Skip to content

Commit 0cad2fe

Browse files
authored
Merge pull request #24428 from dvdksn/fix/issue-18191-overlayfs-duplicate-sections
docs: fix duplicate headings in overlayfs driver page
2 parents b951e92 + f2ef462 commit 0cad2fe

1 file changed

Lines changed: 20 additions & 20 deletions

File tree

content/manuals/engine/storage/drivers/overlayfs-driver.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ the image's top layer plus a new directory for the container. The image's
224224
layers are the `lowerdirs` in the overlay and are read-only. The new directory for
225225
the container is the `upperdir` and is writable.
226226

227-
### Image and container layers on-disk
227+
### Image and container layers on-disk (legacy overlay driver)
228228

229229
The following `docker pull` command shows a Docker host downloading a Docker
230230
image comprising five layers.
@@ -442,25 +442,25 @@ filesystems:
442442

443443
[`open(2)`](https://linux.die.net/man/2/open)
444444
: OverlayFS only implements a subset of the POSIX standards.
445-
This can result in certain OverlayFS operations breaking POSIX standards. One
446-
such operation is the copy-up operation. Suppose that your application calls
447-
`fd1=open("foo", O_RDONLY)` and then `fd2=open("foo", O_RDWR)`. In this case,
448-
your application expects `fd1` and `fd2` to refer to the same file. However, due
449-
to a copy-up operation that occurs after the second calling to `open(2)`, the
450-
descriptors refer to different files. The `fd1` continues to reference the file
451-
in the image (`lowerdir`) and the `fd2` references the file in the container
452-
(`upperdir`). A workaround for this is to `touch` the files which causes the
453-
copy-up operation to happen. All subsequent `open(2)` operations regardless of
454-
read-only or read-write access mode reference the file in the
455-
container (`upperdir`).
456-
457-
`yum` is known to be affected unless the `yum-plugin-ovl` package is installed.
458-
If the `yum-plugin-ovl` package is not available in your distribution such as
459-
RHEL/CentOS prior to 6.8 or 7.2, you may need to run `touch /var/lib/rpm/*`
460-
before running `yum install`. This package implements the `touch` workaround
461-
referenced above for `yum`.
445+
This can result in certain OverlayFS operations breaking POSIX standards. One
446+
such operation is the copy-up operation. Suppose that your application calls
447+
`fd1=open("foo", O_RDONLY)` and then `fd2=open("foo", O_RDWR)`. In this case,
448+
your application expects `fd1` and `fd2` to refer to the same file. However, due
449+
to a copy-up operation that occurs after the second calling to `open(2)`, the
450+
descriptors refer to different files. The `fd1` continues to reference the file
451+
in the image (`lowerdir`) and the `fd2` references the file in the container
452+
(`upperdir`). A workaround for this is to `touch` the files which causes the
453+
copy-up operation to happen. All subsequent `open(2)` operations regardless of
454+
read-only or read-write access mode reference the file in the
455+
container (`upperdir`).
456+
457+
`yum` is known to be affected unless the `yum-plugin-ovl` package is installed.
458+
If the `yum-plugin-ovl` package is not available in your distribution such as
459+
RHEL/CentOS prior to 6.8 or 7.2, you may need to run `touch /var/lib/rpm/*`
460+
before running `yum install`. This package implements the `touch` workaround
461+
referenced above for `yum`.
462462

463463
[`rename(2)`](https://linux.die.net/man/2/rename)
464464
: OverlayFS does not fully support the `rename(2)` system call. Your
465-
application needs to detect its failure and fall back to a "copy and unlink"
466-
strategy.
465+
application needs to detect its failure and fall back to a "copy and unlink"
466+
strategy.

0 commit comments

Comments
 (0)