Hi Kir, On 6/29/21 11:57 PM, Kir Kolyshkin wrote: > Signed-off-by: Kir Kolyshkin <kolyshkin@xxxxxxxxx> I applied all 3 patches in this series (and some minor tweaks). Thanks, Alex > --- > man7/capabilities.7 | 6 ++++++ > man7/user_namespaces.7 | 6 ++++++ > 2 files changed, 12 insertions(+) > > diff --git a/man7/capabilities.7 b/man7/capabilities.7 > index 9f8f0087f..2f9c9a61e 100644 > --- a/man7/capabilities.7 > +++ b/man7/capabilities.7 > @@ -349,6 +349,12 @@ write a group ID mapping in a user namespace (see > .TP > .BR CAP_SETFCAP " (since Linux 2.6.24)" > Set arbitrary capabilities on a file. > +.IP > +.\" commit db2e718a47984b9d71ed890eb2ea36ecf150de18 > +Since Linux 5.12, this capability is > +also needed to map uid 0 (as in > +.BR unshare\ -Ur , > +.RB see unshare (1). > .TP > .B CAP_SETPCAP > If file capabilities are supported (i.e., since Linux 2.6.24): > diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7 > index 518e7a3bb..3378b6057 100644 > --- a/man7/user_namespaces.7 > +++ b/man7/user_namespaces.7 > @@ -577,6 +577,12 @@ or be in the parent user namespace of the process > The mapped user IDs (group IDs) must in turn have a mapping > in the parent user namespace. > .IP 4. > +.\" commit db2e718a47984b9d71ed890eb2ea36ecf150de18 > +If a writing process is root (i.e. UID 0) trying to map host user ID 0, > +it must have > +.B CAP_SETFCAP > +capability (since Linux 5.12). > +.IP 5. > One of the following two cases applies: > .RS > .IP * 3 > -- Alejandro Colomar Linux man-pages comaintainer; https://www.kernel.org/doc/man-pages/ http://www.alejandro-colomar.es/