != nil {
|
|
logger.Error(err)
|
|
return nil, graphdriver.ErrNotSupported
|
|
}
|
|
|
|
// Perform feature detection on /var/lib/docker/aufs if it's an existing directory.
|
|
// This covers situations where /var/lib/docker/aufs is a mount, and on a different
|
|
// filesystem than /var/lib/docker.
|
|
// If the path does not exist, fall back to using /var/lib/docker for feature detection.
|
|
testdir := root
|
|
if _, err := os.Stat(testdir); os.IsNotExist(err) {
|
|
testdir = filepath.Dir(testdir)
|
|
}
|
|
|
|
fsMagic, err := graphdriver.GetFSMagic(testdir)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if fsName, ok := graphdriver.FsNames[fsMagic]; ok {
|
|
backingFs = fsName
|
|
}
|
|
|
|
switch fsMagic {
|
|
case graphdriver.FsMagicAufs, graphdriver.FsMagicBtrfs, graphdriver.FsMagicEcryptfs:
|
|
logger.Errorf("AUFS is not supported over %s", backingFs)
|
|
return nil, graphdriver.ErrIncompatibleFS
|
|
}
|
|
|
|
paths := []string{
|
|
"mnt",
|
|
"diff",
|
|
"layers",
|
|
}
|
|
|
|
a := &Driver{
|
|
root: root,
|
|
uidMaps: uidMaps,
|
|
gidMaps: gidMaps,
|
|
pathCache: make(map[string]string),
|
|
ctr: graphdriver.NewRefCounter(graphdriver.NewFsChecker(graphdriver.FsMagicAufs)),
|
|
locker: locker.New(),
|
|
}
|
|
|
|
rootUID, rootGID, err := idtools.GetRootUIDGID(uidMaps, gidMaps)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// Create the root aufs driver dir
|
|
if err := idtools.MkdirAllAndChown(root, 0700, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Populate the dir structure
|
|
for _, p := range paths {
|
|
if err := idtools.MkdirAllAndChown(path.Join(root, p), 0700, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
for _, path := range []string{"mnt", "diff"} {
|
|
p := filepath.Join(root, path)
|
|
entries, err := ioutil.ReadDir(p)
|
|
if err != nil {
|
|
logger.WithError(err).WithField("dir", p).Error("error reading dir entries")
|
|
continue
|
|
}
|
|
for _, entry := range entries {
|
|
if !entry.IsDir() {
|
|
continue
|
|
}
|
|
if strings.HasSuffix(entry.Name(), "-removing") {
|
|
logger.WithField("dir", entry.Name()).Debug("Cleaning up stale layer dir")
|
|
if err := system.EnsureRemoveAll(filepath.Join(p, entry.Name())); err != nil {
|
|
logger.WithField("dir", entry.Name()).WithError(err).Error("Error removing stale layer dir")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
a.naiveDiff = graphdriver.NewNaiveDiffDriver(a, uidMaps, gidMaps)
|
|
return a, nil
|
|
}
|
|
|
|
// Return a nil error if the kernel supports aufs
|
|
// We cannot modprobe because inside dind modprobe fails
|
|
// to run
|
|
func supportsAufs() error {
|
|
// We can try to modprobe aufs first before looking at
|
|
// proc/filesystems for when aufs is supported
|
|
exec.Command("modprobe", "aufs").Run()
|
|
|
|
if rsystem.RunningInUserNS() {
|
|
return ErrAufsNested
|
|
}
|
|
|
|
f, err := os.Open("/proc/filesystems")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
s := bufio.NewScanner(f)
|
|
for s.Scan() {
|
|
if strings.Contains(s.Text(), "aufs") {
|
|
return nil
|
|
}
|
|
}
|
|
return ErrAufsNotSupported
|
|
}
|
|
|
|
func (a *Driver) rootPath() string {
|
|
return a.root
|
|
}
|
|
|
|
func (*Driver) String() string {
|
|
return "aufs"
|
|
}
|
|
|
|
// Status returns current information about the filesystem such as root directory, number of directories mounted, etc.
