Skip to content

Commit 7a9ab0a

Browse files
aevesdockeraheck
andauthored
publish updates from main (#22892)
Automated pull request for publishing docs updates. --------- Co-authored-by: Allie Sadler <[email protected]> Co-authored-by: Andreas Heck <[email protected]> Co-authored-by: aevesdocker <[email protected]>
2 parents 985104e + 15654dd commit 7a9ab0a

File tree

2 files changed

+38
-0
lines changed
  • content

2 files changed

+38
-0
lines changed

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -462,6 +462,38 @@ The Virtual Machine Management Service failed to start the virtual machine 'Dock
462462

463463
Try [enabling nested virtualization](/manuals/desktop/setup/vm-vdi.md#turn-on-nested-virtualization).
464464

465+
### Docker Desktop with Windows Containers fails with "The media is write protected""
466+
467+
#### Error message
468+
469+
`FSCTL_EXTEND_VOLUME \\?\Volume{GUID}: The media is write protected`
470+
471+
#### Cause
472+
473+
If you're encountering failures when running Docker Desktop with Windows Containers, it might be due to
474+
a specific Windows configuration policy: FDVDenyWriteAccess.
475+
476+
This policy, when enabled, causes Windows to mount all fixed drives not encrypted by BitLocker-encrypted as read-only.
477+
This also affects virtual machine volumes and as a result, Docker Desktop may not be able to start or run containers
478+
correctly because it requires read-write access to these volumes.
479+
480+
FDVDenyWriteAccess is a Windows Group Policy setting that, when enabled, prevents write access to fixed data drives that are not protected
481+
by BitLocker. This is often used in security-conscious environments but can interfere with development tools like Docker.
482+
In the Windows registry it can be found at `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess`.
483+
484+
#### Solutions
485+
486+
Docker Desktop does not support running Windows Containers on systems where FDVDenyWriteAccess is enabled. This setting interferes with the
487+
ability of Docker to mount volumes correctly, which is critical for container functionality.
488+
489+
To use Docker Desktop with Windows Containers, ensure that FDVDenyWriteAccess is disabled. You can check and change this setting in the registry or through Group Policy Editor (`gpedit.msc`) under:
490+
491+
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Fixed Data Drives** > **Deny write access to fixed drives not protected by BitLocker**
492+
493+
> [!NOTE]
494+
>
495+
> Modifying Group Policy settings may require administrator privileges and should comply with your organization's IT policies. If the setting gets reset after some time this usually means that it was overriden by the centralized configuration of your IT department. Talk to them before making any changes.
496+
465497
### `Docker Desktop Access Denied` error message when starting Docker Desktop
466498

467499
#### Error message

content/reference/compose-file/services.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2019,6 +2019,12 @@ ulimits:
20192019
hard: 40000
20202020
```
20212021

2022+
### `use_api_socket`
2023+
2024+
When `use_api_socket` is set, the container is able to interact with the underlying container engine through the API socket.
2025+
Your credentials are mounted inside the container so the container acts as a pure delegate for your commands relating to the container engine.
2026+
Typically, commands ran by container can `pull` and `push` to your registry.
2027+
20222028
### `user`
20232029

20242030
`user` overrides the user used to run the container process. The default is set by the image, for example Dockerfile `USER`. If it's not set, then `root`.

0 commit comments

Comments
 (0)