Date: Thursday, April 10, 2014 @ 00:22:03
  Author: thomas
Revision: 210105

db-move: moved util-linux from [testing] to [core] (i686, x86_64)

Added:
  
util-linux/repos/core-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch
    (from rev 210099, 
util-linux/repos/testing-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
  
util-linux/repos/core-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
    (from rev 210099, 
util-linux/repos/testing-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch)
  util-linux/repos/core-i686/PKGBUILD
    (from rev 210099, util-linux/repos/testing-i686/PKGBUILD)
  util-linux/repos/core-i686/move_is_mountinfo.patch
    (from rev 210099, util-linux/repos/testing-i686/move_is_mountinfo.patch)
  util-linux/repos/core-i686/pam-common
    (from rev 210099, util-linux/repos/testing-i686/pam-common)
  util-linux/repos/core-i686/pam-login
    (from rev 210099, util-linux/repos/testing-i686/pam-login)
  util-linux/repos/core-i686/pam-su
    (from rev 210099, util-linux/repos/testing-i686/pam-su)
  util-linux/repos/core-i686/util-linux.install
    (from rev 210099, util-linux/repos/testing-i686/util-linux.install)
  util-linux/repos/core-i686/uuidd.tmpfiles
    (from rev 210099, util-linux/repos/testing-i686/uuidd.tmpfiles)
  
util-linux/repos/core-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch
    (from rev 210099, 
util-linux/repos/testing-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
  
util-linux/repos/core-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
    (from rev 210099, 
util-linux/repos/testing-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch)
  util-linux/repos/core-x86_64/PKGBUILD
    (from rev 210099, util-linux/repos/testing-x86_64/PKGBUILD)
  util-linux/repos/core-x86_64/move_is_mountinfo.patch
    (from rev 210099, util-linux/repos/testing-x86_64/move_is_mountinfo.patch)
  util-linux/repos/core-x86_64/pam-common
    (from rev 210099, util-linux/repos/testing-x86_64/pam-common)
  util-linux/repos/core-x86_64/pam-login
    (from rev 210099, util-linux/repos/testing-x86_64/pam-login)
  util-linux/repos/core-x86_64/pam-su
    (from rev 210099, util-linux/repos/testing-x86_64/pam-su)
  util-linux/repos/core-x86_64/util-linux.install
    (from rev 210099, util-linux/repos/testing-x86_64/util-linux.install)
  util-linux/repos/core-x86_64/uuidd.tmpfiles
    (from rev 210099, util-linux/repos/testing-x86_64/uuidd.tmpfiles)
Deleted:
  util-linux/repos/core-i686/PKGBUILD
  util-linux/repos/core-i686/pam-common
  util-linux/repos/core-i686/pam-login
  util-linux/repos/core-i686/pam-su
  util-linux/repos/core-i686/util-linux.install
  util-linux/repos/core-i686/uuidd.tmpfiles
  util-linux/repos/core-x86_64/PKGBUILD
  util-linux/repos/core-x86_64/pam-common
  util-linux/repos/core-x86_64/pam-login
  util-linux/repos/core-x86_64/pam-su
  util-linux/repos/core-x86_64/util-linux.install
  util-linux/repos/core-x86_64/uuidd.tmpfiles
  util-linux/repos/testing-i686/
  util-linux/repos/testing-x86_64/

-------------------------------------------------------------------------+
 /PKGBUILD                                                               |  236 
++++++++++
 /pam-common                                                             |   12 
 /pam-login                                                              |   14 
 /pam-su                                                                 |   18 
 /util-linux.install                                                     |   42 
+
 /uuidd.tmpfiles                                                         |    2 
 core-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch         |   98 
++++
 core-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch   |   59 
++
 core-i686/PKGBUILD                                                      |  104 
----
 core-i686/move_is_mountinfo.patch                                       |   46 
+
 core-i686/pam-common                                                    |    6 
 core-i686/pam-login                                                     |    7 
 core-i686/pam-su                                                        |    9 
 core-i686/util-linux.install                                            |   21 
 core-i686/uuidd.tmpfiles                                                |    1 
 core-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch       |   98 
++++
 core-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch |   59 
++
 core-x86_64/PKGBUILD                                                    |  104 
----
 core-x86_64/move_is_mountinfo.patch                                     |   46 
+
 core-x86_64/pam-common                                                  |    6 
 core-x86_64/pam-login                                                   |    7 
 core-x86_64/pam-su                                                      |    9 
 core-x86_64/util-linux.install                                          |   21 
 core-x86_64/uuidd.tmpfiles                                              |    1 
 24 files changed, 730 insertions(+), 296 deletions(-)

