Package: util-linux / 2.41.3-3
Metadata
| Package | Version | Patches format |
|---|---|---|
| util-linux | 2.41.3-3 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| debian/man getopt examples.patch | (download) |
misc-utils/getopt.1 |
2 1 + 1 - 0 ! |
util-linux: getopt(1) should point to where examples are on a debian system Debian BTS #913049 |
| debian/verbose tests.patch | (download) |
tests/Makemodule.am |
2 1 + 1 - 0 ! |
verbose-tests Enable verbose tests and print content of failing tests output file. |
| debian/hardlink tests known failed.patch | (download) |
tests/ts/hardlink/options |
3 3 + 0 - 0 ! |
hardlink tests: set known failed sha256 cannot be initialized on some archs / buildds. |
| debian/lsfd usrbin.patch | (download) |
lsfd-cmd/Makemodule.am |
2 1 + 1 - 0 ! |
install lsfd into /usr/bin |
| debian/sensible pager.patch | (download) |
lib/pager.c |
2 1 + 1 - 0 ! |
use sensible-pager Closes: #1014368 |
| debian/login support LOG_OK_LOGINS.patch | (download) |
login-utils/login.c |
2 1 + 1 - 0 ! |
login: support log_ok_logins |
| debian/login do not print motd done by PAM.patch | (download) |
login-utils/login.c |
2 0 + 2 - 0 ! |
login: do not print motd, done by pam |
| debian/login turn off btmp utmp lastlog writing.patch | (download) |
login-utils/login.c |
4 0 + 4 - 0 ! |
login: turn off btmp, utmp, lastlog writing Should be done by PAM instead. login from src:shadow had turned it off, especially with --enable-logind. |
| debian/salsa ci skip tests.patch | (download) |
tests/ts/fadvise/drop |
4 4 + 0 - 0 ! |
skip fadvise/drop test in salsa ci |
| upstream/ldattach Allow changing the MTU for GSM0710 framing.patch | (download) |
bash-completion/ldattach |
5 5 + 0 - 0 ! |
ldattach: allow changing the mtu for gsm0710 framing Traditionally ldattach have hard coded MTU of 127 bytes |
| upstream/libfdisk modernize ZFS GPT type description.patch | (download) |
include/pt-gpt-partnames.h |
4 2 + 2 - 0 ! |
libfdisk: modernize zfs gpt type description
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
The GPT type GUID 6A898CC3-1DD2-11B2-99A6-080020736631 is currently
described as "Solaris /usr & Apple ZFS". This reflects early Solaris
and Apple experiments with ZFS, but today the same GUID is widely used
by OpenZFS implementations on Linux, illumos, FreeBSD, and other
platforms to mark ZFS pool member partitions.
Apple's ZFS work was discontinued long ago, while OpenZFS has become
the actively maintained and de facto standard implementation. Update
the human-readable description to the simpler and more accurate:
"ZFS pool member"
A short comment is added to note the GUIDs historical Solaris /usr
origin and its brief use by Apple. Only the description string is
changed; the GUID itself and its semantics remain unchanged.
|
| upstream/unshare add owner to set user namespace owner uid and gid.patch | (download) |
bash-completion/unshare |
1 1 + 0 - 0 ! |
unshare: add --owner to set user namespace owner uid and gid As well as the mappings between lower and upper ids, a user namespace is associated with an owner user and group in its parent. These are set from the uid and gid when the unshare() call is made, and determine which user in the parent namespace has CAP_SYS_ADMIN in the child and can setns() into it. Add an --owner=<uid>:<gid> option which allows a privileged user to create a user namespace on behalf of another user, mapping parent ids and/or bind-mounting the namespace with privileges that the new owner would not have. Simplify the control flow around map_ids_from_child() vs mapping them inline to avoid too many special cases. We reset mapuser and mapgroup to -1 to signal that the mapping has been delegated to the child helper. For completeness, we maintain the semantics of --map-root-user and --map-current-user, binding the invoking user to root or itself in the new namespace. However, when --owner is used, these must be handled by a forked child as with --map-users and --map-groups. Signed-off-by: Chris Webb <chris@arachsys.com> |
| upstream/unshare remove get_mnt_ino check in bind_ns_files_from_ch.patch | (download) |
sys-utils/unshare.c |
15 0 + 15 - 0 ! |
unshare: remove get_mnt_ino() check in bind_ns_files_from_child() get_mnt_ino() was originally introduced in c84f2590 where it was used in a loop to wait for the parent process to unshare the mount namespace before binding the namespace in its child. The parent and child processes are now synchronised with eventfd, so remove this vestigial check and the now-unused get_mnt_ino() function. This allows bind_ns_files_from_child() to be used even when the mount namespace isn't amongst the namespaces being unshared. Signed-off-by: Chris Webb <chris@arachsys.com> |
| upstream/unshare fix user namespace bind mounts.patch | (download) |
sys-utils/unshare.c |
4 2 + 2 - 0 ! |
unshare: fix user namespace bind mounts unshare --user=<file> always fails because we no longer have CAP_SYS_ADMIN in the parent user namespace after unsharing to create the new one. As with unshare --mount=<file>, fork a child to make the bind mount instead. Signed-off-by: Chris Webb <chris@arachsys.com> |
