summaryrefslogtreecommitdiffhomepage
path: root/g3doc/user_guide/FAQ.md
diff options
context:
space:
mode:
Diffstat (limited to 'g3doc/user_guide/FAQ.md')
-rw-r--r--g3doc/user_guide/FAQ.md28
1 files changed, 16 insertions, 12 deletions
diff --git a/g3doc/user_guide/FAQ.md b/g3doc/user_guide/FAQ.md
index 9eb9f4501..89df65e99 100644
--- a/g3doc/user_guide/FAQ.md
+++ b/g3doc/user_guide/FAQ.md
@@ -63,7 +63,8 @@ not realize a new file was copied to a given directory. To invalidate the cache
and force a refresh, create a file under the directory in question and list the
contents again.
-As a workaround, shared root filesystem can be enabled. See [Filesystem][filesystem].
+As a workaround, shared root filesystem can be enabled. See
+[Filesystem][filesystem].
This bug is tracked in [bug #4](https://gvisor.dev/issue/4).
@@ -82,13 +83,16 @@ sudo chmod 0755 /usr/local/bin/runsc
### I'm getting an error like `mount submount "/etc/hostname": creating mount with source ".../hostname": input/output error: unknown.` {#memlock}
-There is a bug in Linux kernel versions 5.1 to 5.3.15, 5.4.2, and 5.5. Upgrade to a newer kernel or add the following to `/lib/systemd/system/containerd.service` as a workaround.
+There is a bug in Linux kernel versions 5.1 to 5.3.15, 5.4.2, and 5.5. Upgrade
+to a newer kernel or add the following to
+`/lib/systemd/system/containerd.service` as a workaround.
```
LimitMEMLOCK=infinity
```
-And run `systemctl daemon-reload && systemctl restart containerd` to restart containerd.
+And run `systemctl daemon-reload && systemctl restart containerd` to restart
+containerd.
See [issue #1765](https://gvisor.dev/issue/1765) for more details.
@@ -97,18 +101,18 @@ See [issue #1765](https://gvisor.dev/issue/1765) for more details.
This is normally indicated by errors like `bad address 'container-name'` when
trying to communicate to another container in the same network.
-Docker user defined bridge uses an embedded DNS server bound to the loopback
+Docker user defined bridge uses an embedded DNS server bound to the loopback
interface on address 127.0.0.10. This requires access to the host network in
-order to communicate to the DNS server. runsc network is isolated from the
-host and cannot access the DNS server on the host network without breaking the
+order to communicate to the DNS server. runsc network is isolated from the host
+and cannot access the DNS server on the host network without breaking the
sandbox isolation. There are a few different workarounds you can try:
-* Use default bridge network with `--link` to connect containers. Default
- bridge doesn't use embedded DNS.
-* Use [`--network=host`][host-net] option in runsc, however beware that it will
- use the host network stack and is less secure.
-* Use IPs instead of container names.
-* Use [Kubernetes][k8s]. Container name lookup works fine in Kubernetes.
+* Use default bridge network with `--link` to connect containers. Default
+ bridge doesn't use embedded DNS.
+* Use [`--network=host`][host-net] option in runsc, however beware that it
+ will use the host network stack and is less secure.
+* Use IPs instead of container names.
+* Use [Kubernetes][k8s]. Container name lookup works fine in Kubernetes.
[security-model]: /docs/architecture_guide/security/
[host-net]: /docs/user_guide/networking/#network-passthrough