You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Docker Desktop with Windows Containers fails with "The media is write protected""
466
+
467
+
#### Error message
468
+
469
+
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
470
+
471
+
#### Cause
472
+
473
+
If you're encountering failures when running Docker Desktop with Windows Containers, it might be due to
474
+
a specific Windows configuration policy: FDVDenyWriteAccess.
475
+
476
+
This policy, when enabled, causes Windows to mount all fixed drives not encrypted by BitLocker-encrypted as read-only.
477
+
This also affects virtual machine volumes and as a result, Docker Desktop may not be able to start or run containers
478
+
correctly because it requires read-write access to these volumes.
479
+
480
+
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
481
+
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
482
+
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
483
+
484
+
#### Solutions
485
+
486
+
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
487
+
ability of Docker to mount volumes correctly, which is critical for container functionality.
488
+
489
+
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
490
+
491
+
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
492
+
493
+
> [!NOTE]
494
+
>
495
+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
Copy file name to clipboardExpand all lines: content/reference/compose-file/services.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2019,6 +2019,12 @@ ulimits:
2019
2019
hard: 40000
2020
2020
```
2021
2021
2022
+
### `use_api_socket`
2023
+
2024
+
When `use_api_socket` is set, the container is able to interact with the underlying container engine through the API socket.
2025
+
Your credentials are mounted inside the container so the container acts as a pure delegate for your commands relating to the container engine.
2026
+
Typically, commands ran by container can `pull` and `push` to your registry.
2027
+
2022
2028
### `user`
2023
2029
2024
2030
`user`overrides the user used to run the container process. The default is set by the image, for example Dockerfile `USER`. If it's not set, then `root`.
0 commit comments