summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/attr/acl
diff options
context:
space:
mode:
authorAlexander Kanavin <alex.kanavin@gmail.com>2020-01-14 14:59:53 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2020-01-16 22:33:09 +0000
commit3e9b54ed27b9852d195d8f8192af76948c390836 (patch)
tree9e47e843d9d652b6ff3bcb3078cd2d043740430f /meta/recipes-support/attr/acl
parent0e70fac8fe9dab4381e921f110bac301c10a470c (diff)
downloadpoky-3e9b54ed27b9852d195d8f8192af76948c390836.tar.gz
acl/attr: update to latest upstream releases
The latest release use standard autotools, so drop all the build system related hacks and patches. Ptests have been rewritten, with 100% pass rate for both. (From OE-Core rev: 0417eef364bad6d061b6a02bff27d766f4c1ce96) Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/attr/acl')
-rw-r--r--meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch63
-rw-r--r--meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch24
-rw-r--r--meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch51
-rw-r--r--meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch198
-rw-r--r--meta/recipes-support/attr/acl/configure.ac49
-rw-r--r--meta/recipes-support/attr/acl/run-ptest60
-rw-r--r--meta/recipes-support/attr/acl/test-fix-directory-permissions.patch37
-rw-r--r--meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch100
-rw-r--r--meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch84
9 files changed, 90 insertions, 576 deletions
diff --git a/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch b/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch
new file mode 100644
index 0000000000..ba2ffee5d2
--- /dev/null
+++ b/meta/recipes-support/attr/acl/0001-test-patch-out-failing-bits.patch
@@ -0,0 +1,63 @@
1From 9e08219e0e99ee2589cf35fa8d52cef3515accce Mon Sep 17 00:00:00 2001
2From: Alexander Kanavin <alex.kanavin@gmail.com>
3Date: Thu, 12 Dec 2019 15:47:49 +0100
4Subject: [PATCH] test: patch out failing bits
5
6I have confirmed on the host distro (Ubuntu 18.04) that they
7fail as well; upstream probably haven't noticed because the
8test is only executed under sudo.
9
10Upstream-Status: Inappropriate [disabling tests instead of fixing them properly]
11Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
12---
13 test/root/permissions.test | 13 -------------
14 1 file changed, 13 deletions(-)
15
16diff --git a/test/root/permissions.test b/test/root/permissions.test
17index 8f8f825..21e8a95 100644
18--- a/test/root/permissions.test
19+++ b/test/root/permissions.test
20@@ -50,10 +50,6 @@ User daemon is a member in the owning group, which has only read access.
21 Verify this.
22
23 $ su daemon
24- $ cat f
25- > root
26- > bin
27-
28 $ echo daemon >> f
29 >~ .*f: Permission denied$
30
31@@ -146,8 +142,6 @@ the owning group, he should still have no write access.
32 $ setfacl -x g:daemon f
33
34 $ su daemon
35- $ echo daemon4 >> f
36- >~ .*f: Permission denied$
37
38
39 Change the owning group. The other permissions should now grant user
40@@ -158,12 +152,6 @@ daemon write access.
41
42 $ su daemon
43 $ echo daemon5 >> f
44- $ cat f
45- > root
46- > bin
47- > daemon
48- > daemon2
49- > daemon5
50
51
52 Verify that permissions in separate matching ACL entries do not
53@@ -173,7 +161,6 @@ accumulate.
54 $ setfacl -m g:bin:r,g:daemon:w f
55
56 $ su daemon
57- $ : < f
58 $ : > f
59 $ : <> f
60 >~ .*f: Permission denied$
61--
622.17.1
63
diff --git a/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch b/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch
new file mode 100644
index 0000000000..57ef0bb728
--- /dev/null
+++ b/meta/recipes-support/attr/acl/0001-tests-do-not-hardcode-the-build-path-into-a-helper-l.patch
@@ -0,0 +1,24 @@
1From 39d332a8801de5d9ef09dacb3dba85c208b7b2ad Mon Sep 17 00:00:00 2001
2From: Alexander Kanavin <alex.kanavin@gmail.com>
3Date: Thu, 12 Dec 2019 13:45:52 +0100
4Subject: [PATCH] tests: do not hardcode the build path into a helper library
5
6Upstream-Status: Inappropriate [oe-core specific]
7Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
8---
9 test/Makemodule.am | 2 +-
10 1 file changed, 1 insertion(+), 1 deletion(-)
11
12diff --git a/test/Makemodule.am b/test/Makemodule.am
13index 17d4927..015de7f 100644
14--- a/test/Makemodule.am
15+++ b/test/Makemodule.am
16@@ -30,7 +30,7 @@ EXTRA_DIST += \
17 check_LTLIBRARIES = libtestlookup.la
18
19 libtestlookup_la_SOURCES = test/test_passwd.c test/test_group.c
20-libtestlookup_la_CFLAGS = -DBASEDIR=\"$(abs_srcdir)\"
21+libtestlookup_la_CFLAGS = -DBASEDIR=\"/tmp/acl-ptest\"
22 libtestlookup_la_LDFLAGS = -rpath $(abs_builddir)
23
24 AM_TESTS_ENVIRONMENT = PATH="$(abs_top_builddir):$$PATH";
diff --git a/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch b/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch
deleted file mode 100644
index 4c7cba3b88..0000000000
--- a/meta/recipes-support/attr/acl/Makefile-libacl-should-depend-on-include.patch
+++ /dev/null
@@ -1,51 +0,0 @@
1From d82457ce5ca7455e336da5e244d95f90e52aaef8 Mon Sep 17 00:00:00 2001
2From: Robert Yang <liezhi.yang@windriver.com>
3Date: Tue, 18 Apr 2017 01:17:26 -0700
4Subject: [PATCH] Makefile: libacl should depend on include
5
6Fixed race issue:
7 In file included from acl_copy_entry.c:22:0:
8 libacl.h:19:21: fatal error: sys/acl.h: No such file or directory
9 #include <sys/acl.h>
10
11[snip]
12
13 compilation terminated.
