From dbdbe7361228494a6b0d5ddd8e693ca9134558f7 Mon Sep 17 00:00:00 2001 From: Phil Estes Date: Tue, 15 Dec 2015 14:11:03 -0500 Subject: [PATCH] Remove unecessary chown on mqueue device path This was causing the host /dev/mqueue to be remapped to the daemon's user namespace range root user and group. Given the perms are open on the mqueue path, there is no need to chown this path at all. Docker-DCO-1.1-Signed-off-by: Phil Estes (github: estesp) Upstream-commit: 0faee5896d5cd389cb022f6cea050bbf1bfd9443 Component: engine --- components/engine/daemon/container_operations_unix.go | 3 --- 1 file changed, 3 deletions(-) diff --git a/components/engine/daemon/container_operations_unix.go b/components/engine/daemon/container_operations_unix.go index d61e6cf581..c965cbb66b 100644 --- a/components/engine/daemon/container_operations_unix.go +++ b/components/engine/daemon/container_operations_unix.go @@ -888,9 +888,6 @@ func (daemon *Daemon) setupIpcDirs(c *container.Container) error { if err := syscall.Mount("mqueue", mqueuePath, "mqueue", uintptr(syscall.MS_NOEXEC|syscall.MS_NOSUID|syscall.MS_NODEV), ""); err != nil { return fmt.Errorf("mounting mqueue mqueue : %s", err) } - if err := os.Chown(mqueuePath, rootUID, rootGID); err != nil { - return err - } } return nil