Hello community, here is the log from the commit of package coreutils for openSUSE:Factory checked in at 2014-08-03 15:35:38 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/coreutils (Old) and /work/SRC/openSUSE:Factory/.coreutils.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "coreutils" Changes: -------- --- /work/SRC/openSUSE:Factory/coreutils/coreutils-testsuite.changes 2014-03-18 13:37:05.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.coreutils.new/coreutils-testsuite.changes 2014-08-03 15:35:40.000000000 +0200 @@ -1,0 +2,232 @@ +Fri Aug 1 15:54:41 UTC 2014 - mail@bernhard-voelker.de + +- Add patches for upstream glitches: + - coreutils-fix-man-deps.patch + - coreutils-chroot-perform-chdir-unless-skip-chdir.patch + +- Refresh patches: + - coreutils-build-timeout-as-pie.patch + - coreutils-getaddrinfo.patch + - coreutils-i18n.patch + - coreutils-misc.patch + - coreutils-ocfs2_reflinks.patch + - coreutils-remove_hostname_documentation.patch + - coreutils-remove_kill_documentation.patch + - coreutils-skip-gnulib-test-tls.patch + - coreutils-tests-shorten-extreme-factor-tests.patch + +- Remove now-upstream patches: + - coreutils-copy-fix-selinux-existing-dirs.patch + - coreutils-gnulib-tests-ppc64le.patch + - coreutils-tests-avoid-FP-cp-cpuinfo.patch + - coreutils-test-avoid-FP-when-no-ACL-support.patch + - coreutils-ln-avoid-segfault-for-empty-target.patch + - coreutils-date-avoid-crash-in-TZ-parsing.patch + - coreutils-shuf-repeat-avoid-crash-when-input-empty.patch + - coreutils-improve_df_--human_and_--si,_help_and_man_page.patch + - coreutils-avoid_sizeof_charPP__static_analysis_warning.patch + - coreutils-also_deduplicate_virtual_file_systems.patch + - coreutils-fix_handling_of_symlinks_in_mount_list.patch + - coreutils-ignore_non_file_system_entries_in_proc_mounts.patch + - coreutils-avoid_clang_-Wtautological-constant-out-of-range-compare_warning.patch + - coreutils-use_the_last_device_name_provided_by_the_system.patch + - coreutils-avoid_compiler_warnings_with_some_assert_implementations.patch + - coreutils-use_all_of_the_last_device_details_provided.patch + - coreutils-output_placeholder_values_for_inaccessible_mount_points.patch + - coreutils-look_for_accessible_mount_points_for_specified_devices.patch + - coreutils-report_correct_device_in_presence_of_eclipsed_mounts.patch + - coreutils-avoid_an_inconsequential_mem_leak.patch + +- Update to 8.23 (2014-07-18) [stable] + + ** Bug fixes + + chmod -Rc no longer issues erroneous warnings for files with special bits set. + [bug introduced in coreutils-6.0] + + cp -a, mv, and install --preserve-context, once again set the correct SELinux + context for existing directories in the destination. Previously they set + the context of an existing directory to that of its last copied descendent. + [bug introduced in coreutils-8.22] + + cp -a, mv, and install --preserve-context, no longer seg fault when running + with SELinux enabled, when copying from file systems that return an error + when reading the SELinux context for a file. + [bug introduced in coreutils-8.22] + + cp -a and mv now preserve xattrs of symlinks copied across file systems. + [bug introduced with extended attribute preservation feature in coreutils-7.1] + + date could crash or go into an infinite loop when parsing a malformed TZ="". + [bug introduced with the --date='TZ="" ..' parsing feature in coreutils-5.3.0] + + dd's ASCII and EBCDIC conversions were incompatible with common practice and + with POSIX, and have been corrected as follows. First, conv=ascii now + implies conv=unblock, and conv=ebcdic and conv=ibm now imply conv=block. + Second, the translation tables for dd conv=ascii and conv=ebcdic have been + corrected as shown in the following table, where A is the ASCII value, W is + the old, wrong EBCDIC value, and E is the new, corrected EBCDIC value; all + values are in octal. + + A W E + 041 117 132 + 133 112 255 + 135 132 275 + 136 137 232 + 174 152 117 + 176 241 137 + 313 232 152 + 325 255 112 + 345 275 241 + + [These dd bugs were present in "the beginning".] + + df has more fixes related to the newer dynamic representation of file systems: + Duplicates are elided for virtual file systems like tmpfs. + Details for the correct device are output for points mounted multiple times. + Placeholder values are output for inaccessible file systems, rather than + than error messages or values for the wrong file system. + [These bugs were present in "the beginning".] + + df now outputs all appropriate entries in the presence of bind mounts. + On some systems, entries would have been incorrectly elided due to + them being considered "dummy" mounts. + [bug introduced in coreutils-8.22] + + du now silently ignores directory cycles introduced with bind mounts. + Previously it would issue a warning and exit with a failure status. + [bug introduced in coreutils-8.1] + + head --bytes=-N and --lines=-N now handles devices more + consistently, not ignoring data from virtual devices like /dev/zero, + or on BSD systems data from tty devices. + [bug introduced in coreutils-5.0.1] + + head --bytes=-N - no longer fails with a bogus diagnostic when stdin's + seek pointer is not at the beginning. + [bug introduced with the --bytes=-N feature in coreutils-5.0.1] + + head --lines=-0, when the input does not contain a trailing '\n', + now copies all input to stdout. Previously nothing was output in this case. + [bug introduced with the --lines=-N feature in coreutils-5.0.1] + + id, when invoked with no user name argument, now prints the correct group ID. + Previously, in the default output format, it would print the default group ID + in the password database, which may be neither real nor effective. For e.g., + when run set-GID, or when the database changes outside the current session. + [bug introduced in coreutils-8.1] + + ln -sf now replaces symbolic links whose targets can't exist. Previously + it would display an error, requiring --no-dereference to avoid the issue. + [bug introduced in coreutils-5.3.0] + + ln -sr '' F no longer segfaults. Now works as expected. + [bug introduced with the --relative feature in coreutils-8.16] + + numfmt now handles blanks correctly