diff options
author | André Fabian Silva Delgado <emulatorman@parabola.nu> | 2016-12-13 00:34:27 -0300 |
---|---|---|
committer | André Fabian Silva Delgado <emulatorman@parabola.nu> | 2016-12-13 00:40:13 -0300 |
commit | 6f528205d9c0f72c6d0d93d854470a9ebdf336dc (patch) | |
tree | 627edd30c843bed0e13b8d9a7fb723715bbe8713 /libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch | |
parent | aa170f0023748f22cc4cf6bbff6d44ad42ad42af (diff) |
systemd-232-6.parabola1: bump to Arch's revision
* fix pam file: s/system-auth/system-login/
* avoid hiding bind mounts in nspawn (FS#52009 -> https://bugs.archlinux.org/task/52009)
* fix build system to cope with recent lz4 (FS#52065 -> https://bugs.archlinux.org/task/52065)
* make sure to initially populate the space info cache (FS#52012 -> https://bugs.archlinux.org/task/52012)
* fix nspawn error code for --help and --version (FS#52029 -> https://bugs.archlinux.org/task/52029)
* provide our own /etc/pam.d/systemd-user (FS#52039 -> https://bugs.archlinux.org/task/52039)
Diffstat (limited to 'libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch')
-rw-r--r-- | libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch b/libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch new file mode 100644 index 000000000..a5336ece5 --- /dev/null +++ b/libre/systemd/0001-nspawn-don-t-hide-bind-tmp-mounts.patch @@ -0,0 +1,26 @@ +From 7ec42a45410cb27140292d85ebb0e4b6dcea5555 Mon Sep 17 00:00:00 2001 +From: Dave Reisner <dreisner@archlinux.org> +Date: Wed, 7 Dec 2016 13:45:48 -0500 +Subject: [PATCH] nspawn: don't hide --bind=/tmp/* mounts + +This is a v232-applicable version of upstream c9fd987279a462e. +--- + src/nspawn/nspawn-mount.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/nspawn/nspawn-mount.c b/src/nspawn/nspawn-mount.c +index 115de64..2dabe2a 100644 +--- a/src/nspawn/nspawn-mount.c ++++ b/src/nspawn/nspawn-mount.c +@@ -382,7 +382,7 @@ int mount_all(const char *dest, + { "tmpfs", "/dev", "tmpfs", "mode=755", MS_NOSUID|MS_STRICTATIME, true, false, false }, + { "tmpfs", "/dev/shm", "tmpfs", "mode=1777", MS_NOSUID|MS_NODEV|MS_STRICTATIME, true, false, false }, + { "tmpfs", "/run", "tmpfs", "mode=755", MS_NOSUID|MS_NODEV|MS_STRICTATIME, true, false, false }, +- { "tmpfs", "/tmp", "tmpfs", "mode=1777", MS_STRICTATIME, true, true, false }, ++ { "tmpfs", "/tmp", "tmpfs", "mode=1777", MS_STRICTATIME, true, false, false }, + #ifdef HAVE_SELINUX + { "/sys/fs/selinux", "/sys/fs/selinux", NULL, NULL, MS_BIND, false, false, false }, /* Bind mount first */ + { NULL, "/sys/fs/selinux", NULL, NULL, MS_BIND|MS_RDONLY|MS_NOSUID|MS_NOEXEC|MS_NODEV|MS_REMOUNT, false, false, false }, /* Then, make it r/o */ +-- +2.10.2 + |