|
|
func (a *Driver) Status() [][2]string {
|
|
ids, _ := loadIds(path.Join(a.rootPath(), "layers"))
|
|
return [][2]string{
|
|
{"Root Dir", a.rootPath()},
|
|
{"Backing Filesystem", backingFs},
|
|
{"Dirs", fmt.Sprintf("%d", len(ids))},
|
|
{"Dirperm1 Supported", fmt.Sprintf("%v", useDirperm())},
|
|
}
|
|
}
|
|
|
|
// GetMetadata not implemented
|
|
func (a *Driver) GetMetadata(id string) (map[string]string, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
// Exists returns true if the given id is registered with
|
|
// this driver
|
|
func (a *Driver) Exists(id string) bool {
|
|
if _, err := os.Lstat(path.Join(a.rootPath(), "layers", id)); err != nil {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
// CreateReadWrite creates a layer that is writable for use as a container
|
|
// file system.
|
|
func (a *Driver) CreateReadWrite(id, parent string, opts *graphdriver.CreateOpts) error {
|
|
return a.Create(id, parent, opts)
|
|
}
|
|
|
|
// Create three folders for each id
|
|
// mnt, layers, and diff
|
|
func (a *Driver) Create(id, parent string, opts *graphdriver.CreateOpts) error {
|
|
|
|
if opts != nil && len(opts.StorageOpt) != 0 {
|
|
return fmt.Errorf("--storage-opt is not supported for aufs")
|
|
}
|
|
|
|
if err := a.createDirsFor(id); err != nil {
|
|
return err
|
|
}
|
|
// Write the layers metadata
|
|
f, err := os.Create(path.Join(a.rootPath(), "layers", id))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
if parent != "" {
|
|
ids, err := getParentIDs(a.rootPath(), parent)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := fmt.Fprintln(f, parent); err != nil {
|
|
return err
|
|
}
|
|
for _, i := range ids {
|
|
if _, err := fmt.Fprintln(f, i); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// createDirsFor creates two directories for the given id.
|
|
// mnt and diff
|
|
func (a *Driver) createDirsFor(id string) error {
|
|
paths := []string{
|
|
"mnt",
|
|
"diff",
|
|
}
|
|
|
|
rootUID, rootGID, err := idtools.GetRootUIDGID(a.uidMaps, a.gidMaps)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// Directory permission is 0755.
|
|
// The path of directories are <aufs_root_path>/mnt/<image_id>
|
|
// and <aufs_root_path>/diff/<image_id>
|
|
for _, p := range paths {
|
|
if err := idtools.MkdirAllAndChown(path.Join(a.rootPath(), p, id), 0755, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Remove will unmount and remove the given id.
|
|
func (a *Driver) Remove(id string) error {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
a.pathCacheLock.Lock()
|
|
mountpoint, exists := a.pathCache[id]
|
|
a.pathCacheLock.Unlock()
|
|
if !exists {
|
|
mountpoint = a.getMountpoint(id)
|
|
}
|
|
|
|
if err := a.unmount(mountpoint); err != nil {
|
|
logger.WithError(err).WithField("method", "Remove()").Warn()
|
|
return err
|
|
}
|
|
|
|
// Remove the layers file for the id
|
|
if err := os.Remove(path.Join(a.rootPath(), "layers", id)); err != nil && !os.IsNotExist(err) {
|
|
return errors.Wrapf(err, "error removing layers dir for %s", id)
|
|
}
|
|
|
|
if err := atomicRemove(a.getDiffPath(id)); err != nil {
|
|
return errors.Wrapf(err, "could not remove diff path for id %s", id)
|
|
}
|
|
|
|
// Atomically remove each directory in turn by first moving it out of the
|
|
// way (so that docker doesn't find it anymore) before doing removal of
|
|
// the whole tree.