in all unibyte locales. Previously + in locales where character 0xA0 is a blank, numfmt would mishandle it. + [bug introduced when numfmt was added in coreutils-8.21] + + ptx --format long option parsing no longer falls through into the --help case. + [bug introduced in TEXTUTILS-1_22i] + + ptx now consistently trims whitespace when processing multiple files. + [This bug was present in "the beginning".] + + seq again generates correct output with start or end values = -0. + [bug introduced in coreutils-8.20.] + + shuf --repeat no longer dumps core if the input is empty. + [bug introduced with the --repeat feature in coreutils-8.22] + + sort when using multiple threads now avoids undefined behavior with mutex + destruction, which could cause deadlocks on some implementations. + [bug introduced in coreutils-8.6] + + tail -f now uses polling mode for VXFS to cater for its clustered mode. + [bug introduced with inotify support added in coreutils-7.5] + + ** New features + + od accepts a new option: --endian=TYPE to handle inputs with different byte + orders, or to provide consistent output on systems with disparate endianness. + + configure accepts the new option --enable-single-binary to build all the + selected programs in a single binary called "coreutils". The selected + programs can still be called directly using symlinks to "coreutils" or + shebangs with the option --coreutils-prog= passed to this program. The + install behavior is determined by the option --enable-single-binary=symlinks + or --enable-single-binary=shebangs (the default). With the symlinks option, + you can't make a second symlink to any program because that will change the + name of the called program, which is used by coreutils to determine the + desired program. The shebangs option doesn't suffer from this problem, but + the /proc/$pid/cmdline file might not be updated on all the platforms. The + functionality of each program is not affected but this single binary will + depend on all the required dynamic libraries even to run simple programs. + If you desire to build some tools outside the single binary file, you can + pass the option --enable-single-binary-exceptions=PROG_LIST with the comma + separated list of programs you want to build separately. This flag + considerably reduces the overall size of the installed binaries which makes + it suitable for embedded system. + + ** Changes in behavior + + chroot with an argument of "/" no longer implicitly changes the current + directory to "/", allowing changing only user credentials for a command. + + chroot --userspec will now unset supplemental groups associated with root, + and instead use the supplemental groups of the specified user. + + cut -d$'\n' again outputs lines identified in the --fields list, having + not done so in v8.21 and v8.22. Note using this non portable functionality + will result in the delayed output of lines. + + ls with none of LS_COLORS or COLORTERM environment variables set, + will now honor an empty or unknown TERM environment variable, + and not output colors even with --colors=always. + + ** Improvements + + chroot has better --userspec and --group look-ups, with numeric IDs never + causing name look-up errors. Also look-ups are first done outside the chroot, + in case the look-up within the chroot fails due to library conflicts etc. + + install now allows the combination of the -D and -t options. + + numfmt supports zero padding of numbers using the standard printf + syntax of a leading zero, for example --format="%010f". ++++ 35 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/coreutils/coreutils-testsuite.changes ++++ and /work/SRC/openSUSE:Factory/.coreutils.new/coreutils-testsuite.changes coreutils.changes: same change Old: ---- coreutils-8.22.tar.xz coreutils-copy-fix-selinux-existing-dirs.patch coreutils-date-avoid-crash-in-TZ-parsing.patch coreutils-gnulib-tests-ppc64le.patch coreutils-ln-avoid-segfault-for-empty-target.patch coreutils-shuf-repeat-avoid-crash-when-input-empty.patch coreutils-test-avoid-FP-when-no-ACL-support.patch coreutils-tests-avoid-FP-cp-cpuinfo.patch New: ---- coreutils-8.23.tar.xz coreutils-chroot-perform-chdir-unless-skip-chdir.patch coreutils-fix-man-deps.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ coreutils-testsuite.spec ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:42.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:42.000000000 +0200 @@ -21,7 +21,7 @@ License: GPL-3.0+ Group: System/Base Url: http://www.gnu.org/software/coreutils/ -Version: 8.22 +Version: 8.23 Release: 0 ################################################################# @@ -97,10 +97,6 @@ # OBS / RPMLINT require /usr/bin/timeout to be built with the -fpie option. Patch100: coreutils-build-timeout-as-pie.patch -# Upstream patch to 8.22: cp -a: set the correct SELinux context -# on already existing destination directories. -Patch110: coreutils-copy-fix-selinux-existing-dirs.patch - # At least a bit of reflink support Patch111: coreutils-ocfs2_reflinks.patch @@ -110,9 +106,6 @@ # Assorted fixes Patch113: coreutils-misc.patch -# Fix imported gnulib long double math tests for little-endian PowerPC -Patch202: coreutils-gnulib-tests-ppc64le.patch - # Skip 2 valgrind'ed sort tests on ppc/ppc64 which would fail due to # a glibc issue in mkstemp. Patch300: coreutils-skip-some-sort-tests-on-ppc.patch @@ -121,26 +114,16 @@ Patch301: coreutils-skip-gnulib-test-tls.patch %endif -# tests: avoid FP failure when cp fails for /proc/cpuinfo -# which happens e.g. on aarch64. -Patch302: coreutils-tests-avoid-FP-cp-cpuinfo.patch - # tests: shorten extreme-expensive factor tests Patch303: coreutils-tests-shorten-extreme-factor-tests.patch -# tests: avoid test framework failure if the file system lacks ACL support -Patch304: coreutils-test-avoid-FP-when-no-ACL-support.patch - -# Port upstream patch, to be removed with v8.23: -# ln: with -sr, don't segfault for a TARGET of '' -Patch305: coreutils-ln-avoid-segfault-for-empty-target.patch - -# Upstream patch for date(1), to be removed with v8.23: -Patch306: coreutils-date-avoid-crash-in-TZ-parsing.patch - -# Upstream patch for shuf(1), to be removed with v8.23: -# shuf --repeat no longer dumps core if the input is empty. -Patch307: coreutils-shuf-repeat-avoid-crash-when-input-empty.patch +# Upstream patch on top of v8.23 (to be removed in v8.24). +# Fix the dependencies to generate man pages after linking. +Patch400: coreutils-fix-man-deps.patch + +# Upstream patch on top of v8.23 (to be removed in v8.24). +# Fixes a regression in chroot which did not chdir("/") in all cases. +Patch401: coreutils-chroot-perform-chdir-unless-skip-chdir.patch # ================================================ %description @@ -168,11 +151,9 @@ %patch16 # %patch100 -%patch110 %patch111 %patch112 %patch113 -%patch202 %patch300 @@ -180,12 +161,9 @@ %patch301 %endif -%patch302 %patch303 -%patch304 -%patch305 -%patch306 -%patch307 +%patch400 +%patch401 #???