Copied: 
util-linux/repos/core-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch
 (from rev 210099, 
util-linux/repos/testing-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
===================================================================
--- core-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch             
                (rev 0)
+++ core-i686/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch     
2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,98 @@
+From 6c373810f5b1d32824371e9dff6ee5a006388f98 Mon Sep 17 00:00:00 2001
+From: Karel Zak <[email protected]>
+Date: Thu, 20 Feb 2014 16:59:11 +0100
+Subject: [PATCH] libmount: FS id and parent ID could be zero
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+It seems that linux 3.14 is able to produce things like:
+
+  19 0 8:3 / / rw,relatime - ext4 /dev/sda3 rw,data=ordered
+     ^
+
+Reported-by: Mantas Mikulėnas <[email protected]>
+Signed-off-by: Karel Zak <[email protected]>
+---
+ libmount/src/tab.c   | 12 ++++--------
+ misc-utils/findmnt.c |  5 +++--
+ 2 files changed, 7 insertions(+), 10 deletions(-)
+
+diff --git a/libmount/src/tab.c b/libmount/src/tab.c
+index 4c2f8a4..332312b 100644
+--- a/libmount/src/tab.c
++++ b/libmount/src/tab.c
+@@ -505,7 +505,7 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+       assert(tb);
+       assert(root);
+ 
+-      if (!tb || !root)
++      if (!tb || !root || !is_mountinfo(tb))
+               return -EINVAL;
+ 
+       DBG(TAB, mnt_debug_h(tb, "lookup root fs"));
+@@ -515,8 +515,6 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+       mnt_reset_iter(&itr, MNT_ITER_FORWARD);
+       while(mnt_table_next_fs(tb, &itr, &fs) == 0) {
+               int id = mnt_fs_get_parent_id(fs);
+-              if (!id)
+-                      break;          /* @tab is not a mountinfo file? */
+ 
+               if (!*root || id < root_id) {
+                       *root = fs;
+@@ -524,7 +522,7 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+               }
+       }
+ 
+-      return root_id ? 0 : -EINVAL;
++      return *root ? 0 : -EINVAL;
+ }
+ 
+ /**
+@@ -545,15 +543,13 @@ int mnt_table_next_child_fs(struct libmnt_table *tb, 
struct libmnt_iter *itr,
+       struct libmnt_fs *fs;
+       int parent_id, lastchld_id = 0, chld_id = 0;
+ 
+-      if (!tb || !itr || !parent)
++      if (!tb || !itr || !parent || !is_mountinfo(tb))
+               return -EINVAL;
+ 
+       DBG(TAB, mnt_debug_h(tb, "lookup next child of '%s'",
+                               mnt_fs_get_target(parent)));
+ 
+       parent_id = mnt_fs_get_id(parent);
+-      if (!parent_id)
+-              return -EINVAL;
+ 
+       /* get ID of the previously returned child */
+       if (itr->head && itr->p != itr->head) {
+@@ -584,7 +580,7 @@ int mnt_table_next_child_fs(struct libmnt_table *tb, 
struct libmnt_iter *itr,
+               }
+       }
+ 
+-      if (!chld_id)
++      if (!*chld)
+               return 1;       /* end of iterator */
+ 
+       /* set the iterator to the @chld for the next call */
+diff --git a/misc-utils/findmnt.c b/misc-utils/findmnt.c
+index fb21174..988cd73 100644
+--- a/misc-utils/findmnt.c
++++ b/misc-utils/findmnt.c
+@@ -822,8 +822,9 @@ static int tab_is_tree(struct libmnt_table *tb)
+       if (!itr)
+               return 0;
+ 
+-      if (mnt_table_next_fs(tb, itr, &fs) == 0)
+-              rc = mnt_fs_get_id(fs) > 0 && mnt_fs_get_parent_id(fs) > 0;
++      rc = (mnt_table_next_fs(tb, itr, &fs) == 0 &&
++            mnt_fs_is_kernel(fs) &&
++            mnt_fs_get_root(fs));
+ 
+       mnt_free_iter(itr);
+       return rc;
+-- 
+1.9.1
+

Copied: 
util-linux/repos/core-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
 (from rev 210099, 
util-linux/repos/testing-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch)
===================================================================
--- core-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch       
                        (rev 0)
+++ core-i686/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch       
2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,59 @@
+From 751c39383adaf5ff5a860516238d524b0e20f835 Mon Sep 17 00:00:00 2001
+From: Dave Reisner <[email protected]>
+Date: Wed, 2 Apr 2014 10:41:30 -0400
+Subject: [PATCH] switch_root: verify initramfs by f_type, not devno
+
+As of linux 3.14, the initramfs device will have both major and
+minor 0, causing our paranoia check to fail. Make this version agnostic
+by checking the filesystem type, rather than a device number.
+
+[adopted from master for backport into 2.24.x branch]
+
+Signed-off-by: Dave Reisner <[email protected]>
+---
+ sys-utils/switch_root.c | 15 +++++++++------
+ 1 file changed, 9 insertions(+), 6 deletions(-)
+
+diff --git a/sys-utils/switch_root.c b/sys-utils/switch_root.c
+index f26f7da..40e222d 100644
+--- a/sys-utils/switch_root.c
++++ b/sys-utils/switch_root.c
+@@ -23,6 +23,7 @@
+ #include <sys/mount.h>
+ #include <sys/types.h>
+ #include <sys/stat.h>
++#include <sys/statfs.h>
+ #include <sys/param.h>
+ #include <fcntl.h>
+ #include <stdio.h>
+@@ -33,6 +34,8 @@
+ #include <ctype.h>
+ #include <dirent.h>
+ 
++#include <linux/magic.h>
++
+ #include "c.h"
+ #include "nls.h"
+ #include "closestream.h"
+@@ -174,12 +177,12 @@ static int switchroot(const char *newroot)
+       if (cfd >= 0) {
+               pid = fork();
+               if (pid <= 0) {
+-                      if (fstat(cfd, &sb) == 0) {
+-                              if (sb.st_dev == makedev(0, 1))
+-                                      recursiveRemove(cfd);
+-                              else
+-                                      warn(_("old root filesystem is not an 
initramfs"));
+-                      }
++                      struct statfs stfs;
++                      if (fstatfs(cfd, &stfs) == 0 &&
++                          (stfs.f_type == RAMFS_MAGIC || stfs.f_type == 
TMPFS_MAGIC))
++                              recursiveRemove(cfd);
++                      else
++                              warn(_("old root filesystem is not an 
initramfs"));
+ 
+                       if (pid == 0)
+                               exit(EXIT_SUCCESS);
+-- 
+1.9.1
+

