Debian Patches

Status for util-linux/2.41.3-3

Patch Description Author Forwarded Bugs Origin Last update
debian/man-getopt-examples.patch util-linux: getopt(1) should point to where examples are on a Debian system

Debian BTS #913049
Matthew Vernon <matthew@debian.org> no 2018-11-06
debian/verbose-tests.patch verbose-tests
Enable verbose tests and print content of failing tests output file.
Andreas Henriksson <andreas@fatal.se> no 2014-07-30
debian/hardlink-tests-known-failed.patch hardlink tests: set known failed
sha256 cannot be initialized on some archs / buildds.
Chris Hofstaedtler <zeha@debian.org> no 2022-04-12
debian/lsfd-usrbin.patch Install lsfd into /usr/bin Chris Hofstaedtler <zeha@debian.org> no 2022-04-14
debian/sensible-pager.patch Use sensible-pager Chris Hofstaedtler <zeha@debian.org> no 2022-07-14
debian/login-support-LOG_OK_LOGINS.patch login: support LOG_OK_LOGINS Chris Hofstaedtler <zeha@debian.org> no 2024-08-05
debian/login-do-not-print-motd-done-by-PAM.patch login: do not print motd, done by PAM Chris Hofstaedtler <zeha@debian.org> no 2024-08-05
debian/login-turn-off-btmp-utmp-lastlog-writing.patch login: turn off btmp, utmp, lastlog writing
Should be done by PAM instead. login from src:shadow had turned it off, especially with --enable-logind.
Chris Hofstaedtler <zeha@debian.org> no 2024-08-05
debian/salsa-ci-skip-tests.patch Skip fadvise/drop test in Salsa CI Chris Hofstaedtler <zeha@debian.org> no 2025-02-16
upstream/ldattach-Allow-changing-the-MTU-for-GSM0710-framing.patch ldattach: Allow changing the MTU for GSM0710 framing
Traditionally ldattach have hard coded MTU of 127 bytes
which differs from defaults proposed in 3GPP TS 27.010
which is 31 bytes when basic framing is used.

Add '-m <value>' parameter that is only GSM0710 specific
and already handled by the kernel. Use same value for both
MTU and MRU.
Seppo Takalo <seppo.takalo@nordicsemi.no> no 2025-07-24
upstream/libfdisk-modernize-ZFS-GPT-type-description.patch libfdisk: modernize ZFS GPT type description
The GPT type GUID 6A898CC3-1DD2-11B2-99A6-080020736631 is currently
described as "Solaris /usr & Apple ZFS". This reflects early Solaris
and Apple experiments with ZFS, but today the same GUID is widely used
by OpenZFS implementations on Linux, illumos, FreeBSD, and other
platforms to mark ZFS pool member partitions.

Apple's ZFS work was discontinued long ago, while OpenZFS has become
the actively maintained and de facto standard implementation. Update
the human-readable description to the simpler and more accurate:

"ZFS pool member"

A short comment is added to note the GUID’s historical Solaris /usr
origin and its brief use by Apple. Only the description string is
changed; the GUID itself and its semantics remain unchanged.
Martin Minkus <martin.minkus@gmail.com> no 2025-12-02
upstream/unshare-add-owner-to-set-user-namespace-owner-uid-and-gid.patch unshare: add --owner to set user namespace owner uid and gid
As well as the mappings between lower and upper ids, a user namespace is
associated with an owner user and group in its parent. These are set from
the uid and gid when the unshare() call is made, and determine which user
in the parent namespace has CAP_SYS_ADMIN in the child and can setns()
into it.

Add an --owner=<uid>:<gid> option which allows a privileged user to
create a user namespace on behalf of another user, mapping parent ids
and/or bind-mounting the namespace with privileges that the new owner
would not have.

Simplify the control flow around map_ids_from_child() vs mapping them
inline to avoid too many special cases. We reset mapuser and mapgroup to
-1 to signal that the mapping has been delegated to the child helper.

For completeness, we maintain the semantics of --map-root-user and
--map-current-user, binding the invoking user to root or itself in the
new namespace. However, when --owner is used, these must be handled by
a forked child as with --map-users and --map-groups.
Chris Webb <chris@arachsys.com> no 2025-12-14
upstream/unshare-remove-get_mnt_ino-check-in-bind_ns_files_from_ch.patch unshare: remove get_mnt_ino() check in bind_ns_files_from_child()
get_mnt_ino() was originally introduced in c84f2590 where it was used
in a loop to wait for the parent process to unshare the mount namespace
before binding the namespace in its child.

The parent and child processes are now synchronised with eventfd, so
remove this vestigial check and the now-unused get_mnt_ino() function.
This allows bind_ns_files_from_child() to be used even when the mount
namespace isn't amongst the namespaces being unshared.
Chris Webb <chris@arachsys.com> no 2025-12-15
upstream/unshare-fix-user-namespace-bind-mounts.patch unshare: fix user namespace bind mounts
unshare --user=<file> always fails because we no longer have CAP_SYS_ADMIN
in the parent user namespace after unsharing to create the new one. As with
unshare --mount=<file>, fork a child to make the bind mount instead.
Chris Webb <chris@arachsys.com> no 2025-12-15

All known versions for source package 'util-linux'

Links