## We need to statically link to gmp, otherwise we have a build loop #???#sed -i s,'$(LIB_GMP)',%%{_libdir}/libgmp.a,g Makefile.in ++++++ coreutils.spec ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:42.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:42.000000000 +0200 @@ -21,7 +21,7 @@ License: GPL-3.0+ Group: System/Base Url: http://www.gnu.org/software/coreutils/ -Version: 8.22 +Version: 8.23 Release: 0 ################################################################# @@ -97,10 +97,6 @@ # OBS / RPMLINT require /usr/bin/timeout to be built with the -fpie option. Patch100: coreutils-build-timeout-as-pie.patch -# Upstream patch to 8.22: cp -a: set the correct SELinux context -# on already existing destination directories. -Patch110: coreutils-copy-fix-selinux-existing-dirs.patch - # At least a bit of reflink support Patch111: coreutils-ocfs2_reflinks.patch @@ -110,9 +106,6 @@ # Assorted fixes Patch113: coreutils-misc.patch -# Fix imported gnulib long double math tests for little-endian PowerPC -Patch202: coreutils-gnulib-tests-ppc64le.patch - # Skip 2 valgrind'ed sort tests on ppc/ppc64 which would fail due to # a glibc issue in mkstemp. Patch300: coreutils-skip-some-sort-tests-on-ppc.patch @@ -121,26 +114,16 @@ Patch301: coreutils-skip-gnulib-test-tls.patch %endif -# tests: avoid FP failure when cp fails for /proc/cpuinfo -# which happens e.g. on aarch64. -Patch302: coreutils-tests-avoid-FP-cp-cpuinfo.patch - # tests: shorten extreme-expensive factor tests Patch303: coreutils-tests-shorten-extreme-factor-tests.patch -# tests: avoid test framework failure if the file system lacks ACL support -Patch304: coreutils-test-avoid-FP-when-no-ACL-support.patch - -# Port upstream patch, to be removed with v8.23: -# ln: with -sr, don't segfault for a TARGET of '' -Patch305: coreutils-ln-avoid-segfault-for-empty-target.patch - -# Upstream patch for date(1), to be removed with v8.23: -Patch306: coreutils-date-avoid-crash-in-TZ-parsing.patch - -# Upstream patch for shuf(1), to be removed with v8.23: -# shuf --repeat no longer dumps core if the input is empty. -Patch307: coreutils-shuf-repeat-avoid-crash-when-input-empty.patch +# Upstream patch on top of v8.23 (to be removed in v8.24). +# Fix the dependencies to generate man pages after linking. +Patch400: coreutils-fix-man-deps.patch + +# Upstream patch on top of v8.23 (to be removed in v8.24). +# Fixes a regression in chroot which did not chdir("/") in all cases. +Patch401: coreutils-chroot-perform-chdir-unless-skip-chdir.patch # ================================================ %description @@ -168,11 +151,9 @@ %patch16 # %patch100 -%patch110 %patch111 %patch112 %patch113 -%patch202 %patch300 @@ -180,12 +161,9 @@ %patch301 %endif -%patch302 %patch303 -%patch304 -%patch305 -%patch306 -%patch307 +%patch400 +%patch401 #???## We need to statically link to gmp, otherwise we have a build loop #???#sed -i s,'$(LIB_GMP)',%%{_libdir}/libgmp.a,g Makefile.in ++++++ coreutils-8.22.tar.xz -> coreutils-8.23.tar.xz ++++++ ++++ 310338 lines of diff (skipped) ++++++ coreutils-build-timeout-as-pie.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -27,7 +27,7 @@ # The list of all programs (separated in different variables to express # the how and when they should be installed) is defined in this makefile -@@ -271,6 +271,9 @@ src_factor_LDADD += $(LIB_GMP) +@@ -276,6 +276,9 @@ src_factor_LDADD += $(LIB_GMP) # for getloadavg src_uptime_LDADD += $(GETLOADAVG_LIBS) ++++++ coreutils-chroot-perform-chdir-unless-skip-chdir.patch ++++++ # Upstream patch on top of v8.23 (to be removed in v8.24): # https://git.sv.gnu.org/cgit/coreutils.git/commit/?id=0cf7b1d9 # Fixes a regression in chroot which did not chdir("/") in all cases.
From 0c7abd9e8e1d1725ae600daa3ac9bbf8333f93c9 Mon Sep 17 00:00:00 2001 From: Bernhard Voelker
Date: Fri, 1 Aug 2014 02:07:33 +0200 Subject: [PATCH] chroot: perform chdir("/") again unless new --skip-chdir is specified
Since commit v8.22-94-g99960ee, chroot(1) skips the chroot(2) syscall for "/" arguments (and synonyms). The problem is that it also skips the following chdir("/") call in that case. The latter breaks existing scripts which expect "/" to be the working directory inside the chroot. While the first part of the change - i.e., skipping chroot("/") - is okay for consistency with systems where it might succeed for a non-root user, the second part might be malicious, e.g. cd /home/user && chroot '/' bin/foo In the "best" case, chroot(1) could not execute 'bin/foo' with ENOENT, but in the worst case, chroot(1) would execute '/home/user/bin/foo' in the case that exists - instead of '/bin/foo'. Revert that second part of the patch, i.e., perform the chdir("/) in the common case again - unless the new --skip-chdir option is specified. Restrict this new option to the case of "/" arguments. * src/chroot.c (SKIP_CHDIR): Add enum. (long_opts): Add entry for the new --skip-chdir option. (usage): Add --skip-chdir option, and while at it, move the other to options into alphabetical order. (main): Accept the above new option, allowing it only in the case when NEWROOT is the old "/". Move down the chdir() call after the if-clause to ensure it is run in any case - unless --skip-chdir is specified. Add a 'newroot' variable for the new root directory as it is used in a couple of places now. * tests/misc/chroot-fail.sh: Invert the last tests which check the working directory of the execvp()ed program when