Using a user space program for solving this problem is like using a
user space unionfs. Another point: currently aufs can be used by
docker to construct a container fs (as I can understand from a news).
And ability to escape from conrainer is a security hole because
application can open a file which root is outside of the container.
This is the problem I speak about. aufs perform a inode translation.
But don't have a file path translation layer. Kernel routine d_path
return a real path for a file located inside union. Example:
/mnt/union
/branch_rw
/branch_ro
mount -t aufs o dirs=/branch_rw=rw,/branch_ro=ro none /mnt/union
For the file README.txt in /branch_ro opened by program from
/mnt/union/README.txt a path returned by a kernel d_path will be
/branch_ro/README.txt and not a /mnt/union/README.txt
Is a path translation layer implemented by current version of aufs?

PS: vfs magic for files inside union differ too


2014-07-17 7:02 GMT+04:00, sf...@users.sourceforge.net
<sf...@users.sourceforge.net>:
>
> Sergey Korshunoff:
>> I will try to explain the problem. A file from a union have a path
>> which don't point inside a union. Insteed a file path is a real path
>> to the file inside a branch. Checkpoint/restore can not deal with
>> this. I solved a problen by using a user space bind  utility (fuse
>> bindfs). Using "mount -o bind UNIONS /vz/private/XXX" don't helped.
>
> Still I don't understand what you wrote.
> Can I totally ignore your report since your problem is already solved?
> Why don't you post the necessary information descirbed in aufs README
> file?
>
>
> J. R. Okajima
>

------------------------------------------------------------------------------
Want fast and easy access to all the code in your enterprise? Index and
search up to 200,000 lines of code with a free copy of Black Duck
Code Sight - the same software that powers the world's largest code
search on Ohloh, the Black Duck Open Hub! Try it now.
http://p.sf.net/sfu/bds

Reply via email to