public inbox for linux-unionfs@vger.kernel.org
 help / color / mirror / Atom feed
From: Gao Xiang <hsiangkao@linux.alibaba.com>
To: Amir Goldstein <amir73il@gmail.com>, Miklos Szeredi <miklos@szeredi.hu>
Cc: Alexander Larsson <alexl@redhat.com>, linux-unionfs@vger.kernel.org
Subject: Re: [PATCH v2 4/5] ovl: Support creation of whiteout files on overlayfs
Date: Fri, 8 Sep 2023 10:21:13 +0800	[thread overview]
Message-ID: <3e5c0260-53fe-4955-b77e-ab79282556d3@linux.alibaba.com> (raw)
In-Reply-To: <CAOQ4uxioDBiKH267ijR5VOXzStwkOvYGrjMGtP26x0LJR0oWAg@mail.gmail.com>

Hi folks,

On 2023/8/23 01:29, Amir Goldstein wrote:
> On Tue, Aug 22, 2023 at 7:19 PM Miklos Szeredi <miklos@szeredi.hu> wrote:

...

>>
> 
> I proposed to look at the two features independently:
> 1. Nesting of overlayfs xattrs (patch 3/5)
> 2. Alternative format for whiteout (overlay.whiteout) that can be used
>     by container tools converting OCI/tar images to overlayfs images
> 
> Together, they provide a solution to Alexander's use case.
> 
> IIUC, the way this is intended to work is that mkfs.composefs
> is running inside a container, whose work directory is overlayfs
> and it composes some lower layers on that host mounted overlayfs.
> 
> mkfs.composefs composes layers with overlay.{metacopy,whiteout,redirect}
> xattrs (up to here it is standard mkfs.composefs) and because those layers
> are stored in overlayfs, the xattrs are stored in the host fs as
> overlay.overlay.*.
> 
> I hope I got the use case correctly?
Sorry for the dumb questions below.  I'm interested in the use cases:
after checking the previous github issue and emails (sorry if I'm
still missing something), I'm curious about this too.

I totally understand how it plans to work and how it works (by using
escape xattr prefixes) but I'm not sure if I'm quite understand the
original issue:

Do composefs use cases store overlayfs xattrs in the meta-only layer?
if so, such layer is actually hand-crafted by mkfs.  Why do we need
a way to keep escape xattrs on the underlay overlayfs?  Does the
other layer are data-only layers (do we keep some overlay xattrs in
these data-only layers)?

Thanks,
Gao Xiang

  reply	other threads:[~2023-09-08  2:21 UTC|newest]

Thread overview: 47+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-08-17 11:05 [PATCH v2 0/5] Support nested overlayfs mounts Alexander Larsson
2023-08-17 11:05 ` [PATCH v2 1/5] ovl: Move xattr support to new xattrs.c file Alexander Larsson
2023-08-17 12:48   ` Amir Goldstein
2023-08-17 11:05 ` [PATCH v2 2/5] ovl: Add OVL_XATTR_TRUSTED/USER_PREFIX_LEN macros Alexander Larsson
2023-08-17 12:48   ` Amir Goldstein
2023-08-17 11:05 ` [PATCH v2 3/5] ovl: Support escaped overlay.* xattrs Alexander Larsson
2023-08-17 14:31   ` Amir Goldstein
2023-08-17 15:00     ` Alexander Larsson
2023-08-17 11:05 ` [PATCH v2 4/5] ovl: Support creation of whiteout files on overlayfs Alexander Larsson
2023-08-17 13:40   ` Amir Goldstein
2023-08-21 10:59   ` Miklos Szeredi
2023-08-21 12:55     ` Alexander Larsson
2023-08-21 13:25       ` Amir Goldstein
2023-08-21 15:31         ` Alexander Larsson
2023-08-21 15:40           ` Miklos Szeredi
2023-08-21 20:07             ` Alexander Larsson
2023-08-22 13:22     ` Alexander Larsson
2023-08-22 13:56       ` Miklos Szeredi
2023-08-22 14:25         ` Alexander Larsson
2023-08-22 14:36           ` Alexander Larsson
2023-08-22 15:02             ` Miklos Szeredi
2023-08-22 15:31               ` Alexander Larsson
2023-08-22 15:30             ` Amir Goldstein
2023-08-22 15:43               ` Alexander Larsson
2023-08-22 15:57                 ` Amir Goldstein
2023-08-22 16:18                   ` Miklos Szeredi
2023-08-22 17:29                     ` Amir Goldstein
2023-09-08  2:21                       ` Gao Xiang [this message]
     [not found]                         ` <CAL7ro1EsjzNeYAbjPN3HnB7Sq4D48my3PGhPG5L+4DTXzA9xFw@mail.gmail.com>
2023-09-08  8:44                           ` Gao Xiang
2023-08-23  8:51                   ` Alexander Larsson
2023-08-23 13:13               ` Alexander Larsson
2023-08-23 13:21                 ` Alexander Larsson
2023-08-23 14:42                 ` Amir Goldstein
2023-08-23 14:52                   ` Miklos Szeredi
2023-08-23 15:02                     ` Alexander Larsson
2023-08-23 15:50                     ` Amir Goldstein
2023-08-24  9:56                       ` Alexander Larsson
2023-08-24 11:43                         ` Amir Goldstein
2023-08-24 14:22                           ` Alexander Larsson
2023-08-25  8:40                             ` Amir Goldstein
2023-08-25 11:29                               ` Alexander Larsson
2023-08-25 14:39                                 ` Amir Goldstein
2023-08-23 14:50                 ` Alexander Larsson
2023-08-17 11:05 ` [PATCH v2 5/5] ovl: Add documentation on nesting of overlayfs mounts Alexander Larsson
2023-08-17 13:31   ` Amir Goldstein
2023-08-17 13:59     ` Alexander Larsson
2023-08-17 14:45 ` [PATCH v2 0/5] Support nested " Amir Goldstein

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3e5c0260-53fe-4955-b77e-ab79282556d3@linux.alibaba.com \
    --to=hsiangkao@linux.alibaba.com \
    --cc=alexl@redhat.com \
    --cc=amir73il@gmail.com \
    --cc=linux-unionfs@vger.kernel.org \
    --cc=miklos@szeredi.hu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox