-
Notifications
You must be signed in to change notification settings - Fork 18.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[1.11-rc2] Read-only /proc/sys
breaks compatibility
#21649
Comments
/proc/sys
breaks compatibility/proc/sys
breaks compatibility
@errordeveloper since you are a privileged container is it feasible for you to use umount |
@crosbymichael Code similar to @errordeveloper's is in Weave Net. It is technically possible for us to remount the fs, but that requires a) us to make a change and publish new images, and b) all our users to upgrade to these new images in order to run Docker 1.11. I image there might be other images out there with similar code that might be harder to change. |
@rade thanks. I'll see if we can find a better solution for this. |
@rade Thanks for your input. In agree we requirement a), but I don't quite understand b): I believe the modification to that script wouldn't have any negative impact for users using a version older than 1.11. |
That is correct. The script is embedded in a docker image, which is part of what makes up a Weave Net release. Any user running a current or previously released version of Weave Net will encounter an error when they upgrade to Docker 1.11. |
@rade Oh sorry I see, you meant "upgrade (that is: repull) the image", not "upgrade to Docker 1.11". Yes then I agree 😉 |
Yes. I have updated my comment to clarify. |
Looks like this is currently blocked on changes in the OCI specs; opencontainers/runtime-spec#320 |
This impacts me too, although remount rw is probably not a big deal. But in general a read-only |
As I've been testing rc3 more, this is coming up more than I thought. I think it should be considered breaking compatibility. |
What's the reasoning behind this? Why would something in proc be ro if it's a privileged system. Also if I add NET_ADMIN on a non-privileged container, will I get a writeable |
@ibuildthecloud given that the pull request was not yet accepted in opencontainers, we didn't want to delay RC3 to allow people testing other fixes, and plan to include the fix in the next RC |
@thaJeztah Thanks! |
@thaJeztah @crosbymichael Is there a PR somewhere I can pull to fix this? This is blocking me from more widely deploying 1.11 to test. |
PR's for the specs, and runC were merged; opencontainers/runtime-spec#364 opencontainers/runc#716. I think it needs to be bumped in the Dockerfiles in this repository to use those changes |
@thaJeztah As always, Thanks! |
I'm running into another flavor of this issue. Its related to /proc/fs mounted ro. When running daemon with aufs on privileged containers, umount of the inner container (eg docker stop) results in auplink error (which is behaviourally only a warning) .
The error is because auplink attempts to write to /proc/fs/aufs/plink_maint, but fails because its not mounted rw. Remounting as rw fixes the issue. |
Output of
docker version
:Output of
docker info
:Steps to reproduce the issue:
--privileged
and try changing settings oneth0
interfaceDescribe the results you received:
Not able to changing network interface settings.
Describe the results you expected:
Expected to work. Used to work up to 1.10.
Additional information you deem important (e.g. issue happens only occasionally):
This breaks compatibility with all prior releases.
The text was updated successfully, but these errors were encountered: