@@ -224,7 +224,7 @@ the image's top layer plus a new directory for the container. The image's
224224layers are the ` lowerdirs ` in the overlay and are read-only. The new directory for
225225the container is the ` upperdir ` and is writable.
226226
227- ### Image and container layers on-disk
227+ ### Image and container layers on-disk (legacy overlay driver)
228228
229229The following ` docker pull ` command shows a Docker host downloading a Docker
230230image comprising five layers.
@@ -442,25 +442,25 @@ filesystems:
442442
443443[ ` open(2) ` ] ( https://linux.die.net/man/2/open )
444444: OverlayFS only implements a subset of the POSIX standards.
445- This can result in certain OverlayFS operations breaking POSIX standards. One
446- such operation is the copy-up operation. Suppose that your application calls
447- ` fd1=open("foo", O_RDONLY) ` and then ` fd2=open("foo", O_RDWR) ` . In this case,
448- your application expects ` fd1 ` and ` fd2 ` to refer to the same file. However, due
449- to a copy-up operation that occurs after the second calling to ` open(2) ` , the
450- descriptors refer to different files. The ` fd1 ` continues to reference the file
451- in the image (` lowerdir ` ) and the ` fd2 ` references the file in the container
452- (` upperdir ` ). A workaround for this is to ` touch ` the files which causes the
453- copy-up operation to happen. All subsequent ` open(2) ` operations regardless of
454- read-only or read-write access mode reference the file in the
455- container (` upperdir ` ).
456-
457- ` yum ` is known to be affected unless the ` yum-plugin-ovl ` package is installed.
458- If the ` yum-plugin-ovl ` package is not available in your distribution such as
459- RHEL/CentOS prior to 6.8 or 7.2, you may need to run ` touch /var/lib/rpm/* `
460- before running ` yum install ` . This package implements the ` touch ` workaround
461- referenced above for ` yum ` .
445+ This can result in certain OverlayFS operations breaking POSIX standards. One
446+ such operation is the copy-up operation. Suppose that your application calls
447+ ` fd1=open("foo", O_RDONLY) ` and then ` fd2=open("foo", O_RDWR) ` . In this case,
448+ your application expects ` fd1 ` and ` fd2 ` to refer to the same file. However, due
449+ to a copy-up operation that occurs after the second calling to ` open(2) ` , the
450+ descriptors refer to different files. The ` fd1 ` continues to reference the file
451+ in the image (` lowerdir ` ) and the ` fd2 ` references the file in the container
452+ (` upperdir ` ). A workaround for this is to ` touch ` the files which causes the
453+ copy-up operation to happen. All subsequent ` open(2) ` operations regardless of
454+ read-only or read-write access mode reference the file in the
455+ container (` upperdir ` ).
456+
457+ ` yum ` is known to be affected unless the ` yum-plugin-ovl ` package is installed.
458+ If the ` yum-plugin-ovl ` package is not available in your distribution such as
459+ RHEL/CentOS prior to 6.8 or 7.2, you may need to run ` touch /var/lib/rpm/* `
460+ before running ` yum install ` . This package implements the ` touch ` workaround
461+ referenced above for ` yum ` .
462462
463463[ ` rename(2) ` ] ( https://linux.die.net/man/2/rename )
464464: OverlayFS does not fully support the ` rename(2) ` system call. Your
465- application needs to detect its failure and fall back to a "copy and unlink"
466- strategy.
465+ application needs to detect its failure and fall back to a "copy and unlink"
466+ strategy.
0 commit comments