From 9292cbb1c356ae229ee32e4ad8afb554eca9d8ca Mon Sep 17 00:00:00 2001 From: Christian Brauner Date: Tue, 7 Jun 2022 15:38:18 +0200 Subject: [PATCH] mount_setattr.2: update conditions to create ID-mapped mounts Newer kernels in principle support the creation of ID-mapped mounts for filesystems mountable in non-initial user namespaces. Currently, no such filesystem has been ported to support this though. But we should nonetheless update the conditions. Signed-off-by: Christian Brauner (Microsoft) Signed-off-by: Alejandro Colomar --- man2/mount_setattr.2 | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/man2/mount_setattr.2 b/man2/mount_setattr.2 index efcfa02adf..831f09d278 100644 --- a/man2/mount_setattr.2 +++ b/man2/mount_setattr.2 @@ -632,10 +632,11 @@ The following conditions must be met in order to create an ID-mapped mount: .IP \(bu 3 The caller must have the .B CAP_SYS_ADMIN -capability in the initial user namespace. -.IP \(bu -The filesystem must be mounted in a mount namespace -that is owned by the initial user namespace. +capability in the user namespace the filesystem was mounted in. +.\" commit bd303368b776eead1c29e6cdda82bde7128b82a7 +.\" Christian Brauner +.\" Note, currently no filesystems mountable in non-initial user namespaces +.\" support ID-mapped mounts. .IP \(bu The underlying filesystem must support ID-mapped mounts. Currently, the -- 2.47.2