Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test Mount manager #6

Open
wants to merge 18 commits into
base: main
Choose a base branch
from
Open

Test Mount manager #6

wants to merge 18 commits into from

Conversation

dmcgowan
Copy link
Owner

@dmcgowan dmcgowan commented Dec 7, 2024

For testing and early feedback

I'll open a draft in main repo once I have a first draft of documentation written and some integration.

Still needs:

  • API definition and bindings
  • Integration with client and CRI
  • Documentation
  • GC tests
  • Info/Update/List implementation

Note:
I am thinking the best point of integration is directly in the client and CRI. Integrating in the task manager would make it hard to track the mount for garbage collection since it would need the ID passed all the way through. We should also activate the mounts before doing any other sort of mount processing in the task manager.

{
Type: "xfs",
Source: b1,
Options: []string{"loop"},
Copy link

@hsiangkao hsiangkao Dec 19, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one important thing I just have thought out is that
If one of the design goals is "to avoid snapshotters to mount filesystems theirselves", so that "mounts[] will be passed to mount handlers to parse".

If my understanding above is correct: I guess loop should not be decided by the snapshotter itself since (take EROFS for example):
[runC] for linux versions without file-backed mounts (typically Linux < 6.12, but I think we should also consider this feature could be backported to old downstream kernel versions): we should try to mount files with file-backed mounts, if -ENOTBLK is returned, use loopback devices; also see util-linux mount logic:
https://github.com/util-linux/util-linux/pull/3317/files#diff-ae74bd215cd470d68e72bf40ebc5f300c9aa5a2f9f1b0ed8ca8b4d519b25ebc6R1088
[runC] for linux versions with file-backed mounts: we should try to mount files with file-backed mounts, it should mount succeed;
[secure containers like Kata]: we should use virtio-blk to pass through files rather than generating loops too;
[gVisor]: they should mount files directly.

So I think the same file should be handled according to different shims, like runc-shim and kata-shim, etc.

And the file might be better to be parsed as:

[]mount.Mount{
   {
           Type: "erofs",
           Source: <fsmeta>
           Options: []string {
                "device=<layer0>,device=<layer1>,...,device=<layern-1>
           }
    },

, , ... are all files, it's up to mount managers to decide how to setup devices to mount these....

@dmcgowan dmcgowan force-pushed the mount-manager branch 5 times, most recently from 2c3d9f1 to 527104d Compare March 7, 2025 18:57
dmcgowan added 18 commits March 10, 2025 15:52
Signed-off-by: Derek McGowan <[email protected]>
Signed-off-by: Derek McGowan <[email protected]>
Signed-off-by: Derek McGowan <[email protected]>
Signed-off-by: Derek McGowan <[email protected]>
Signed-off-by: Derek McGowan <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants