From 0faee5896d5cd389cb022f6cea050bbf1bfd9443 Mon Sep 17 00:00:00 2001 From: Phil Estes Date: Tue, 15 Dec 2015 14:11:03 -0500 Subject: [PATCH] Remove unecessary chown on mqueue device path This was causing the host /dev/mqueue to be remapped to the daemon's user namespace range root user and group. Given the perms are open on the mqueue path, there is no need to chown this path at all. Docker-DCO-1.1-Signed-off-by: Phil Estes (github: estesp) --- daemon/container_operations_unix.go | 3 --- 1 file changed, 3 deletions(-) diff --git a/daemon/container_operations_unix.go b/daemon/container_operations_unix.go index d61e6cf581..c965cbb66b 100644 --- a/daemon/container_operations_unix.go +++ b/daemon/container_operations_unix.go @@ -888,9 +888,6 @@ func (daemon *Daemon) setupIpcDirs(c *container.Container) error { if err := syscall.Mount("mqueue", mqueuePath, "mqueue", uintptr(syscall.MS_NOEXEC|syscall.MS_NOSUID|syscall.MS_NODEV), ""); err != nil { return fmt.Errorf("mounting mqueue mqueue : %s", err) } - if err := os.Chown(mqueuePath, rootUID, rootGID); err != nil { - return err - } } return nil