Skip to content

Commit ec7af62

Browse files
committed
wishlist: mark "Allow creating idmapped mounts from idmapped mounts" as done
Signed-off-by: Christian Brauner <[email protected]>
1 parent 952e2b6 commit ec7af62

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -375,7 +375,9 @@ user namespace. But this doesn't just lock a single mount or mount subtree
375375
it locks all mounts in the mount namespace, i.e., the mount table cannot be
376376
altered.
377377

378-
### Add `OPEN_TREE_CLEAR` flag to `open_tree()`
378+
### Allow creating idmapped mounts from idmapped mounts
379+
380+
[x] Allow creating idmapped mounts from idmapped mounts
379381

380382
Add a new `OPEN_TREE_CLEAR` flag to `open_tree()` that can only be
381383
used in conjunction with `OPEN_TREE_CLONE`. When specified it will clear
@@ -391,6 +393,8 @@ This is useful to get a new, clear mount and also allows the caller to
391393
create a new detached mount with an idmapping attached to the mount. Iow,
392394
the caller may idmap the mount afterwards.
393395

396+
**🙇 `c4a16820d901 ("fs: add open_tree_attr()")` 🙇**
397+
394398
**Use-Case:** A user may already use an idmapped mount for their home
395399
directory. And once a mount has been idmapped the idmapping cannot be
396400
changed anymore. This allows for simple semantics and allows to avoid

0 commit comments

Comments
 (0)