Deleted: core-i686/PKGBUILD
===================================================================
--- core-i686/PKGBUILD  2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/PKGBUILD  2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,104 +0,0 @@
-# $Id$
-# Maintainer: Tom Gundersen <[email protected]>
-# Maintainer: Dave Reisner <[email protected]>
-# Contributor: judd <[email protected]>
-
-pkgbase=util-linux
-pkgname=(util-linux libutil-linux)
-pkgver=2.24.1
-pkgrel=4
-pkgdesc="Miscellaneous system utilities for Linux"
-url="http://www.kernel.org/pub/linux/utils/util-linux/";
-arch=('i686' 'x86_64')
-groups=('base' 'base-devel')
-makedepends=('systemd' 'python')
-# checkdepends=('bc')
-license=('GPL2')
-options=('strip' 'debug')
-source=("ftp://ftp.kernel.org/pub/linux/utils/$pkgname/v2.24/$pkgname-$pkgver.tar.xz";
-        uuidd.tmpfiles
-        pam-login
-        pam-common
-        pam-su)
-md5sums=('88d46ae23ca599ac5af9cf96b531590f'
-         'a39554bfd65cccfd8254bb46922f4a67'
-         '4368b3f98abd8a32662e094c54e7f9b1'
-         'a31374fef2cba0ca34dfc7078e2969e4'
-         'fa85e5cce5d723275b14365ba71a8aad')
-
-build() {
-  cd "$pkgname-$pkgver"
-
-  ./configure --prefix=/usr \
-              --libdir=/usr/lib \
-              --bindir=/usr/bin \
-              --localstatedir=/run \
-              --enable-fs-paths-extra=/usr/bin \
-              --enable-raw \
-              --enable-vipw \
-              --enable-newgrp \
-              --enable-chfn-chsh \
-              --enable-write \
-              --enable-mesg \
-              --enable-socket-activation \
-              --with-python=3
-
-#              --enable-reset \ # part of ncurses
-#              --enable-last \ # not compat
-
-  make
-}
-
-#check() {
-# fails for some reason in chroot, works outside
-#  make -C "$pkgname-$pkgver" check
-#}
-
-package_util-linux() {
-  conflicts=('util-linux-ng' 'eject')
-  provides=("util-linux-ng=$pkgver" 'eject')
-  depends=('pam' 'shadow' 'coreutils' 'libsystemd' 'libutil-linux')
-  optdepends=('python: python bindings to libmount')
-  install=util-linux.install
-  backup=(etc/pam.d/chfn
-          etc/pam.d/chsh
-          etc/pam.d/login
-          etc/pam.d/su
-          etc/pam.d/su-l)
-
-  cd "$pkgname-$pkgver"
-
-  make DESTDIR="${pkgdir}" install
-
-  # setuid chfn and chsh
-  chmod 4755 "$pkgdir"/usr/bin/{newgrp,ch{sh,fn}}
-
-  # install PAM files for login-utils
-  install -Dm644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chfn"
-  install -m644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chsh"
-  install -m644 "$srcdir/pam-login" "$pkgdir/etc/pam.d/login"
-  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su"
-  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su-l"
-
-  # include tmpfiles fragment for uuidd
-  # TODO(dreisner): offer this upstream?
-  install -Dm644 "$srcdir/uuidd.tmpfiles" 
"$pkgdir/usr/lib/tmpfiles.d/uuidd.conf"
-
-  # usrmove
-  cd "$pkgdir"
-  mv {,usr/}sbin/* usr/bin
-  rmdir sbin usr/sbin
-
-  ### create libutil-linux split
-  rm -rf "$srcdir/_libutil-linux"
-  install -dm755 "$srcdir"/_libutil-linux/usr/lib
-  cd "$srcdir"/_libutil-linux
-  mv "$pkgdir"/usr/lib/lib*.{a,so}* usr/lib
-}
-
-package_libutil-linux() {
-  pkgdesc="util-linux runtime libraries"
-  provides=('libblkid.so' 'libmount.so' 'libuuid.so')
-
-  mv "$srcdir/_libutil-linux"/* "$pkgdir"
-}

Copied: util-linux/repos/core-i686/PKGBUILD (from rev 210099, 
util-linux/repos/testing-i686/PKGBUILD)
===================================================================
--- core-i686/PKGBUILD                          (rev 0)
+++ core-i686/PKGBUILD  2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,118 @@
+# $Id$
+# Maintainer: Tom Gundersen <[email protected]>
+# Maintainer: Dave Reisner <[email protected]>
+# Contributor: judd <[email protected]>
+
+pkgbase=util-linux
+pkgname=(util-linux libutil-linux)
+pkgver=2.24.1
+pkgrel=6
+pkgdesc="Miscellaneous system utilities for Linux"
+url="http://www.kernel.org/pub/linux/utils/util-linux/";
+arch=('i686' 'x86_64')
+groups=('base' 'base-devel')
+makedepends=('systemd' 'python')
+# checkdepends=('bc')
+license=('GPL2')
+options=('strip' 'debug')
+source=("ftp://ftp.kernel.org/pub/linux/utils/$pkgname/v2.24/$pkgname-$pkgver.tar.xz";
+        uuidd.tmpfiles
+        pam-login
+        pam-common
+        pam-su
+        move_is_mountinfo.patch
+        0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
+        0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
+md5sums=('88d46ae23ca599ac5af9cf96b531590f'
+         'a39554bfd65cccfd8254bb46922f4a67'
+         '4368b3f98abd8a32662e094c54e7f9b1'
+         'a31374fef2cba0ca34dfc7078e2969e4'
+         'fa85e5cce5d723275b14365ba71a8aad'
+         '4cdc5f9a6e51b032274761a82937d438'
+         'b7ca79a0d5318b7cd813bb2573a3f9a9'
+         '2f4bc305bd11d6bfaa81e6c1eb0c6f1b')
+
+prepare() {
+  cd "$pkgname-$pkgver"
+
+  patch -p1 -i "${srcdir}/move_is_mountinfo.patch"
+  patch -p1 -i 
"${srcdir}/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch"
+  patch -p1 -i 
"${srcdir}/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch"
+}
+
+build() {
+  cd "$pkgname-$pkgver"
+
+  ./configure --prefix=/usr \
+              --libdir=/usr/lib \
+              --bindir=/usr/bin \
+              --localstatedir=/run \
+              --enable-fs-paths-extra=/usr/bin \
+              --enable-raw \
+              --enable-vipw \
+              --enable-newgrp \
+              --enable-chfn-chsh \
+              --enable-write \
+              --enable-mesg \
+              --enable-socket-activation \
+              --with-python=3
+
+#              --enable-reset \ # part of ncurses
+#              --enable-last \ # not compat
+
+  make
+}
+
+#check() {
+# fails for some reason in chroot, works outside
+#  make -C "$pkgname-$pkgver" check
+#}
+
+package_util-linux() {
+  conflicts=('util-linux-ng' 'eject')
+  provides=("util-linux-ng=$pkgver" 'eject')
+  depends=('pam' 'shadow' 'coreutils' 'libsystemd' 'libutil-linux')
+  optdepends=('python: python bindings to libmount')
+  install=util-linux.install
+  backup=(etc/pam.d/chfn
+          etc/pam.d/chsh
+          etc/pam.d/login
+          etc/pam.d/su
+          etc/pam.d/su-l)
+
+  cd "$pkgname-$pkgver"
+
+  make DESTDIR="${pkgdir}" install
+
+  # setuid chfn and chsh
+  chmod 4755 "$pkgdir"/usr/bin/{newgrp,ch{sh,fn}}
+
+  # install PAM files for login-utils
+  install -Dm644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chfn"
+  install -m644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chsh"
+  install -m644 "$srcdir/pam-login" "$pkgdir/etc/pam.d/login"
+  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su"
+  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su-l"
+
+  # include tmpfiles fragment for uuidd
+  # TODO(dreisner): offer this upstream?
+  install -Dm644 "$srcdir/uuidd.tmpfiles" 
"$pkgdir/usr/lib/tmpfiles.d/uuidd.conf"
+
+  # usrmove
+  cd "$pkgdir"
+  mv {,usr/}sbin/* usr/bin
+  rmdir sbin usr/sbin
+
+  ### create libutil-linux split
+  rm -rf "$srcdir/_libutil-linux"
+  install -dm755 "$srcdir"/_libutil-linux/usr/lib
+  cd "$srcdir"/_libutil-linux
+  mv "$pkgdir"/usr/lib/lib*.{a,so}* usr/lib
+}
+
+package_libutil-linux() {
+  pkgdesc="util-linux runtime libraries"
+  provides=('libblkid.so' 'libmount.so' 'libuuid.so')
+
+  mv "$srcdir/_libutil-linux"/* "$pkgdir"
+}

