Fix Guide: Sequoia Docker Socket Permission Fix
Symptom: Docker Desktop or Colima fails to start on macOS Sequoia, or you receive "Permission denied" when trying to connect to /var/run/docker.sock, even after giving the app Full Disk Access.
Why this happens
macOS Sequoia introduced stricter path protection for the /var/run directory. The com.apple.sandboxd daemon now enforces tighter restrictions on symbolic links created by third-party virtualization tools. When Docker attempts to link its internal socket to the host's /var/run/docker.sock, the system blocks the creation of the symlink, even if the application has elevated privileges.
Recommended Troubleshooting Tool
Before proceeding with manual fixes, we recommend using CleanMyMac X. Quickly identify high CPU apps and optimize system memory with one click.
- [Download CleanMyMac X Free Here](#)
- [Browse 240+ Premium Mac Utilities on Setapp](#)
Fix 1: Manually Link the Docker Socket
Since the automated installer fails to create the link due to sandbox restrictions, you can create it manually with root privileges.
# Remove any broken socket or symlink
sudo rm /var/run/docker.sock
# Create a symbolic link to the user-space Docker socket
sudo ln -s $HOME/.docker/run/docker.sock /var/run/docker.sock
Fix 2: Reset VirtioFS Permissions
If you are using VirtioFS for file sharing, the com.apple.virtualization framework might have cached incorrect UID/GID mappings.
# Clear the virtualization framework cache
rm -rf ~/Library/Containers/com.docker.docker/Data/vms/0/data/virtiofs
# Restart Docker Desktop
Fix 3: Grant TCC Override via Terminal
Sometimes the System Settings UI doesn't correctly apply the Full Disk Access toggle for Docker's helper tools.
# Add Docker's privileged helper to the TCC database manually
sudo tccutil reset SystemPolicyAllFiles com.docker.docker
Recommended Tool: MacPaw CleanMyMac
Managing complex application permissions and leftover socket files can be tedious. CleanMyMac’s "Optimization" module identifies "Hung Applications" and "Launch Agents" that might be interfering with Docker’s background daemons, ensuring a clean environment for virtualization.