i have some questions/concerns about the ability to do -v /:.. that just landed today... i want this feature in gh#6733 but I think there's some issue that I don't know if are being addressed
when you mount /, it copies all submounts. so if I'm using aufs, I see all the aufs mount of other containers. the problem though is now those containers that I see their mount, they can't be deleted. because I've effectively remounted the aufs root into my container
alexandr isn't around so I can't ask him to review it
llunved has quit
crosbymichael
darren0: it does look like we are already using rbind
darren0
crosbymichael: am I right to say that if you mount /var your going to shoot yourself in the foot?
on aufs I definitely get other container roots, on btrfs, doesn't seem like so
crosbymichael
maybe you can mount a maybe if we do the mount as private or something like that you will not see the recursive mounts
or could be aufs crazyness
well btrfs does not mount
nolan_d has left the channel
nolan_d joined the channel
darren0
i'm concerned that new ability to mount / is going to mess up a lot of people now as they starting getting a bunch of aufs errors if they ever do mount /
rsampaio_ has quit
crosbymichael: i just tested on devicemapper, you get other container roots if you do -v /var. so same thing as aufs. is there anyway that we can exclude the mounts from other containers, maybe even after rbind you umount?
fss joined the channel
crosbymichael
thinking... ;)
c4milo joined the channel
progrium has quit
darren0
also it seem that when you hit this issue, the root fails to delete, but the container gets unregistered from docker. so the storage just gets orphaned
progrium joined the channel
crosbymichael
darren0: yes, the mounts don't propgate if we don't use rbind
erikh: is that PR ready for review now? nothing going to change?
erikh
I don't think anything's going to change. vieux is reviewing it now too.
crosbymichael
ok
erikh
I'm running docker-stress again
that test nails the real-world problem to the wall, afaict
andrews has quit
llunved joined the channel
umairmufti has quit
progrium has quit
so I figured out the bind race that I was seeing
TIME_WAIT
I feel like such a fool
junsuiji1 has quit
either way, if you stop docker-stress for like a minute and restart it (leaving the daemon up), the allocation issues go away. since this is adjustable with sysctl I don't think it's an issue