Copied: util-linux/repos/core-i686/move_is_mountinfo.patch (from rev 210099, 
util-linux/repos/testing-i686/move_is_mountinfo.patch)
===================================================================
--- core-i686/move_is_mountinfo.patch                           (rev 0)
+++ core-i686/move_is_mountinfo.patch   2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,46 @@
+diff --git a/libmount/src/tab.c b/libmount/src/tab.c
+index 3633b6a..8ae49c8 100644
+--- a/libmount/src/tab.c
++++ b/libmount/src/tab.c
+@@ -47,6 +47,20 @@
+ #include "strutils.h"
+ #include "loopdev.h"
+ 
++static int is_mountinfo(struct libmnt_table *tb)
++{
++      struct libmnt_fs *fs;
++
++      if (!tb)
++              return 0;
++
++      fs = list_first_entry(&tb->ents, struct libmnt_fs, ents);
++      if (fs && mnt_fs_is_kernel(fs) && mnt_fs_get_root(fs))
++              return 1;
++
++      return 0;
++}
++
+ /**
+  * mnt_new_table:
+  *
+@@ -1229,20 +1335,6 @@ err:
+       return NULL;
+ }
+ 
+-static int is_mountinfo(struct libmnt_table *tb)
+-{
+-      struct libmnt_fs *fs;
+-
+-      if (!tb)
+-              return 0;
+-
+-      fs = list_first_entry(&tb->ents, struct libmnt_fs, ents);
+-      if (fs && mnt_fs_is_kernel(fs) && mnt_fs_get_root(fs))
+-              return 1;
+-
+-      return 0;
+-}
+-
+ /**
+  * mnt_table_is_fs__mounted:
+  * @tb: /proc/self/mountinfo file

Deleted: core-i686/pam-common
===================================================================
--- core-i686/pam-common        2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/pam-common        2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,6 +0,0 @@
-#%PAM-1.0
-auth           sufficient      pam_rootok.so
-auth           required        pam_unix.so
-account                required        pam_unix.so
-session                required        pam_unix.so
-password       required        pam_permit.so

Copied: util-linux/repos/core-i686/pam-common (from rev 210099, 
util-linux/repos/testing-i686/pam-common)
===================================================================
--- core-i686/pam-common                                (rev 0)
+++ core-i686/pam-common        2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,6 @@
+#%PAM-1.0
+auth           sufficient      pam_rootok.so
+auth           required        pam_unix.so
+account                required        pam_unix.so
+session                required        pam_unix.so
+password       required        pam_permit.so

Deleted: core-i686/pam-login
===================================================================
--- core-i686/pam-login 2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/pam-login 2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,7 +0,0 @@
-#%PAM-1.0
-
-auth       required     pam_securetty.so
-auth       requisite    pam_nologin.so
-auth       include      system-local-login
-account    include      system-local-login
-session    include      system-local-login

Copied: util-linux/repos/core-i686/pam-login (from rev 210099, 
util-linux/repos/testing-i686/pam-login)
===================================================================
--- core-i686/pam-login                         (rev 0)
+++ core-i686/pam-login 2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,7 @@
+#%PAM-1.0
+
+auth       required     pam_securetty.so
+auth       requisite    pam_nologin.so
+auth       include      system-local-login
+account    include      system-local-login
+session    include      system-local-login

Deleted: core-i686/pam-su
===================================================================
--- core-i686/pam-su    2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/pam-su    2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,9 +0,0 @@
-#%PAM-1.0
-auth           sufficient      pam_rootok.so
-# Uncomment the following line to implicitly trust users in the "wheel" group.
-#auth          sufficient      pam_wheel.so trust use_uid
-# Uncomment the following line to require a user to be in the "wheel" group.
-#auth          required        pam_wheel.so use_uid
-auth           required        pam_unix.so
-account                required        pam_unix.so
-session                required        pam_unix.so

Copied: util-linux/repos/core-i686/pam-su (from rev 210099, 
util-linux/repos/testing-i686/pam-su)
===================================================================
--- core-i686/pam-su                            (rev 0)
+++ core-i686/pam-su    2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,9 @@
+#%PAM-1.0
+auth           sufficient      pam_rootok.so
+# Uncomment the following line to implicitly trust users in the "wheel" group.
+#auth          sufficient      pam_wheel.so trust use_uid
+# Uncomment the following line to require a user to be in the "wheel" group.
+#auth          required        pam_wheel.so use_uid
+auth           required        pam_unix.so
+account                required        pam_unix.so
+session                required        pam_unix.so

Deleted: core-i686/util-linux.install
===================================================================
--- core-i686/util-linux.install        2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/util-linux.install        2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,21 +0,0 @@
-post_install() {
-  # we don't want use systemd-tmpfiles here because
-  # the package dependency would create a circular dep.
-  if [ ! -d run/uuidd ]; then
-    # refer to uid/gid by number to avoid dependency on filesystem
-    install -o 68 -g 68 -dm755 run/uuidd
-  fi
-}
-
-post_upgrade() {
-  if [ "$(vercmp $2 2.21.2-4)" -lt 0 ]; then
-    if [ -f /var/lib/hwclock/adjtime ]; then
-      mv /var/lib/hwclock/adjtime /etc/adjtime
-    fi
-    if [ -d /var/lib/hwclock ]; then
-      rmdir /var/lib/hwclock
-    fi
-  fi
-
-  post_install
-}