|
|
if err := atomicRemove(mountpoint); err != nil {
|
|
if errors.Cause(err) == unix.EBUSY {
|
|
logger.WithField("dir", mountpoint).WithError(err).Warn("error performing atomic remove due to EBUSY")
|
|
}
|
|
return errors.Wrapf(err, "could not remove mountpoint for id %s", id)
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
delete(a.pathCache, id)
|
|
a.pathCacheLock.Unlock()
|
|
return nil
|
|
}
|
|
|
|
func atomicRemove(source string) error {
|
|
target := source + "-removing"
|
|
|
|
err := os.Rename(source, target)
|
|
switch {
|
|
case err == nil, os.IsNotExist(err):
|
|
case os.IsExist(err):
|
|
// Got error saying the target dir already exists, maybe the source doesn't exist due to a previous (failed) remove
|
|
if _, e := os.Stat(source); !os.IsNotExist(e) {
|
|
return errors.Wrapf(err, "target rename dir %q exists but should not, this needs to be manually cleaned up", target)
|
|
}
|
|
default:
|
|
return errors.Wrapf(err, "error preparing atomic delete")
|
|
}
|
|
|
|
return system.EnsureRemoveAll(target)
|
|
}
|
|
|
|
// Get returns the rootfs path for the id.
|
|
// This will mount the dir at its given path
|
|
func (a *Driver) Get(id, mountLabel string) (containerfs.ContainerFS, error) {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
parents, err := a.getParentLayerPaths(id)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return nil, err
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
m, exists := a.pathCache[id]
|
|
a.pathCacheLock.Unlock()
|
|
|
|
if !exists {
|
|
m = a.getDiffPath(id)
|
|
if len(parents) > 0 {
|
|
m = a.getMountpoint(id)
|
|
}
|
|
}
|
|
if count := a.ctr.Increment(m); count > 1 {
|
|
return containerfs.NewLocalContainerFS(m), nil
|
|
}
|
|
|
|
// If a dir does not have a parent ( no layers )do not try to mount
|
|
// just return the diff path to the data
|
|
if len(parents) > 0 {
|
|
if err := a.mount(id, m, mountLabel, parents); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
a.pathCacheLock.Lock()
|
|
a.pathCache[id] = m
|
|
a.pathCacheLock.Unlock()
|
|
return containerfs.NewLocalContainerFS(m), nil
|
|
}
|
|
|
|
// Put unmounts and updates list of active mounts.
|
|
func (a *Driver) Put(id string) error {
|
|
a.locker.Lock(id)
|
|
defer a.locker.Unlock(id)
|
|
a.pathCacheLock.Lock()
|
|
m, exists := a.pathCache[id]
|
|
if !exists {
|
|
m = a.getMountpoint(id)
|
|
a.pathCache[id] = m
|
|
}
|
|
a.pathCacheLock.Unlock()
|
|
if count := a.ctr.Decrement(m); count > 0 {
|
|
return nil
|
|
}
|
|
|
|
err := a.unmount(m)
|
|
if err != nil {
|
|
logger.WithError(err).WithField("method", "Put()").Warn()
|
|
}
|
|
return err
|
|
}
|
|
|
|
// isParent returns if the passed in parent is the direct parent of the passed in layer
|
|
func (a *Driver) isParent(id, parent string) bool {
|
|
parents, _ := getParentIDs(a.rootPath(), id)
|
|
if parent == "" && len(parents) > 0 {
|
|
return false
|
|
}
|
|
return !(len(parents) > 0 && parent != parents[0])
|
|
}
|
|
|
|
// Diff produces an archive of the changes between the specified
|
|
// layer and its parent layer which may be "".
|
|
func (a *Driver) Diff(id, parent string) (io.ReadCloser, error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.Diff(id, parent)
|
|
}
|
|
|
|
// AUFS doesn't need the parent layer to produce a diff.
|
|
return archive.TarWithOptions(path.Join(a.rootPath(), "diff", id), &archive.TarOptions{
|
|
Compression: archive.Uncompressed,
|
|
ExcludePatterns: []string{archive.WhiteoutMetaPrefix + "*", "!" + archive.WhiteoutOpaqueDir},
|
|
UIDMaps: a.uidMaps,
|
|
GIDMaps: a.gidMaps,
|
|
})
|
|
}
|
|
|
|
type fileGetNilCloser struct {
|
|
storage.FileGetter
|
|
}
|
|
|
|
func (f fileGetNilCloser) Close() error {
|
|
return nil
|
|
}
|
|
|
|
// DiffGetter returns a FileGetCloser that can read files from the directory that
|
|
// contains files for the layer differences. Used for direct access for tar-split.
|
|
func (a *Driver) DiffGetter(id string) (graphdriver.FileGetCloser, error) {
|
|
p := path.Join(a.rootPath(), "diff", id)
|
|
return fileGetNilCloser{storage.NewPathFileGetter(p)}, nil
|
|
}
|
|
|
|
func (a *Driver) applyDiff(id string, diff io.Reader) error {
|
|
return chrootarchive.UntarUncompressed(diff, path.Join(a.rootPath(), "diff", id), &archive.TarOptions{
|
|
UIDMaps: a.uidMaps,
|
|
GIDMaps: a.gidMaps,
|
|
})
|
|
}
|
|
|
|
// DiffSize calculates the changes between the specified id
|
|
// and its parent and returns the size in bytes of the changes
|
|
// relative to its base filesystem directory.
|
|
func (a *Driver) DiffSize(id, parent string) (size int64, err error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.DiffSize(id, parent)
|
|
}
|
|
// AUFS doesn't need the parent layer to calculate the diff size.
|
|
return directory.Size(context.TODO(), path.Join(a.rootPath(), "diff", id))
|
|
}
|
|
|
|
// ApplyDiff extracts the changeset from the given diff into the
|
|
// layer with the specified id and parent, returning the size of the
|
|
// new layer in bytes.
|
|
func (a *Driver) ApplyDiff(id, parent string, diff io.Reader) (size int64, err error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.ApplyDiff(id, parent, diff)
|
|
}
|
|
|
|
// AUFS doesn't need the parent id to apply the diff if it is the direct parent.
|
|
if err = a.applyDiff(id, diff); err != nil {
|
|
return
|
|
}
|
|
|
|
return a.DiffSize(id, parent)
|
|
}
|
|
|
|
// Changes produces a list of changes between the specified layer
|
|
// and its parent layer. If parent is "", then all changes will be ADD changes.
|
|
func (a *Driver) Changes(id, parent string) ([]archive.Change, error) {
|
|
if !a.isParent(id, parent) {
|
|
return a.naiveDiff.Changes(id, parent)
|
|
}
|
|
|
|
// AUFS doesn't have snapshots, so we need to get changes from all parent
|
|
// layers.
|
|
layers, err := a.getParentLayerPaths(id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return archive.Changes(layers, path.Join(a.rootPath(), "diff", id))
|
|
}
|
|
|
|
func (a *Driver) getParentLayerPaths(id string) ([]string, error) {
|
|
parentIds, err := getParentIDs(a.rootPath(), id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
layers := make([]string, len(parentIds))
|
|
|
|
// Get the diff paths for all the parent ids
|
|
for i, p := range parentIds {
|
|
layers[i] = path.Join(a.rootPath(), "diff", p)
|
|
}
|
|
return layers, nil
|
|
}
|
|
|
|
func (a *Driver) mount(id string, target string, mountLabel string, layers []string) error {
|
|
// If the id is mounted or we get an error return
|
|
if mounted, err := a.mounted(target); err != nil || mounted {
|
|
return err
|
|
}
|
|
|
|
rw := a.getDiffPath(id)
|
|
|
|
if err := a.aufsMount(layers, rw, target, mountLabel); err != nil {
|
|
return fmt.Errorf("error creating aufs mount to %s: %v", target, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (a *Driver) unmount(mountPath string) error {
|
|
if mounted, err := a.mounted(mountPath); err != nil || !mounted {
|
|
return err
|
|
}
|
|
return Unmount(mountPath)
|
|
}
|
|
|
|
func (a *Driver) mounted(mountpoint string) (bool, error) {
|
|
return graphdriver.Mounted(graphdriver.FsMagicAufs, mountpoint)
|
|
}
|
|
|
|
// Cleanup aufs and unmount all mountpoints
|
|
func (a *Driver) Cleanup() error {
|
|
dir := a.mntPath()
|
|
files, err := ioutil.ReadDir(dir)
|
|
if err != nil {
|
|
return errors.Wrap(err, "aufs readdir error")
|
|
}
|
|
for _, f := range files {
|
|
if !f.IsDir() {
|
|
continue
|
|
}
|
|
|
|
m := path.Join(dir, f.Name())
|
|
|
|
if err := a.unmount(m); err != nil {
|
|
logger.WithError(err).WithField("method", "Cleanup()").Warn()
|
|
}
|
|
}
|
|
return mount.RecursiveUnmount(a.root)
|
|
}
|
|
|
|
func (a *Driver) aufsMount(ro []string, rw, target, mountLabel string) (err error) {
|
|
defer func() {
|
|
if err != nil {
|
|
mount.Unmount(target)
|
|
}
|
|
}()
|
|
|
|
// Mount options are clipped to page size(4096 bytes). If there are more
|
|
// layers then these are remounted individually using append.
|
|
|
|
offset := 54
|
|
if useDirperm() {
|
|
offset += len(",dirperm1")
|
|
}
|
|
b := make([]byte, unix.Getpagesize()-len(mountLabel)-offset) // room for xino & mountLabel
|
|
bp := copy(b, fmt.Sprintf("br:%s=rw", rw))
|
|
|
|
index := 0
|
|
for ; index < len(ro); index++ {
|
|
layer := fmt.Sprintf(":%s=ro+wh", ro[index])
|
|
if bp+len(layer) > len(b) {
|
|
break
|
|
}
|
|
bp += copy(b[bp:], layer)
|
|
}
|
|
|
|
opts := "dio,xino=/dev/shm/aufs.xino"
|
|
if useDirperm() {
|
|
opts += ",dirperm1"
|
|
}
|
|
data := label.FormatMountLabel(fmt.Sprintf("%s,%s", string(b[:bp]), opts), mountLabel)
|
|
a.mntL.Lock()
|
|
err = unix.Mount("none", target, "aufs", 0, data)
|
|
a.mntL.Unlock()
|
|
if err != nil {
|
|
err = errors.Wrap(err, "mount target="+target+" data="+data)
|
|
return
|
|
}
|
|
|
|
for index < len(ro) {
|
|
bp = 0
|
|
for ; index < len(ro); index++ {
|
|
layer := fmt.Sprintf("append:%s=ro+wh,", ro[index])
|
|
if bp+len(layer) > len(b) {
|
|
break
|
|
}
|
|
bp += copy(b[bp:], layer)
|
|
}
|
|
data := label.FormatMountLabel(string(b[:bp]), mountLabel)
|
|
a.mntL.Lock()
|
|
err = unix.Mount("none", target, "aufs", unix.MS_REMOUNT, data)
|
|
a.mntL.Unlock()
|
|
if err != nil {
|
|
err = errors.Wrap(err, "mount target="+target+" flags=MS_REMOUNT data="+data)
|
|
return
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// useDirperm checks dirperm1 mount option can be used with the current
|
|
// version of aufs.
|
|
func useDirperm() bool {
|
|
enableDirpermLock.Do(func() {
|
|
base, err := ioutil.TempDir("", "docker-aufs-base")
|
|
if err != nil {
|
|
logger.Errorf("error checking dirperm1: %v", err)
|
|
return
|
|
}
|
|
defer os.RemoveAll(base)
|
|
|
|
union, err := ioutil.TempDir("", "docker-aufs-union")
|
|
if err != nil {
|
|
logger.Errorf("error checking dirperm1: %v", err)
|
|
return
|
|
}
|
|
defer os.RemoveAll(union)
|
|
|
|
opts := fmt.Sprintf("br:%s,dirperm1,xino=/dev/shm/aufs.xino", base)
|
|
if err := unix.Mount("none", union, "aufs", 0, opts); err != nil {
|
|
return
|
|
}
|
|
enableDirperm = true
|
|
if err := Unmount(union); err != nil {
|
|
logger.Errorf("error checking dirperm1: failed to unmount %v", err)
|
|
}
|
|
})
|
|
return enableDirperm
|
|
}
|