a "/"-like argument was passed: now expect it to be "/" - unless --skip-chdir is given. * doc/coreutils.texi (chroot invocation): Document the new option. Document that chroot(1) usually calls chdir("/") unless the new --skip-chdir option is specified. Sort options. * NEWS (Changes in behavior): Mention the fix. (New features): Mention the new option. * init.cfg (nonroot_has_perm_): Add chroot's new --skip-chdir option. * tests/cp/preserve-gid.sh (t1): Likewise. * tests/cp/special-bits.sh: Likewise. * tests/id/setgid.sh: Likewise. * tests/misc/truncate-owned-by-other.sh: Likewise. * tests/mv/sticky-to-xpart.sh: Likewise. * tests/rm/fail-2eperm.sh: Likewise. * tests/rm/no-give-up.sh: Likewise. * tests/touch/now-owned-by-other.sh: Likewise. Reported by Andreas Schwab in http://bugs.gnu.org/18062 --- NEWS | 13 +++++++++++ doc/coreutils.texi | 36 +++++++++++++++++++++----------- init.cfg | 3 +- src/chroot.c | 38 ++++++++++++++++++++++++++-------- tests/cp/preserve-gid.sh | 3 +- tests/cp/special-bits.sh | 3 +- tests/id/setgid.sh | 8 +++---- tests/misc/chroot-fail.sh | 23 +++++++++++++++++--- tests/misc/truncate-owned-by-other.sh | 2 - tests/mv/sticky-to-xpart.sh | 5 ++-- tests/rm/fail-2eperm.sh | 6 +++-- tests/rm/no-give-up.sh | 2 - tests/touch/now-owned-by-other.sh | 2 - 13 files changed, 106 insertions(+), 38 deletions(-) Index: NEWS =================================================================== --- NEWS.orig +++ NEWS @@ -172,6 +172,19 @@ GNU coreutils NEWS --format=%T now reports the file system type, and tail -f now uses inotify, rather than the default of issuing a warning and reverting to polling. +** New features + + chroot accepts the new --skip-chdir option to not change the working directory + to "/" after changing into the chroot(2) jail, thus retaining the current wor- + king directory. The new option is only permitted if the new root directory is + the old "/", and therefore is useful with the --group and --userspec options. + +** Changes in behavior + + chroot changes the current directory to "/" in again - unless the above new + --skip-chdir option is specified. + [bug introduced in coreutils-8.23] + * Noteworthy changes in release 8.22 (2013-12-13) [stable] Index: doc/coreutils.texi =================================================================== --- doc/coreutils.texi.orig +++ doc/coreutils.texi @@ -16068,7 +16068,10 @@ On many systems, only the super-user can some systems (e.g., FreeBSD) can be configured to allow certain regular users to use the @code{chroot} system call, and hence to run this program. Also, on Cygwin, anyone can run the @command{chroot} command, because the -underlying function is non-privileged due to lack of support in MS-Windows.} +underlying function is non-privileged due to lack of support in MS-Windows. +Furthermore, the @command{chroot} command avoids the @code{chroot} system call +when @var{newroot} is identical to the old @file{/} directory for consistency +with systems where this is allowed for non-privileged users.}. Synopses: @example @@ -16078,10 +16081,11 @@ chroot @var{option} Ordinarily, file names are looked up starting at the root of the directory structure, i.e., @file{/}. @command{chroot} changes the root to -the directory @var{newroot} (which must exist) and then runs -@var{command} with optional @var{args}. If @var{command} is not -specified, the default is the value of the @env{SHELL} environment -variable or @command{/bin/sh} if not set, invoked with the @option{-i} option. +the directory @var{newroot} (which must exist), then changes the working +directory to @file{/}, and finally runs @var{command} with optional @var{args}. +If @var{command} is not specified, the default is the value of the @env{SHELL} +environment variable or @command{/bin/sh} if not set, invoked with the +@option{-i} option. @var{command} must not be a special built-in utility (@pxref{Special built-in utilities}). @@ -16090,6 +16094,14 @@ Options must precede operands. @table @samp +@item --groups=@var{groups} +@opindex --groups +Use this option to override the supplementary @var{groups} to be +used by the new process. +The items in the list (names or numeric IDs) must be separated by commas. +Use @samp{--groups=''} to disable the supplementary group look-up +implicit in the @option{--userspec} option. + @item --userspec=@var{user}[:@var{group}] @opindex --userspec By default, @var{command} is run with the same credentials @@ -16100,13 +16112,13 @@ If a @var{user} is specified then the su are set according to the system defined list for that user, unless overridden with the @option{--groups} option. -@item --groups=@var{groups} -@opindex --groups -Use this option to override the supplementary @var{groups} to be -used by the new process. -The items in the list (names or numeric IDs) must be separated by commas. -Use @samp{--groups=''} to disable the supplementary group look-up -implicit in the @option{--userspec} option. +@item --skip-chdir +@opindex --skip-chdir +Use this option to not change the working directory to @file{/} after changing +the root directory to @var{newroot}, i.e., inside the chroot. +This option is only permitted when @var{newroot} is the old @file{/} directory, +and therefore is mostly useful together with the @option{--groups} and +@option{--userspec} options to retain the previous working directory. @end table Index: init.cfg =================================================================== --- init.cfg.orig +++ init.cfg @@ -400,7 +400,8 @@ nonroot_has_perm_() require_built_ chroot local rm_version=$( - chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" rm --version | + chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ + rm --version | sed -n '1s/.