Copied: util-linux/repos/core-i686/util-linux.install (from rev 210099, 
util-linux/repos/testing-i686/util-linux.install)
===================================================================
--- core-i686/util-linux.install                                (rev 0)
+++ core-i686/util-linux.install        2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,21 @@
+post_install() {
+  # we don't want use systemd-tmpfiles here because
+  # the package dependency would create a circular dep.
+  if [ ! -d run/uuidd ]; then
+    # refer to uid/gid by number to avoid dependency on filesystem
+    install -o 68 -g 68 -dm755 run/uuidd
+  fi
+}
+
+post_upgrade() {
+  if [ "$(vercmp $2 2.21.2-4)" -lt 0 ]; then
+    if [ -f /var/lib/hwclock/adjtime ]; then
+      mv /var/lib/hwclock/adjtime /etc/adjtime
+    fi
+    if [ -d /var/lib/hwclock ]; then
+      rmdir /var/lib/hwclock
+    fi
+  fi
+
+  post_install
+}

Deleted: core-i686/uuidd.tmpfiles
===================================================================
--- core-i686/uuidd.tmpfiles    2014-04-09 22:22:01 UTC (rev 210104)
+++ core-i686/uuidd.tmpfiles    2014-04-09 22:22:03 UTC (rev 210105)
@@ -1 +0,0 @@
-d /run/uuidd 0755 uuidd uuidd

Copied: util-linux/repos/core-i686/uuidd.tmpfiles (from rev 210099, 
util-linux/repos/testing-i686/uuidd.tmpfiles)
===================================================================
--- core-i686/uuidd.tmpfiles                            (rev 0)
+++ core-i686/uuidd.tmpfiles    2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1 @@
+d /run/uuidd 0755 uuidd uuidd

Copied: 
util-linux/repos/core-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch
 (from rev 210099, 
util-linux/repos/testing-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
===================================================================
--- core-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch           
                (rev 0)
+++ core-x86_64/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch   
2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,98 @@
+From 6c373810f5b1d32824371e9dff6ee5a006388f98 Mon Sep 17 00:00:00 2001
+From: Karel Zak <[email protected]>
+Date: Thu, 20 Feb 2014 16:59:11 +0100
+Subject: [PATCH] libmount: FS id and parent ID could be zero
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+It seems that linux 3.14 is able to produce things like:
+
+  19 0 8:3 / / rw,relatime - ext4 /dev/sda3 rw,data=ordered
+     ^
+
+Reported-by: Mantas Mikulėnas <[email protected]>
+Signed-off-by: Karel Zak <[email protected]>
+---
+ libmount/src/tab.c   | 12 ++++--------
+ misc-utils/findmnt.c |  5 +++--
+ 2 files changed, 7 insertions(+), 10 deletions(-)
+
+diff --git a/libmount/src/tab.c b/libmount/src/tab.c
+index 4c2f8a4..332312b 100644
+--- a/libmount/src/tab.c
++++ b/libmount/src/tab.c
+@@ -505,7 +505,7 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+       assert(tb);
+       assert(root);
+ 
+-      if (!tb || !root)
++      if (!tb || !root || !is_mountinfo(tb))
+               return -EINVAL;
+ 
+       DBG(TAB, mnt_debug_h(tb, "lookup root fs"));
+@@ -515,8 +515,6 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+       mnt_reset_iter(&itr, MNT_ITER_FORWARD);
+       while(mnt_table_next_fs(tb, &itr, &fs) == 0) {
+               int id = mnt_fs_get_parent_id(fs);
+-              if (!id)
+-                      break;          /* @tab is not a mountinfo file? */
+ 
+               if (!*root || id < root_id) {
+                       *root = fs;
+@@ -524,7 +522,7 @@ int mnt_table_get_root_fs(struct libmnt_table *tb, struct 
libmnt_fs **root)
+               }
+       }
+ 
+-      return root_id ? 0 : -EINVAL;
++      return *root ? 0 : -EINVAL;
+ }
+ 
+ /**
+@@ -545,15 +543,13 @@ int mnt_table_next_child_fs(struct libmnt_table *tb, 
struct libmnt_iter *itr,
+       struct libmnt_fs *fs;
+       int parent_id, lastchld_id = 0, chld_id = 0;
+ 
+-      if (!tb || !itr || !parent)
++      if (!tb || !itr || !parent || !is_mountinfo(tb))
+               return -EINVAL;
+ 
+       DBG(TAB, mnt_debug_h(tb, "lookup next child of '%s'",
+                               mnt_fs_get_target(parent)));
+ 
+       parent_id = mnt_fs_get_id(parent);
+-      if (!parent_id)
+-              return -EINVAL;
+ 
+       /* get ID of the previously returned child */
+       if (itr->head && itr->p != itr->head) {
+@@ -584,7 +580,7 @@ int mnt_table_next_child_fs(struct libmnt_table *tb, 
struct libmnt_iter *itr,
+               }
+       }
+ 
+-      if (!chld_id)
++      if (!*chld)
+               return 1;       /* end of iterator */
+ 
+       /* set the iterator to the @chld for the next call */
+diff --git a/misc-utils/findmnt.c b/misc-utils/findmnt.c
+index fb21174..988cd73 100644
+--- a/misc-utils/findmnt.c
++++ b/misc-utils/findmnt.c
+@@ -822,8 +822,9 @@ static int tab_is_tree(struct libmnt_table *tb)
+       if (!itr)
+               return 0;
+ 
+-      if (mnt_table_next_fs(tb, itr, &fs) == 0)
+-              rc = mnt_fs_get_id(fs) > 0 && mnt_fs_get_parent_id(fs) > 0;
++      rc = (mnt_table_next_fs(tb, itr, &fs) == 0 &&
++            mnt_fs_is_kernel(fs) &&
++            mnt_fs_get_root(fs));
+ 
+       mnt_free_iter(itr);
+       return rc;
+-- 
+1.9.1
+

