Our great sponsors
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
The VT subsystem is not as well-maintained as other subsystems in the Linux kernel. Even Linus Torvalds, who wrote a large portion of the VT subsystem very early in Linux's history, considers it "bitrot" now. A few years ago CVE-2020-14390 was discovered in the VT subsystem, which was the VT console corrupting memory when scrolling up in some conditions. When this issue was discovered, the best fix that the kernel developers did to avoid making large changes to code they consider to be fragile, was to simply prevent scroll up from working in the VT console. The commit message in https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45 provides further reference.
https://github.com/n3rdopolis/fakekmscon starts the getty process as root on a pty that a socat "server" provides. It then sets the owner of the communication socket file to allow a system non-root user to interact with it. The socat client that connects to it is called by foot that runs under cage, which all start as a non-root system user.
Yeah, in hindsight, those names are very hard to Google. Lol, Here is cage https://github.com/Hjdskes/cage And foot https://codeberg.org/dnkl/foot
There is a maintained fork: https://github.com/Aetf/kmscon