* //p' ) case ":$rm_version:" in Index: src/chroot.c =================================================================== --- src/chroot.c.orig +++ src/chroot.c @@ -49,13 +49,15 @@ static inline bool gid_unset (gid_t gid) enum { GROUPS = UCHAR_MAX + 1, - USERSPEC + USERSPEC, + SKIP_CHDIR }; static struct option const long_opts[] = { {"groups", required_argument, NULL, GROUPS}, {"userspec", required_argument, NULL, USERSPEC}, + {"skip-chdir", no_argument, NULL, SKIP_CHDIR}, {GETOPT_HELP_OPTION_DECL}, {GETOPT_VERSION_OPTION_DECL}, {NULL, 0, NULL, 0} @@ -194,9 +196,14 @@ Run COMMAND with root directory set to N "), stdout); fputs (_("\ - --userspec=USER:GROUP specify user and group (ID or name) to use\n\ --groups=G_LIST specify supplementary groups as g1,g2,..,gN\n\ "), stdout); + fputs (_("\ + --userspec=USER:GROUP specify user and group (ID or name) to use\n\ +"), stdout); + printf (_("\ + --skip-chdir do not change working directory to %s\n\ +"), quote ("/")); fputs (HELP_OPTION_DESCRIPTION, stdout); fputs (VERSION_OPTION_DESCRIPTION, stdout); @@ -218,6 +225,7 @@ main (int argc, char **argv) char *userspec = NULL; char const *username = NULL; char const *groups = NULL; + bool skip_chdir = false; /* Parsed user and group IDs. */ uid_t uid = -1; @@ -254,6 +262,10 @@ main (int argc, char **argv) groups = optarg; break; + case SKIP_CHDIR: + skip_chdir = true; + break; + case_GETOPT_HELP_CHAR; case_GETOPT_VERSION_CHAR (PROGRAM_NAME, AUTHORS); @@ -269,9 +281,19 @@ main (int argc, char **argv) usage (EXIT_CANCELED); } + char const *newroot = argv[optind]; + bool is_oldroot = is_root (newroot); + + if (! is_oldroot && skip_chdir) + { + error (0, 0, _("option --skip-chdir only permitted if NEWROOT is old %s"), + quote ("/")); + usage (EXIT_CANCELED); + } + /* Only do chroot specific actions if actually changing root. The main difference here is that we don't change working dir. */ - if (! is_root (argv[optind])) + if (! is_oldroot) { /* We have to look up users and groups twice. - First, outside the chroot to load potentially necessary passwd/group @@ -307,14 +329,14 @@ main (int argc, char **argv) } #endif - if (chroot (argv[optind]) != 0) + if (chroot (newroot) != 0) error (EXIT_CANCELED, errno, _("cannot change root directory to %s"), - argv[optind]); - - if (chdir ("/")) - error (EXIT_CANCELED, errno, _("cannot chdir to root directory")); + newroot); } + if (! skip_chdir && chdir ("/")) + error (EXIT_CANCELED, errno, _("cannot chdir to root directory")); + if (argc == optind + 1) { /* No command. Run an interactive shell. */ Index: tests/cp/preserve-gid.sh =================================================================== --- tests/cp/preserve-gid.sh.orig +++ tests/cp/preserve-gid.sh @@ -117,7 +117,8 @@ t1() { u=$1; shift g=$1; shift t0 "$f" "$u" "$g" \ - chroot --user=+$nameless_uid:+$nameless_gid1 \ + chroot --skip-chdir \ + --user=+$nameless_uid:+$nameless_gid1 \ --groups="+$nameless_gid1,+$nameless_gid2" \ / env PATH="$tmp_path" "$@" } Index: tests/cp/special-bits.sh =================================================================== --- tests/cp/special-bits.sh.orig +++ tests/cp/special-bits.sh @@ -42,7 +42,8 @@ set _ $(ls -l b); shift; p1=$1 set _ $(ls -l b2); shift; p2=$1 test $p1 = $p2 || fail=1 -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" cp -p c c2 || fail=1 +chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" cp -p c c2 \ + || fail=1 set _ $(ls -l c); shift; p1=$1 set _ $(ls -l c2); shift; p2=$1 test $p1 = $p2 && fail=1 Index: tests/id/setgid.sh =================================================================== --- tests/id/setgid.sh.orig +++ tests/id/setgid.sh @@ -27,14 +27,14 @@ echo $gp1 > exp || framework_failure_ # With coreutils-8.16 and earlier, id -G would print both: # $gp1 $NON_ROOT_GID -chroot --user=$NON_ROOT_USERNAME:+$gp1 --groups='' / env PATH="$PATH" \ - id -G > out || fail=1 +chroot --skip-chdir --user=$NON_ROOT_USERNAME:+$gp1 --groups='' / \ + env PATH="$PATH" id -G > out || fail=1 compare exp out || fail=1 # With coreutils-8.22 and earlier, id would erroneously print # groups=$NON_ROOT_GID -chroot --user=$NON_ROOT_USERNAME:+$gp1 --groups='' / env PATH="$PATH" \ - id > out || fail=1 +chroot --skip-chdir --user=$NON_ROOT_USERNAME:+$gp1 --groups='' / \ + env PATH="$PATH" id > out || fail=1 grep -F "groups=$gp1" out || { cat out; fail=1; } Exit $fail Index: tests/misc/chroot-fail.sh =================================================================== --- tests/misc/chroot-fail.sh.orig +++ tests/misc/chroot-fail.sh @@ -30,7 +30,7 @@ chroot --- / true # unknown option test $? = 125 || fail=1 # Note chroot("/") succeeds for non-root users on some systems, but not all, -# however we avoid the chroot() with "/" to have common behvavior. +# however we avoid the chroot() with "/" to have common behavior. chroot / sh -c 'exit 2' # exit status propagation test $? = 2 || fail=1 chroot / . # invalid command @@ -38,10 +38,25 @@ test $? = 126 || fail=1 chroot / no_such # no such command test $? = 127 || fail=1 -# Ensure we don't chdir("/") when not changing root -# to allow only changing user ids for a command. -for dir in '/' '/.' '/../'; do +# Ensure that --skip-chdir fails with a non-"/" argument. +cat <<\EOF > exp || framework_failure_ +chroot: option --skip-chdir only permitted if NEWROOT is old '/' +Try 'chroot --help' for more information. +EOF +chroot --skip-chdir . env pwd >out 2>err && fail=1 +compare /dev/null out || fail=1 +compare exp err || fail=1 + +# Ensure we don't chroot("/") when NEWROOT is old "/". +ln -s / isroot || framework_failure_ +for dir in '/' '/.' '/../' isroot; do + # Verify that chroot(1) succeeds and performs chdir("/") + # (chroot(1) of coreutils-8.23 failed to run the latter). curdir=$(chroot "$dir" env pwd) || fail=1 + test "$curdir" = '/' || fail=1 + + # Test the "--skip-chdir" option. + curdir=$(chroot --skip-chdir "$dir" env pwd) || fail=1 test "$curdir" = '/' && fail=1 done Index: tests/misc/truncate-owned-by-other.sh =================================================================== --- tests/misc/truncate-owned-by-other.sh.orig +++ tests/misc/truncate-owned-by-other.sh @@ -29,7 +29,7 @@ chmod g+w root-owned # Ensure that the current directory is searchable by $NON_ROOT_USERNAME. chmod g+x . -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ +chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ truncate -s0 root-owned || fail=1 Exit $fail Index: tests/mv/sticky-to-xpart.sh =================================================================== --- tests/mv/sticky-to-xpart.sh.orig +++ tests/mv/sticky-to-xpart.sh @@ -42,7 +42,8 @@ chmod go+x . || framework_failure_ # Ensure that $NON_ROOT_USERNAME can access the required version of mv. version=$( - chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" mv --version | + chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ + mv --version | sed -n '1s/.