Copied: 
util-linux/repos/core-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
 (from rev 210099, 
util-linux/repos/testing-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch)
===================================================================
--- core-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch     
                        (rev 0)
+++ core-x86_64/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch     
2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,59 @@
+From 751c39383adaf5ff5a860516238d524b0e20f835 Mon Sep 17 00:00:00 2001
+From: Dave Reisner <[email protected]>
+Date: Wed, 2 Apr 2014 10:41:30 -0400
+Subject: [PATCH] switch_root: verify initramfs by f_type, not devno
+
+As of linux 3.14, the initramfs device will have both major and
+minor 0, causing our paranoia check to fail. Make this version agnostic
+by checking the filesystem type, rather than a device number.
+
+[adopted from master for backport into 2.24.x branch]
+
+Signed-off-by: Dave Reisner <[email protected]>
+---
+ sys-utils/switch_root.c | 15 +++++++++------
+ 1 file changed, 9 insertions(+), 6 deletions(-)
+
+diff --git a/sys-utils/switch_root.c b/sys-utils/switch_root.c
+index f26f7da..40e222d 100644
+--- a/sys-utils/switch_root.c
++++ b/sys-utils/switch_root.c
+@@ -23,6 +23,7 @@
+ #include <sys/mount.h>
+ #include <sys/types.h>
+ #include <sys/stat.h>
++#include <sys/statfs.h>
+ #include <sys/param.h>
+ #include <fcntl.h>
+ #include <stdio.h>
+@@ -33,6 +34,8 @@
+ #include <ctype.h>
+ #include <dirent.h>
+ 
++#include <linux/magic.h>
++
+ #include "c.h"
+ #include "nls.h"
+ #include "closestream.h"
+@@ -174,12 +177,12 @@ static int switchroot(const char *newroot)
+       if (cfd >= 0) {
+               pid = fork();
+               if (pid <= 0) {
+-                      if (fstat(cfd, &sb) == 0) {
+-                              if (sb.st_dev == makedev(0, 1))
+-                                      recursiveRemove(cfd);
+-                              else
+-                                      warn(_("old root filesystem is not an 
initramfs"));
+-                      }
++                      struct statfs stfs;
++                      if (fstatfs(cfd, &stfs) == 0 &&
++                          (stfs.f_type == RAMFS_MAGIC || stfs.f_type == 
TMPFS_MAGIC))
++                              recursiveRemove(cfd);
++                      else
++                              warn(_("old root filesystem is not an 
initramfs"));
+ 
+                       if (pid == 0)
+                               exit(EXIT_SUCCESS);
+-- 
+1.9.1
+

Deleted: core-x86_64/PKGBUILD
===================================================================
--- core-x86_64/PKGBUILD        2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/PKGBUILD        2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,104 +0,0 @@
-# $Id$
-# Maintainer: Tom Gundersen <[email protected]>
-# Maintainer: Dave Reisner <[email protected]>
-# Contributor: judd <[email protected]>
-
-pkgbase=util-linux
-pkgname=(util-linux libutil-linux)
-pkgver=2.24.1
-pkgrel=4
-pkgdesc="Miscellaneous system utilities for Linux"
-url="http://www.kernel.org/pub/linux/utils/util-linux/";
-arch=('i686' 'x86_64')
-groups=('base' 'base-devel')
-makedepends=('systemd' 'python')
-# checkdepends=('bc')
-license=('GPL2')
-options=('strip' 'debug')
-source=("ftp://ftp.kernel.org/pub/linux/utils/$pkgname/v2.24/$pkgname-$pkgver.tar.xz";
-        uuidd.tmpfiles
-        pam-login
-        pam-common
-        pam-su)
-md5sums=('88d46ae23ca599ac5af9cf96b531590f'
-         'a39554bfd65cccfd8254bb46922f4a67'
-         '4368b3f98abd8a32662e094c54e7f9b1'
-         'a31374fef2cba0ca34dfc7078e2969e4'
-         'fa85e5cce5d723275b14365ba71a8aad')
-
-build() {
-  cd "$pkgname-$pkgver"
-
-  ./configure --prefix=/usr \
-              --libdir=/usr/lib \
-              --bindir=/usr/bin \
-              --localstatedir=/run \
-              --enable-fs-paths-extra=/usr/bin \
-              --enable-raw \
-              --enable-vipw \
-              --enable-newgrp \
-              --enable-chfn-chsh \
-              --enable-write \
-              --enable-mesg \
-              --enable-socket-activation \
-              --with-python=3
-
-#              --enable-reset \ # part of ncurses
-#              --enable-last \ # not compat
-
-  make
-}
-
-#check() {
-# fails for some reason in chroot, works outside
-#  make -C "$pkgname-$pkgver" check
-#}
-
-package_util-linux() {
-  conflicts=('util-linux-ng' 'eject')
-  provides=("util-linux-ng=$pkgver" 'eject')
-  depends=('pam' 'shadow' 'coreutils' 'libsystemd' 'libutil-linux')
-  optdepends=('python: python bindings to libmount')
-  install=util-linux.install
-  backup=(etc/pam.d/chfn
-          etc/pam.d/chsh
-          etc/pam.d/login
-          etc/pam.d/su
-          etc/pam.d/su-l)
-
-  cd "$pkgname-$pkgver"
-
-  make DESTDIR="${pkgdir}" install
-
-  # setuid chfn and chsh
-  chmod 4755 "$pkgdir"/usr/bin/{newgrp,ch{sh,fn}}
-
-  # install PAM files for login-utils
-  install -Dm644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chfn"
-  install -m644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chsh"
-  install -m644 "$srcdir/pam-login" "$pkgdir/etc/pam.d/login"
-  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su"
-  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su-l"
-
-  # include tmpfiles fragment for uuidd
-  # TODO(dreisner): offer this upstream?
-  install -Dm644 "$srcdir/uuidd.tmpfiles" 
"$pkgdir/usr/lib/tmpfiles.d/uuidd.conf"
-
-  # usrmove
-  cd "$pkgdir"
-  mv {,usr/}sbin/* usr/bin
-  rmdir sbin usr/sbin
-
-  ### create libutil-linux split
-  rm -rf "$srcdir/_libutil-linux"
-  install -dm755 "$srcdir"/_libutil-linux/usr/lib
-  cd "$srcdir"/_libutil-linux
-  mv "$pkgdir"/usr/lib/lib*.{a,so}* usr/lib
-}
-
-package_libutil-linux() {
-  pkgdesc="util-linux runtime libraries"
-  provides=('libblkid.so' 'libmount.so' 'libuuid.so')
-
-  mv "$srcdir/_libutil-linux"/* "$pkgdir"
-}

