Package: util-linux / 2.41.3-3

Metadata

Package Version Patches format
util-linux 2.41.3-3 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
debian/man getopt examples.patch | (download)

misc-utils/getopt.1 | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 util-linux: getopt(1) should point to where examples are on a debian
 system

Debian BTS #913049

debian/verbose tests.patch | (download)

tests/Makemodule.am | 2 1 + 1 - 0 !
tests/functions.sh | 11 11 + 0 - 0 !
2 files changed, 12 insertions(+), 1 deletion(-)

 verbose-tests

Enable verbose tests and print content of failing tests output file.

debian/hardlink tests known failed.patch | (download)

tests/ts/hardlink/options | 3 3 + 0 - 0 !
1 file changed, 3 insertions(+)

 hardlink tests: set known failed

sha256 cannot be initialized on some archs / buildds.

debian/lsfd usrbin.patch | (download)

lsfd-cmd/Makemodule.am | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 install lsfd into /usr/bin


debian/sensible pager.patch | (download)

lib/pager.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 use sensible-pager

Closes: #1014368

debian/login support LOG_OK_LOGINS.patch | (download)

login-utils/login.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 login: support log_ok_logins


debian/login do not print motd done by PAM.patch | (download)

login-utils/login.c | 2 0 + 2 - 0 !
1 file changed, 2 deletions(-)

 login: do not print motd, done by pam


debian/login turn off btmp utmp lastlog writing.patch | (download)

login-utils/login.c | 4 0 + 4 - 0 !
1 file changed, 4 deletions(-)

 login: turn off btmp, utmp, lastlog writing

Should be done by PAM instead. login from src:shadow had turned it off, especially with --enable-logind.

debian/salsa ci skip tests.patch | (download)

tests/ts/fadvise/drop | 4 4 + 0 - 0 !
1 file changed, 4 insertions(+)

 skip fadvise/drop test in salsa ci


upstream/ldattach Allow changing the MTU for GSM0710 framing.patch | (download)

bash-completion/ldattach | 5 5 + 0 - 0 !
sys-utils/ldattach.8.adoc | 5 4 + 1 - 0 !
sys-utils/ldattach.c | 21 13 + 8 - 0 !
3 files changed, 22 insertions(+), 9 deletions(-)

 ldattach: allow changing the mtu for gsm0710 framing

Traditionally ldattach have hard coded MTU of 127 bytes
upstream/libfdisk modernize ZFS GPT type description.patch | (download)

include/pt-gpt-partnames.h | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 libfdisk: modernize zfs gpt type description
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

The GPT type GUID 6A898CC3-1DD2-11B2-99A6-080020736631 is currently
described as "Solaris /usr & Apple ZFS". This reflects early Solaris
and Apple experiments with ZFS, but today the same GUID is widely used
by OpenZFS implementations on Linux, illumos, FreeBSD, and other
platforms to mark ZFS pool member partitions.

Apple's ZFS work was discontinued long ago, while OpenZFS has become
the actively maintained and de facto standard implementation. Update
the human-readable description to the simpler and more accurate:

    "ZFS pool member"

A short comment is added to note the GUIDs historical Solaris /usr
origin and its brief use by Apple. Only the description string is
changed; the GUID itself and its semantics remain unchanged.

upstream/unshare add owner to set user namespace owner uid and gid.patch | (download)

bash-completion/unshare | 1 1 + 0 - 0 !
sys-utils/unshare.1.adoc | 3 3 + 0 - 0 !
sys-utils/unshare.c | 45 32 + 13 - 0 !
3 files changed, 36 insertions(+), 13 deletions(-)

 unshare: add --owner to set user namespace owner uid and gid

As well as the mappings between lower and upper ids, a user namespace is
associated with an owner user and group in its parent. These are set from
the uid and gid when the unshare() call is made, and determine which user
in the parent namespace has CAP_SYS_ADMIN in the child and can setns()
into it.

Add an --owner=<uid>:<gid> option which allows a privileged user to
create a user namespace on behalf of another user, mapping parent ids
and/or bind-mounting the namespace with privileges that the new owner
would not have.

Simplify the control flow around map_ids_from_child() vs mapping them
inline to avoid too many special cases. We reset mapuser and mapgroup to
-1 to signal that the mapping has been delegated to the child helper.

For completeness, we maintain the semantics of --map-root-user and
--map-current-user, binding the invoking user to root or itself in the
new namespace. However, when --owner is used, these must be handled by
a forked child as with --map-users and --map-groups.

Signed-off-by: Chris Webb <chris@arachsys.com>

upstream/unshare remove get_mnt_ino check in bind_ns_files_from_ch.patch | (download)

sys-utils/unshare.c | 15 0 + 15 - 0 !
1 file changed, 15 deletions(-)

 unshare: remove get_mnt_ino() check in bind_ns_files_from_child()

get_mnt_ino() was originally introduced in c84f2590 where it was used
in a loop to wait for the parent process to unshare the mount namespace
before binding the namespace in its child.

The parent and child processes are now synchronised with eventfd, so
remove this vestigial check and the now-unused get_mnt_ino() function.
This allows bind_ns_files_from_child() to be used even when the mount
namespace isn't amongst the namespaces being unshared.

Signed-off-by: Chris Webb <chris@arachsys.com>

upstream/unshare fix user namespace bind mounts.patch | (download)

sys-utils/unshare.c | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 unshare: fix user namespace bind mounts

unshare --user=<file> always fails because we no longer have CAP_SYS_ADMIN
in the parent user namespace after unsharing to create the new one. As with
unshare --mount=<file>, fork a child to make the bind mount instead.

Signed-off-by: Chris Webb <chris@arachsys.com>