* //p' ) case $version in @@ -50,7 +51,7 @@ case $version in *) skip_ "cannot access just-built mv as user $NON_ROOT_USERNAME";; esac -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ +chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ mv t/root-owned "$other_partition_tmpdir" 2> out-t && fail=1 # On some systems, we get 'Not owner'. Convert it. Index: tests/rm/fail-2eperm.sh =================================================================== --- tests/rm/fail-2eperm.sh.orig +++ tests/rm/fail-2eperm.sh @@ -32,14 +32,16 @@ touch a/b || framework_failure_ # Try to ensure that $NON_ROOT_USERNAME can access # the required version of rm. rm_version=$( - chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" rm --version | + chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ + rm --version | sed -n '1s/.* //p' ) case $rm_version in $PACKAGE_VERSION) ;; *) skip_ "cannot access just-built rm as user $NON_ROOT_USERNAME";; esac -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" rm -rf a 2> out-t && fail=1 +chroot --skip-chdir --user=$NON_ROOT_USERNAME / \ + env PATH="$PATH" rm -rf a 2> out-t && fail=1 # On some systems, we get 'Not owner'. Convert it. # On other systems (HPUX), we get 'Permission denied'. Convert it, too. Index: tests/rm/no-give-up.sh =================================================================== --- tests/rm/no-give-up.sh.orig +++ tests/rm/no-give-up.sh @@ -30,7 +30,7 @@ chmod go=x . || framework_failure_ # This must fail, since '.' is not writable by $NON_ROOT_USERNAME. -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ +chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ rm -rf d 2>/dev/null && fail=1 # d must remain. Index: tests/touch/now-owned-by-other.sh =================================================================== --- tests/touch/now-owned-by-other.sh.orig +++ tests/touch/now-owned-by-other.sh @@ -28,7 +28,7 @@ chmod g+w root-owned # Ensure that the current directory is searchable by $NON_ROOT_USERNAME. chmod g+x . -chroot --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ +chroot --skip-chdir --user=$NON_ROOT_USERNAME / env PATH="$PATH" \ touch -d now root-owned || fail=1 Exit $fail ++++++ coreutils-fix-man-deps.patch ++++++ --- man/local.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: man/local.mk =================================================================== --- man/local.mk.orig +++ man/local.mk @@ -41,7 +41,7 @@ distclean-local: test x$(srcdir) = x$(builddir) || rm -f $(ALL_MANS) # Dependencies common to all man pages. Updated below. -mandeps = +mandeps = $(PROGRAMS) # Depend on this to get version number changes. mandeps += .version ++++++ coreutils-getaddrinfo.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -4,8 +4,8 @@ Index: gnulib-tests/test-getaddrinfo.c =================================================================== ---- gnulib-tests/test-getaddrinfo.c.orig 2013-12-04 15:53:33.000000000 +0100 -+++ gnulib-tests/test-getaddrinfo.c 2014-02-20 17:59:57.474430854 +0100 +--- gnulib-tests/test-getaddrinfo.c.orig ++++ gnulib-tests/test-getaddrinfo.c @@ -86,11 +86,7 @@ simple (char const *host, char const *se the test merely because someone is down the country on their in-law's farm. */ ++++++ coreutils-i18n.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -154,7 +154,7 @@ + /* Output characters that are at the given positions. */ + character_mode, + - /* Output the given delimeter-separated fields. */ + /* Output the given delimiter-separated fields. */ field_mode }; @@ -167,12 +167,12 @@ + if this program runs on multibyte locale. */ +static int force_singlebyte_mode; + - /* If true do not output lines containing no delimeter characters. + /* If true do not output lines containing no delimiter characters. Otherwise, all such lines are printed. This option is valid only with field mode. */ @@ -126,6 +201,9 @@ static bool complement; - /* The delimeter character for field mode. */ + /* The delimiter character for field mode. */ static unsigned char delim; +#if HAVE_WCHAR_H +static wchar_t wcdelim; @@ -282,7 +282,7 @@ /* Read from stream STREAM, printing to standard output any selected fields. */ static void -@@ -629,13 +786,201 @@ cut_fields (FILE *stream) +@@ -649,13 +806,201 @@ cut_fields (FILE *stream) } } @@ -487,7 +487,7 @@ } /* Process file FILE to standard output. -@@ -687,6 +1032,7 @@ main (int argc, char **argv) +@@ -707,6 +1052,7 @@ main (int argc, char **argv) bool ok; bool delim_specified = false; char *spec_list_string IF_LINT ( = NULL); @@ -495,7 +495,7 @@ initialize_main (&argc, &argv); set_program_name (argv[0]); -@@ -709,7 +1055,6 @@ main (int argc, char **argv) +@@ -729,7 +1075,6 @@ main (int argc, char **argv) switch (optc) { case 'b': @@ -503,7 +503,7 @@ /* Build the byte list. */ if (operating_mode != undefined_mode) FATAL_ERROR (_("only one type of list may be specified")); -@@ -717,6 +1062,14 @@ main (int argc, char **argv) +@@ -737,6 +1082,14 @@ main (int argc, char **argv) spec_list_string = optarg; break; @@ -518,7 +518,7 @@ case 'f': /* Build the field list. */ if (operating_mode != undefined_mode) -@@ -728,10 +1081,38 @@ main (int argc, char **argv) +@@ -748,10 +1101,38 @@ main (int argc, char **argv) case 'd': /* New delimiter. */ /* Interpret -d '' to mean 'use the NUL byte as the delimiter.' */ @@ -561,7 +561,7 @@ break; case OUTPUT_DELIMITER_OPTION: -@@ -744,6 +1125,7 @@ main (int argc, char **argv) +@@ -764,6 +1145,7 @@ main (int argc, char **argv) break; case 'n': @@ -569,7 +569,7 @@ break; case 's': -@@ -783,15 +1165,34 @@ main (int argc, char **argv) +@@ -803,15 +1185,34 @@ main (int argc, char **argv) } if (!delim_specified) @@ -3352,7 +3352,7 @@ { /* Note xmemcoll0 is a performance enhancement as it will not unconditionally write '\0' after the -@@ -4113,6 +4738,7 @@ set_ordering (char const *s, struct keyf +@@ -4121,6 +4746,7 @@ set_ordering (char const *s, struct keyf break; case 'f': key->translate = fold_toupper; @@ -3360,7 +3360,7 @@ break; case 