Copied: util-linux/repos/core-x86_64/PKGBUILD (from rev 210099, 
util-linux/repos/testing-x86_64/PKGBUILD)
===================================================================
--- core-x86_64/PKGBUILD                                (rev 0)
+++ core-x86_64/PKGBUILD        2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,118 @@
+# $Id$
+# Maintainer: Tom Gundersen <[email protected]>
+# Maintainer: Dave Reisner <[email protected]>
+# Contributor: judd <[email protected]>
+
+pkgbase=util-linux
+pkgname=(util-linux libutil-linux)
+pkgver=2.24.1
+pkgrel=6
+pkgdesc="Miscellaneous system utilities for Linux"
+url="http://www.kernel.org/pub/linux/utils/util-linux/";
+arch=('i686' 'x86_64')
+groups=('base' 'base-devel')
+makedepends=('systemd' 'python')
+# checkdepends=('bc')
+license=('GPL2')
+options=('strip' 'debug')
+source=("ftp://ftp.kernel.org/pub/linux/utils/$pkgname/v2.24/$pkgname-$pkgver.tar.xz";
+        uuidd.tmpfiles
+        pam-login
+        pam-common
+        pam-su
+        move_is_mountinfo.patch
+        0001-switch_root-verify-initramfs-by-f_type-not-devno.patch
+        0001-libmount-FS-id-and-parent-ID-could-be-zero.patch)
+md5sums=('88d46ae23ca599ac5af9cf96b531590f'
+         'a39554bfd65cccfd8254bb46922f4a67'
+         '4368b3f98abd8a32662e094c54e7f9b1'
+         'a31374fef2cba0ca34dfc7078e2969e4'
+         'fa85e5cce5d723275b14365ba71a8aad'
+         '4cdc5f9a6e51b032274761a82937d438'
+         'b7ca79a0d5318b7cd813bb2573a3f9a9'
+         '2f4bc305bd11d6bfaa81e6c1eb0c6f1b')
+
+prepare() {
+  cd "$pkgname-$pkgver"
+
+  patch -p1 -i "${srcdir}/move_is_mountinfo.patch"
+  patch -p1 -i 
"${srcdir}/0001-libmount-FS-id-and-parent-ID-could-be-zero.patch"
+  patch -p1 -i 
"${srcdir}/0001-switch_root-verify-initramfs-by-f_type-not-devno.patch"
+}
+
+build() {
+  cd "$pkgname-$pkgver"
+
+  ./configure --prefix=/usr \
+              --libdir=/usr/lib \
+              --bindir=/usr/bin \
+              --localstatedir=/run \
+              --enable-fs-paths-extra=/usr/bin \
+              --enable-raw \
+              --enable-vipw \
+              --enable-newgrp \
+              --enable-chfn-chsh \
+              --enable-write \
+              --enable-mesg \
+              --enable-socket-activation \
+              --with-python=3
+
+#              --enable-reset \ # part of ncurses
+#              --enable-last \ # not compat
+
+  make
+}
+
+#check() {
+# fails for some reason in chroot, works outside
+#  make -C "$pkgname-$pkgver" check
+#}
+
+package_util-linux() {
+  conflicts=('util-linux-ng' 'eject')
+  provides=("util-linux-ng=$pkgver" 'eject')
+  depends=('pam' 'shadow' 'coreutils' 'libsystemd' 'libutil-linux')
+  optdepends=('python: python bindings to libmount')
+  install=util-linux.install
+  backup=(etc/pam.d/chfn
+          etc/pam.d/chsh
+          etc/pam.d/login
+          etc/pam.d/su
+          etc/pam.d/su-l)
+
+  cd "$pkgname-$pkgver"
+
+  make DESTDIR="${pkgdir}" install
+
+  # setuid chfn and chsh
+  chmod 4755 "$pkgdir"/usr/bin/{newgrp,ch{sh,fn}}
+
+  # install PAM files for login-utils
+  install -Dm644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chfn"
+  install -m644 "$srcdir/pam-common" "$pkgdir/etc/pam.d/chsh"
+  install -m644 "$srcdir/pam-login" "$pkgdir/etc/pam.d/login"
+  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su"
+  install -m644 "$srcdir/pam-su" "${pkgdir}/etc/pam.d/su-l"
+
+  # include tmpfiles fragment for uuidd
+  # TODO(dreisner): offer this upstream?
+  install -Dm644 "$srcdir/uuidd.tmpfiles" 
"$pkgdir/usr/lib/tmpfiles.d/uuidd.conf"
+
+  # usrmove
+  cd "$pkgdir"
+  mv {,usr/}sbin/* usr/bin
+  rmdir sbin usr/sbin
+
+  ### create libutil-linux split
+  rm -rf "$srcdir/_libutil-linux"
+  install -dm755 "$srcdir"/_libutil-linux/usr/lib
+  cd "$srcdir"/_libutil-linux
+  mv "$pkgdir"/usr/lib/lib*.{a,so}* usr/lib
+}
+
+package_libutil-linux() {
+  pkgdesc="util-linux runtime libraries"
+  provides=('libblkid.so' 'libmount.so' 'libuuid.so')
+
+  mv "$srcdir/_libutil-linux"/* "$pkgdir"
+}

Copied: util-linux/repos/core-x86_64/move_is_mountinfo.patch (from rev 210099, 
util-linux/repos/testing-x86_64/move_is_mountinfo.patch)
===================================================================
--- core-x86_64/move_is_mountinfo.patch                         (rev 0)
+++ core-x86_64/move_is_mountinfo.patch 2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,46 @@
+diff --git a/libmount/src/tab.c b/libmount/src/tab.c
+index 3633b6a..8ae49c8 100644
+--- a/libmount/src/tab.c
++++ b/libmount/src/tab.c
+@@ -47,6 +47,20 @@
+ #include "strutils.h"
+ #include "loopdev.h"
+ 
++static int is_mountinfo(struct libmnt_table *tb)
++{
++      struct libmnt_fs *fs;
++
++      if (!tb)
++              return 0;
++
++      fs = list_first_entry(&tb->ents, struct libmnt_fs, ents);
++      if (fs && mnt_fs_is_kernel(fs) && mnt_fs_get_root(fs))
++              return 1;
++
++      return 0;
++}
++
+ /**
+  * mnt_new_table:
+  *
+@@ -1229,20 +1335,6 @@ err:
+       return NULL;
+ }
+ 
+-static int is_mountinfo(struct libmnt_table *tb)
+-{
+-      struct libmnt_fs *fs;
+-
+-      if (!tb)
+-              return 0;
+-
+-      fs = list_first_entry(&tb->ents, struct libmnt_fs, ents);
+-      if (fs && mnt_fs_is_kernel(fs) && mnt_fs_get_root(fs))
+-              return 1;
+-
+-      return 0;
+-}
+-
+ /**
+  * mnt_table_is_fs__mounted:
+  * @tb: /proc/self/mountinfo file

