diff options
author | Daniel J Walsh <dwalsh@redhat.com> | 2019-01-14 09:53:37 -0500 |
---|---|---|
committer | Daniel J Walsh <dwalsh@redhat.com> | 2019-01-14 09:53:37 -0500 |
commit | 65e947e11198f2f9eb2b2edca0c0e5c648e722d5 (patch) | |
tree | 3bd963f9b269c6c17e9560eca56645fdcb2c8f30 /troubleshooting.md | |
parent | 264d0821068c26daae9b2e57bb8ea34dac79e62a (diff) | |
download | podman-65e947e11198f2f9eb2b2edca0c0e5c648e722d5.tar.gz podman-65e947e11198f2f9eb2b2edca0c0e5c648e722d5.tar.bz2 podman-65e947e11198f2f9eb2b2edca0c0e5c648e722d5.zip |
Add local storage.conf example to troubleshoot
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'troubleshooting.md')
-rw-r--r-- | troubleshooting.md | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/troubleshooting.md b/troubleshooting.md index ac3335da0..d210d85df 100644 --- a/troubleshooting.md +++ b/troubleshooting.md @@ -161,3 +161,15 @@ standard_init_linux.go:203: exec user process caused "permission denied" #### Solution Since the administrator of the system setup your home directory to be noexec, you will not be allowed to execute containers from storage in your home directory. It is possible to work around this by manually specifying a container storage path that is not on a noexec mount. Simply copy the file /etc/containers/storage.conf to ~/.config/containers/ (creating the directory if necessary). Specify a graphroot directory which is not on a noexec mount point and to which you have read/write privileges. You will need to modify other fields to writable directories as well. + +For example + +``` +cat ~/.config/containers/storage.conf +[storage] + driver = "overlay" + runroot = "/run/user/1000" + graphroot = "/execdir/myuser/storage" + [storage.options] + mount_program = "/bin/fuse-overlayfs" +``` |