Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)
1From 7dbfe31a83f45d5aef2b508697e9511c569ffbc8 Mon Sep 17 00:00:00 2001 2From: Karel Zak <kzak@redhat.com> 3Date: Mon, 24 Mar 2025 14:31:05 +0100 4Subject: [PATCH] libmount: fix --no-canonicalize regression 5 6Fixes: https://github.com/util-linux/util-linux/issues/3474 7Signed-off-by: Karel Zak <kzak@redhat.com> 8--- 9 libmount/src/context.c | 3 --- 10 sys-utils/mount.8.adoc | 2 +- 11 2 files changed, 1 insertion(+), 4 deletions(-) 12 13diff --git a/libmount/src/context.c b/libmount/src/context.c 14index 0323cb23d34..15a8ad3bbd0 100644 15--- a/libmount/src/context.c 16+++ b/libmount/src/context.c 17@@ -530,9 +530,6 @@ int mnt_context_is_xnocanonicalize( 18 assert(cxt); 19 assert(type); 20 21- if (mnt_context_is_nocanonicalize(cxt)) 22- return 1; 23- 24 ol = mnt_context_get_optlist(cxt); 25 if (!ol) 26 return 0; 27diff --git a/sys-utils/mount.8.adoc b/sys-utils/mount.8.adoc 28index 4f23f8d1f0e..5103b91c578 100644 29--- a/sys-utils/mount.8.adoc 30+++ b/sys-utils/mount.8.adoc 31@@ -756,7 +756,7 @@ Allow to make a target directory (mountpoint) if it does not exist yet. The opti 32 *X-mount.nocanonicalize*[**=**_type_]:: 33 Allows disabling of canonicalization for mount source and target paths. By default, the `mount` command resolves all paths to their absolute paths without symlinks. However, this behavior may not be desired in certain situations, such as when binding a mount over a symlink, or a symlink over a directory or another symlink. The optional argument _type_ can be either "source" or "target" (mountpoint). If no _type_ is specified, then canonicalization is disabled for both types. This mount option does not affect the conversion of source tags (e.g. LABEL= or UUID=) and fstab processing. 34 + 35-The command line option *--no-canonicalize* overrides this mount option and affects all path and tag conversions in all situations, but it does not modify flags for open_tree syscalls. 36+The command-line option *--no-canonicalize* overrides this mount option and affects all path and tag conversions in all situations, but for backward compatibility, it does not modify open_tree syscall flags and does not allow the bind-mount over a symlink use case. 37 + 38 Note that *mount*(8) still sanitizes and canonicalizes the source and target paths specified on the command line by non-root users, regardless of the X-mount.nocanonicalize setting. 39