Deleted: core-x86_64/pam-common
===================================================================
--- core-x86_64/pam-common      2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/pam-common      2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,6 +0,0 @@
-#%PAM-1.0
-auth           sufficient      pam_rootok.so
-auth           required        pam_unix.so
-account                required        pam_unix.so
-session                required        pam_unix.so
-password       required        pam_permit.so

Copied: util-linux/repos/core-x86_64/pam-common (from rev 210099, 
util-linux/repos/testing-x86_64/pam-common)
===================================================================
--- core-x86_64/pam-common                              (rev 0)
+++ core-x86_64/pam-common      2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,6 @@
+#%PAM-1.0
+auth           sufficient      pam_rootok.so
+auth           required        pam_unix.so
+account                required        pam_unix.so
+session                required        pam_unix.so
+password       required        pam_permit.so

Deleted: core-x86_64/pam-login
===================================================================
--- core-x86_64/pam-login       2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/pam-login       2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,7 +0,0 @@
-#%PAM-1.0
-
-auth       required     pam_securetty.so
-auth       requisite    pam_nologin.so
-auth       include      system-local-login
-account    include      system-local-login
-session    include      system-local-login

Copied: util-linux/repos/core-x86_64/pam-login (from rev 210099, 
util-linux/repos/testing-x86_64/pam-login)
===================================================================
--- core-x86_64/pam-login                               (rev 0)
+++ core-x86_64/pam-login       2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,7 @@
+#%PAM-1.0
+
+auth       required     pam_securetty.so
+auth       requisite    pam_nologin.so
+auth       include      system-local-login
+account    include      system-local-login
+session    include      system-local-login

Deleted: core-x86_64/pam-su
===================================================================
--- core-x86_64/pam-su  2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/pam-su  2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,9 +0,0 @@
-#%PAM-1.0
-auth           sufficient      pam_rootok.so
-# Uncomment the following line to implicitly trust users in the "wheel" group.
-#auth          sufficient      pam_wheel.so trust use_uid
-# Uncomment the following line to require a user to be in the "wheel" group.
-#auth          required        pam_wheel.so use_uid
-auth           required        pam_unix.so
-account                required        pam_unix.so
-session                required        pam_unix.so

Copied: util-linux/repos/core-x86_64/pam-su (from rev 210099, 
util-linux/repos/testing-x86_64/pam-su)
===================================================================
--- core-x86_64/pam-su                          (rev 0)
+++ core-x86_64/pam-su  2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,9 @@
+#%PAM-1.0
+auth           sufficient      pam_rootok.so
+# Uncomment the following line to implicitly trust users in the "wheel" group.
+#auth          sufficient      pam_wheel.so trust use_uid
+# Uncomment the following line to require a user to be in the "wheel" group.
+#auth          required        pam_wheel.so use_uid
+auth           required        pam_unix.so
+account                required        pam_unix.so
+session                required        pam_unix.so

Deleted: core-x86_64/util-linux.install
===================================================================
--- core-x86_64/util-linux.install      2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/util-linux.install      2014-04-09 22:22:03 UTC (rev 210105)
@@ -1,21 +0,0 @@
-post_install() {
-  # we don't want use systemd-tmpfiles here because
-  # the package dependency would create a circular dep.
-  if [ ! -d run/uuidd ]; then
-    # refer to uid/gid by number to avoid dependency on filesystem
-    install -o 68 -g 68 -dm755 run/uuidd
-  fi
-}
-
-post_upgrade() {
-  if [ "$(vercmp $2 2.21.2-4)" -lt 0 ]; then
-    if [ -f /var/lib/hwclock/adjtime ]; then
-      mv /var/lib/hwclock/adjtime /etc/adjtime
-    fi
-    if [ -d /var/lib/hwclock ]; then
-      rmdir /var/lib/hwclock
-    fi
-  fi
-
-  post_install
-}

Copied: util-linux/repos/core-x86_64/util-linux.install (from rev 210099, 
util-linux/repos/testing-x86_64/util-linux.install)
===================================================================
--- core-x86_64/util-linux.install                              (rev 0)
+++ core-x86_64/util-linux.install      2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1,21 @@
+post_install() {
+  # we don't want use systemd-tmpfiles here because
+  # the package dependency would create a circular dep.
+  if [ ! -d run/uuidd ]; then
+    # refer to uid/gid by number to avoid dependency on filesystem
+    install -o 68 -g 68 -dm755 run/uuidd
+  fi
+}
+
+post_upgrade() {
+  if [ "$(vercmp $2 2.21.2-4)" -lt 0 ]; then
+    if [ -f /var/lib/hwclock/adjtime ]; then
+      mv /var/lib/hwclock/adjtime /etc/adjtime
+    fi
+    if [ -d /var/lib/hwclock ]; then
+      rmdir /var/lib/hwclock
+    fi
+  fi
+
+  post_install
+}

Deleted: core-x86_64/uuidd.tmpfiles
===================================================================
--- core-x86_64/uuidd.tmpfiles  2014-04-09 22:22:01 UTC (rev 210104)
+++ core-x86_64/uuidd.tmpfiles  2014-04-09 22:22:03 UTC (rev 210105)
@@ -1 +0,0 @@
-d /run/uuidd 0755 uuidd uuidd

Copied: util-linux/repos/core-x86_64/uuidd.tmpfiles (from rev 210099, 
util-linux/repos/testing-x86_64/uuidd.tmpfiles)
===================================================================
--- core-x86_64/uuidd.tmpfiles                          (rev 0)
+++ core-x86_64/uuidd.tmpfiles  2014-04-09 22:22:03 UTC (rev 210105)
@@ -0,0 +1 @@
+d /run/uuidd 0755 uuidd uuidd

Reply via email to