https://bugzilla.kernel.org/show_bug.cgi?id=120671 Michael Kerrisk <mtk.manpages@xxxxxxxxx> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution|--- |CODE_FIX --- Comment #9 from Michael Kerrisk <mtk.manpages@xxxxxxxxx> --- (In reply to Michał Zegan from comment #8) > Reopening because I confirmed the fact about filesystems not being > mountable, at least ext2. As I do not know kernel well enough to read > sources, it would be useful to have a list of filesystems that are mountable > but I cannot write it, I only know at least proc, devpts? tmpfs and cgroupv2 > at least if cgroup namespaces are enabled. All my words have to be verified > to make sure i am not wrong. Also someone should find any other restrictions > user namespaces impose if they exist because I do not know any. Ahhh -- now I'm with you. I was a bit confused in my thinking before. Searching for FS_USERNS_MOUNT tells us which filesystems can be mounted with CAP_SYS_ADMIN in a (noninitial) userns. I added the following text to the page: Holding CAP_SYS_ADMIN within a (noninitial) user namespace allows the creation of bind mounts, and mounting of the follow‐ ing types of filesystems: * /proc (since Linux 3.8) * /sys (since Linux 3.8) * devpts (since Linux 3.9) * tmpfs (since Linux 3.9) * ramfs (since Linux 3.9) * mqueue (since Linux 3.9) * bpf (since Linux 4.4) Note however, that mounting block-based filesystems can be done only by a process that holds CAP_SYS_ADMIN in the initial user namespace. > One comment: not sure why I can losetup from userns, like is it because I > have rw on loop0 as root is mapped to new userns root, or does it check > CAP_SYS_ADMIN in the new userns, or both? Not sure. But if you work out all the details, let me know. Thanks, Michael -- You are receiving this mail because: You are watching the assignee of the bug.-- To unsubscribe from this list: send the line "unsubscribe linux-man" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html