Debian Patches
Status for util-linux/2.41.3-3
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| debian/man-getopt-examples.patch | util-linux: getopt(1) should point to where examples are on a Debian system Debian BTS #913049 |
Matthew Vernon <matthew@debian.org> | no | 2018-11-06 | ||
| debian/verbose-tests.patch | verbose-tests Enable verbose tests and print content of failing tests output file. |
Andreas Henriksson <andreas@fatal.se> | no | 2014-07-30 | ||
| debian/hardlink-tests-known-failed.patch | hardlink tests: set known failed sha256 cannot be initialized on some archs / buildds. |
Chris Hofstaedtler <zeha@debian.org> | no | 2022-04-12 | ||
| debian/lsfd-usrbin.patch | Install lsfd into /usr/bin | Chris Hofstaedtler <zeha@debian.org> | no | 2022-04-14 | ||
| debian/sensible-pager.patch | Use sensible-pager | Chris Hofstaedtler <zeha@debian.org> | no | 2022-07-14 | ||
| debian/login-support-LOG_OK_LOGINS.patch | login: support LOG_OK_LOGINS | Chris Hofstaedtler <zeha@debian.org> | no | 2024-08-05 | ||
| debian/login-do-not-print-motd-done-by-PAM.patch | login: do not print motd, done by PAM | Chris Hofstaedtler <zeha@debian.org> | no | 2024-08-05 | ||
| debian/login-turn-off-btmp-utmp-lastlog-writing.patch | login: turn off btmp, utmp, lastlog writing Should be done by PAM instead. login from src:shadow had turned it off, especially with --enable-logind. |
Chris Hofstaedtler <zeha@debian.org> | no | 2024-08-05 | ||
| debian/salsa-ci-skip-tests.patch | Skip fadvise/drop test in Salsa CI | Chris Hofstaedtler <zeha@debian.org> | no | 2025-02-16 | ||
| upstream/ldattach-Allow-changing-the-MTU-for-GSM0710-framing.patch | ldattach: Allow changing the MTU for GSM0710 framing Traditionally ldattach have hard coded MTU of 127 bytes which differs from defaults proposed in 3GPP TS 27.010 which is 31 bytes when basic framing is used. Add '-m <value>' parameter that is only GSM0710 specific and already handled by the kernel. Use same value for both MTU and MRU. |
Seppo Takalo <seppo.takalo@nordicsemi.no> | no | 2025-07-24 | ||
| upstream/libfdisk-modernize-ZFS-GPT-type-description.patch | libfdisk: modernize ZFS GPT type description The GPT type GUID 6A898CC3-1DD2-11B2-99A6-080020736631 is currently described as "Solaris /usr & Apple ZFS". This reflects early Solaris and Apple experiments with ZFS, but today the same GUID is widely used by OpenZFS implementations on Linux, illumos, FreeBSD, and other platforms to mark ZFS pool member partitions. Apple's ZFS work was discontinued long ago, while OpenZFS has become the actively maintained and de facto standard implementation. Update the human-readable description to the simpler and more accurate: "ZFS pool member" A short comment is added to note the GUID’s historical Solaris /usr origin and its brief use by Apple. Only the description string is changed; the GUID itself and its semantics remain unchanged. |
Martin Minkus <martin.minkus@gmail.com> | no | 2025-12-02 | ||
| upstream/unshare-add-owner-to-set-user-namespace-owner-uid-and-gid.patch | unshare: add --owner to set user namespace owner uid and gid As well as the mappings between lower and upper ids, a user namespace is associated with an owner user and group in its parent. These are set from the uid and gid when the unshare() call is made, and determine which user in the parent namespace has CAP_SYS_ADMIN in the child and can setns() into it. Add an --owner=<uid>:<gid> option which allows a privileged user to create a user namespace on behalf of another user, mapping parent ids and/or bind-mounting the namespace with privileges that the new owner would not have. Simplify the control flow around map_ids_from_child() vs mapping them inline to avoid too many special cases. We reset mapuser and mapgroup to -1 to signal that the mapping has been delegated to the child helper. For completeness, we maintain the semantics of --map-root-user and --map-current-user, binding the invoking user to root or itself in the new namespace. However, when --owner is used, these must be handled by a forked child as with --map-users and --map-groups. |
Chris Webb <chris@arachsys.com> | no | 2025-12-14 | ||
| upstream/unshare-remove-get_mnt_ino-check-in-bind_ns_files_from_ch.patch | unshare: remove get_mnt_ino() check in bind_ns_files_from_child() get_mnt_ino() was originally introduced in c84f2590 where it was used in a loop to wait for the parent process to unshare the mount namespace before binding the namespace in its child. The parent and child processes are now synchronised with eventfd, so remove this vestigial check and the now-unused get_mnt_ino() function. This allows bind_ns_files_from_child() to be used even when the mount namespace isn't amongst the namespaces being unshared. |
Chris Webb <chris@arachsys.com> | no | 2025-12-15 | ||
| upstream/unshare-fix-user-namespace-bind-mounts.patch | unshare: fix user namespace bind mounts unshare --user=<file> always fails because we no longer have CAP_SYS_ADMIN in the parent user namespace after unsharing to create the new one. As with unshare --mount=<file>, fork a child to make the bind mount instead. |
Chris Webb <chris@arachsys.com> | no | 2025-12-15 |
All known versions for source package 'util-linux'
- 2.41.3-3 (sid)
- 2.41.3-2 (forky)
- 2.41-5 (trixie)
- 2.38.1-5+deb12u3 (bookworm)
- 2.38.1-5+deb12u1 (bookworm-security)