'g': key->general_numeric = true; -@@ -4190,7 +4816,7 @@ main (int argc, char **argv) +@@ -4198,7 +4824,7 @@ main (int argc, char **argv) initialize_exit_failure (SORT_FAILURE); hard_LC_COLLATE = hard_locale (LC_COLLATE); @@ -3369,7 +3369,7 @@ hard_LC_TIME = hard_locale (LC_TIME); #endif -@@ -4211,6 +4837,29 @@ main (int argc, char **argv) +@@ -4219,6 +4845,29 @@ main (int argc, char **argv) thousands_sep = -1; } @@ -3399,7 +3399,7 @@ have_read_stdin = false; inittables (); -@@ -4485,13 +5134,34 @@ main (int argc, char **argv) +@@ -4493,13 +5142,34 @@ main (int argc, char **argv) case 't': { @@ -3438,7 +3438,7 @@ else { /* Provoke with 'sort -txx'. Complain about -@@ -4502,9 +5172,12 @@ main (int argc, char **argv) +@@ -4510,9 +5180,12 @@ main (int argc, char **argv) quote (optarg)); } } @@ -3766,7 +3766,7 @@ static struct option const longopts[] = { {"count", no_argument, NULL, 'c'}, -@@ -249,7 +276,7 @@ size_opt (char const *opt, char const *m +@@ -251,7 +278,7 @@ size_opt (char const *opt, char const *m return a pointer to the beginning of the line's field to be compared. */ static char * _GL_ATTRIBUTE_PURE @@ -3775,7 +3775,7 @@ { size_t count; char const *lp = line->buffer; -@@ -269,6 +296,83 @@ find_field (struct linebuffer const *lin +@@ -271,6 +298,83 @@ find_field (struct linebuffer const *lin return line->buffer + i; } @@ -3859,7 +3859,7 @@ /* Return false if two strings OLD and NEW match, true if not. OLD and NEW point not to the beginnings of the lines but rather to the beginnings of the fields to compare. -@@ -277,6 +381,8 @@ find_field (struct linebuffer const *lin +@@ -279,6 +383,8 @@ find_field (struct linebuffer const *lin static bool different (char *old, char *new, size_t oldlen, size_t newlen) { @@ -3868,7 +3868,7 @@ if (check_chars < oldlen) oldlen = check_chars; if (check_chars < newlen) -@@ -284,15 +390,104 @@ different (char *old, char *new, size_t +@@ -286,15 +392,104 @@ different (char *old, char *new, size_t if (ignore_case) { @@ -3978,7 +3978,7 @@ /* Output the line in linebuffer LINE to standard output provided that the switches say it should be output. MATCH is true if the line matches the previous line. -@@ -356,19 +551,38 @@ check_file (const char *infile, const ch +@@ -358,19 +553,38 @@ check_file (const char *infile, const ch char *prevfield IF_LINT ( = NULL); size_t prevlen IF_LINT ( = 0); bool first_group_printed = false; @@ -4017,7 +4017,7 @@ new_group = (prevline->length == 0 || different (thisfield, prevfield, thislen, prevlen)); -@@ -386,6 +600,10 @@ check_file (const char *infile, const ch +@@ -388,6 +602,10 @@ check_file (const char *infile, const ch SWAP_LINES (prevline, thisline); prevfield = thisfield; prevlen = thislen; @@ -4028,7 +4028,7 @@ first_group_printed = true; } } -@@ -398,17 +616,26 @@ check_file (const char *infile, const ch +@@ -400,17 +618,26 @@ check_file (const char *infile, const ch size_t prevlen; uintmax_t match_count = 0; bool first_delimiter = true; @@ -4055,7 +4055,7 @@ if (readlinebuffer_delim (thisline, stdin, delimiter) == 0) { if (ferror (stdin)) -@@ -417,6 +644,14 @@ check_file (const char *infile, const ch +@@ -419,6 +646,14 @@ check_file (const char *infile, const ch } thisfield = find_field (thisline); thislen = thisline->length - 1 - (thisfield - thisline->buffer); @@ -4070,7 +4070,7 @@ match = !different (thisfield, prevfield, thislen, prevlen); match_count += match; -@@ -449,6 +684,9 @@ check_file (const char *infile, const ch +@@ -451,6 +686,9 @@ check_file (const char *infile, const ch SWAP_LINES (prevline, thisline); prevfield = thisfield; prevlen = thislen; @@ -4080,7 +4080,7 @@ if (!match) match_count = 0; } -@@ -495,6 +733,19 @@ main (int argc, char **argv) +@@ -497,6 +735,19 @@ main (int argc, char **argv) atexit (close_stdout); @@ -4104,7 +4104,7 @@ =================================================================== --- tests/local.mk.orig +++ tests/local.mk -@@ -324,6 +324,7 @@ all_tests = \ +@@ -331,6 +331,7 @@ all_tests = \ tests/misc/sort-discrim.sh \ tests/misc/sort-files0-from.pl \ tests/misc/sort-float.sh \ @@ -4130,7 +4130,7 @@ my $prog = 'cut'; my $try = "Try '$prog --help' for more information.\n"; -@@ -225,6 +227,7 @@ if ($mb_locale ne 'C') +@@ -227,6 +229,7 @@ if ($mb_locale ne 'C') my @new_t = @$t; my $test_name = shift @new_t; ++++++ coreutils-misc.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -6,8 +6,8 @@ Index: gnulib-tests/test-isnanl.h =================================================================== ---- gnulib-tests/test-isnanl.h.orig 2013-12-04 15:53:33.000000000 +0100 -+++ gnulib-tests/test-isnanl.h 2014-02-20 18:05:09.900982392 +0100 +--- gnulib-tests/test-isnanl.h.orig ++++ gnulib-tests/test-isnanl.h @@ -47,7 +47,7 @@ main () /* Quiet NaN. */ ASSERT (isnanl (NaNl ())); @@ -17,7 +17,7 @@ /* A bit pattern that is different from a Quiet NaN. With a bit of luck, it's a Signalling NaN. */ { -@@ -89,6 +89,7 @@ main () +@@ -98,6 +98,7 @@ main () { LDBL80_WORDS (0xFFFF, 0x83333333, 0x00000000) }; ASSERT (isnanl (x.value)); } @@ -25,7 +25,7 @@ /* The isnanl function should recognize Pseudo-NaNs, Pseudo-Infinities, Pseudo-Zeroes, Unnormalized Numbers, and Pseudo-Denormals, as defined in Intel IA-64 Architecture Software Developer's Manual, Volume 1: -@@ -122,6 +123,7 @@ main () +@@ -131,6 +132,7 @@ main () ASSERT (isnanl (x.value)); } #endif @@ -35,20 +35,20 @@ } Index: tests/misc/help-version.sh =================================================================== ---- tests/misc/help-version.sh.orig 2013-12-04 15:48:30.000000000 +0100 -+++ tests/misc/help-version.sh 2014-02-20 18:05:09.901982368 +0100 -@@ -245,6 +245,7 @@ parted_setup () { args="-s $tmp_in mklab +--- tests/misc/help-version.sh.orig ++++ tests/misc/help-version.sh +@@ -240,6 +240,7 @@ parted_setup () { args="-s $tmp_in mklab for i in $built_programs; do # Skip these. - case $i in chroot|stty|tty|false|chcon|runcon) continue;; esac + case $i in chroot|stty|tty|false|chcon|runcon|coreutils) continue;; esac + case $i in df) continue;; esac rm -rf $tmp_in $tmp_in2 $tmp_dir $tmp_out $bigZ_in $zin $zin2 echo z |gzip > $zin Index: tests/other-fs-tmpdir =================================================================== ---- tests/other-fs-tmpdir.orig 2014-02-20 18:05:09.901982368 +0100 -+++ tests/other-fs-tmpdir 2014-02-20 18:06:52.108548168 +0100 +--- tests/other-fs-tmpdir.orig ++++ tests/other-fs-tmpdir @@ -43,6 +43,9 @@ for d in $CANDIDATE_TMP_DIRS; do done ++++++ coreutils-ocfs2_reflinks.