I can confirm that this sis the problem There was a change in docker 1.2.1 (a CVE related fix) that now forces /proc/fs to be mounted read-only
use of the --privileged argument to docker run does allow openafs to run ok, but only at the cost of loosing all of the container isolation! I spent some time trying to work out how to _just_ permit read-write access to the appropriate portion of the /proc/fs filestore, but not cracked it. It is potentially possible to mount the host's /proc/fs/openafs under a different name (with read-write access) within the container - but that would imply a change to the openafs building process.... Obviously I could modify the docker sources, submit a patch etc.. Any suggestions? I'm just wondering if there is any other bits of functionality that the docker folks might have broken this way - looking to see if there we, as a community, are not alone here. Neil On 27 Nov 2015, at 19:06, Charles (Chas) Williams <3ch...@gmail.com> wrote: > On Nov 27, 2015, at 13:42 , Neil Davies wrote: >> After this upgrade I am no longer able, in the container, able to push >> tokens into the kernel - it gives a pioctl. > > Is there any chance you can run an strace on this? > > I believe that /proc was changed to read-only at some point for docker > containers. OpenAFS tries to open /proc/fs/openafs/afs_ioctl read/write > in order to handle pioctl's. > > _______________________________________________ OpenAFS-info mailing list OpenAFS-info@openafs.org https://lists.openafs.org/mailman/listinfo/openafs-info