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -16,9 +16,9 @@ Index: src/copy.c =================================================================== ---- src/copy.c.orig 2014-02-20 17:50:19.791236017 +0100 -+++ src/copy.c 2014-02-20 17:54:06.068824055 +0100 -@@ -221,6 +221,46 @@ sparse_copy (int src_fd, int dest_fd, ch +--- src/copy.c.orig ++++ src/copy.c +@@ -229,6 +229,46 @@ sparse_copy (int src_fd, int dest_fd, ch return true; } @@ -65,7 +65,7 @@ /* Perform the O(1) btrfs clone operation, if possible. Upon success, return 0. Otherwise, return -1 and set errno. */ static inline int -@@ -930,6 +970,45 @@ copy_reg (char const *src_name, char con +@@ -938,6 +978,45 @@ copy_reg (char const *src_name, char con goto close_src_desc; } @@ -111,7 +111,7 @@ /* The semantics of the following open calls are mandated by the specs for both cp and mv. */ if (! *new_dst) -@@ -1075,17 +1154,20 @@ copy_reg (char const *src_name, char con +@@ -1083,17 +1162,20 @@ copy_reg (char const *src_name, char con /* --attributes-only overrides --reflink. */ if (data_copy_required && x->reflink_mode) { ++++++ coreutils-remove_hostname_documentation.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -6,15 +6,15 @@ =================================================================== --- doc/coreutils.texi.orig +++ doc/coreutils.texi -@@ -66,7 +66,6 @@ +@@ -69,7 +69,6 @@ * groups: (coreutils)groups invocation. Print group names a user is in. * head: (coreutils)head invocation. Output the first part of files. * hostid: (coreutils)hostid invocation. Print numeric host identifier. -* hostname: (coreutils)hostname invocation. Print or set system name. * id: (coreutils)id invocation. Print user identity. - * install: (coreutils)install invocation. Copy and change attributes. + * install: (coreutils)install invocation. Copy files and set attributes. * join: (coreutils)join invocation. Join lines on a common field. -@@ -198,7 +197,7 @@ Free Documentation License''. +@@ -201,7 +200,7 @@ Free Documentation License''. * File name manipulation:: dirname basename pathchk mktemp realpath * Working context:: pwd stty printenv tty * User information:: id logname whoami groups users who @@ -23,7 +23,7 @@ * SELinux context:: chcon runcon * Modified command invocation:: chroot env nice nohup stdbuf timeout * Process control:: kill -@@ -417,7 +416,6 @@ System context +@@ -421,7 +420,6 @@ System context * date invocation:: Print or set system date and time * nproc invocation:: Print the number of processors * uname invocation:: Print system information @@ -31,7 +31,7 @@ * hostid invocation:: Print numeric host identifier * uptime invocation:: Print system uptime and load -@@ -14852,7 +14850,6 @@ information. +@@ -14922,7 +14920,6 @@ information. * arch invocation:: Print machine hardware name. * nproc invocation:: Print the number of processors. * uname invocation:: Print system information. @@ -39,7 +39,7 @@ * hostid invocation:: Print numeric host identifier. * uptime invocation:: Print system uptime and load. @end menu -@@ -15674,15 +15671,6 @@ easily available, as is the case with Li +@@ -15744,15 +15741,6 @@ easily available, as is the case with Li Print the machine hardware name (sometimes called the hardware class or hardware type). @@ -55,7 +55,7 @@ @item -p @itemx --processor @opindex -p -@@ -15736,30 +15724,6 @@ Print the kernel version. +@@ -15806,30 +15794,6 @@ Print the kernel version. @exitstatus ++++++ coreutils-remove_kill_documentation.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -6,15 +6,15 @@ =================================================================== --- doc/coreutils.texi.orig +++ doc/coreutils.texi -@@ -69,7 +69,6 @@ +@@ -72,7 +72,6 @@ * id: (coreutils)id invocation. Print user identity. - * install: (coreutils)install invocation. Copy and change attributes. + * install: (coreutils)install invocation. Copy files and set attributes. * join: (coreutils)join invocation. Join lines on a common field. -* kill: (coreutils)kill invocation. Send a signal to processes. * link: (coreutils)link invocation. Make hard links between files. * ln: (coreutils)ln invocation. Make links between files. * logname: (coreutils)logname invocation. Print current login name. -@@ -200,7 +199,6 @@ Free Documentation License''. +@@ -203,7 +202,6 @@ Free Documentation License''. * System context:: date arch nproc uname hostid uptime * SELinux context:: chcon runcon * Modified command invocation:: chroot env nice nohup stdbuf timeout @@ -22,7 +22,7 @@ * Delaying:: sleep * Numeric operations:: factor seq * File permissions:: Access modes -@@ -444,10 +442,6 @@ Modified command invocation +@@ -448,10 +446,6 @@ Modified command invocation * stdbuf invocation:: Run a command with modified I/O buffering * timeout invocation:: Run a command with a time limit @@ -33,7 +33,7 @@ Delaying * sleep invocation:: Delay for a specified time -@@ -16606,90 +16600,6 @@ the exit status of @var{command} otherwi +@@ -16688,90 +16682,6 @@ the exit status of @var{command} otherwi @end display ++++++ coreutils-skip-gnulib-test-tls.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -21,7 +21,7 @@ =================================================================== --- gnulib-tests/gnulib.mk.orig +++ gnulib-tests/gnulib.mk -@@ -2303,9 +2303,10 @@ EXTRA_DIST += test-time.c +@@ -2206,9 +2206,10 @@ EXTRA_DIST += test-time.c ## begin gnulib module tls-tests ++++++ coreutils-tests-shorten-extreme-factor-tests.patch ++++++ --- /var/tmp/diff_new_pack.rT1GEV/_old 2014-08-03 15:35:45.000000000 +0200 +++ /var/tmp/diff_new_pack.rT1GEV/_new 2014-08-03 15:35:45.000000000 +0200 @@ -16,7 +16,7 @@ =================================================================== --- tests/local.mk.orig +++ tests/local.mk -@@ -649,14 +649,9 @@ all_tests = \ +@@ -661,14 +661,9 @@ all_tests = \ # See tests/factor/create-test.sh. tf = tests/factor factor_tests = \ -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org