14 acl_get_file.c:27:24: fatal error: acl/libacl.h: No such file or directory
15 #include <acl/libacl.h>
16 ^
17
18The acl.h is in "include" directory, and include/Makefile creates
19symlink "sys" and "acl" poinst to current dirctory:
20$ ls include/ -l
21acl -> .
22sys -> .
23
24So if "libacl" target runs before "include", the error would happen
25since no "acl" or "sys" directory.
26
27Let libacl depend on include can fix the problem.
28
29Upstream-Status: Pending
30
31Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
32---
33 Makefile | 2 +-
34 1 file changed, 1 insertion(+), 1 deletion(-)
35
36diff --git a/Makefile b/Makefile
37index dce32d3..8a79379 100644
38--- a/Makefile
39+++ b/Makefile
40@@ -48,7 +48,7 @@ else
41 endif
42
43 # tool/lib dependencies
44-libacl: libmisc
45+libacl: include libmisc
46 getfacl setfacl chacl: libacl
47
48 ifeq ($(HAVE_BUILDDEFS), yes)
49--
502.10.2
51
diff --git a/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch b/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch
deleted file mode 100644
index cf765fdbb8..0000000000
--- a/meta/recipes-support/attr/acl/acl-fix-the-order-of-expected-output-of-getfacl.patch
+++ /dev/null
@@ -1,198 +0,0 @@
1acl: fix the order of expected output of getfacl
2
3The result of getfacl is sorted by user id.
4In Centos or RHEL, bin user id is 1 and daemon user id is 2.
5But in our image, bin user id is 2 and daemon user id is 1.
6The patch fixes this issue to make ptest pass.
7
8Upstream-Status: Inappropriate [embedded specific]
9
10Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
11---
12 test/misc.test | 38 +++++++++++++++++++-------------------
13 1 file changed, 19 insertions(+), 19 deletions(-)
14
15diff --git a/test/misc.test b/test/misc.test
16index 6e98053..53ae5b0 100644
17--- a/test/misc.test
18+++ b/test/misc.test
19@@ -79,8 +79,8 @@ Multiple users
20
21 $ getfacl --omit-header f
22 > user::rw-
23- > user:bin:rw-
24 > user:daemon:r--
25+ > user:bin:rw-
26 > group::r--
27 > mask::rw-
28 > other::r--
29@@ -94,8 +94,8 @@ Multiple groups
30
31 $ getfacl --omit-header f
32 > user::rw-
33- > user:bin:rw-
34 > user:daemon:r--
35+ > user:bin:rw-
36 > group::r--
37 > group:daemon:r--
38 > group:users:rw-
39@@ -111,8 +111,8 @@ Remove one group
40
41 $ getfacl --omit-header f
42 > user::rw-
43- > user:bin:rw-
44 > user:daemon:r--
45+ > user:bin:rw-
46 > group::r--
47 > group:daemon:r--
48 > mask::rw-
49@@ -146,8 +146,8 @@ Default ACL
50
51 $ getfacl --omit-header d
52 > user::rwx
53- > user:bin:rwx
54 > user:daemon:rw-
55+ > user:bin:rwx
56 > group::r-x
57 > mask::rwx
58 > other::---
59@@ -236,16 +236,16 @@ Add some users and groups
60
61 $ getfacl --omit-header d/d
62 > user::rwx
63- > user:bin:rwx #effective:r-x
64 > user:daemon:r-x
65+ > user:bin:rwx #effective:r-x
66 > group::r-x
67 > group:daemon:rwx #effective:r-x
68 > group:users:r-x
69 > mask::r-x
70 > other::---
71 > default:user::rwx
72- > default:user:bin:rwx #effective:r-x
73 > default:user:daemon:r-x
74+ > default:user:bin:rwx #effective:r-x
75 > default:group::r-x
76 > default:mask::r-x
77 > default:other::---
78@@ -262,16 +262,16 @@ Symlink in directory with default ACL?
79
80 $ getfacl --omit-header d/l
81 > user::rwx
82- > user:bin:rwx #effective:r-x
83 > user:daemon:r-x
84+ > user:bin:rwx #effective:r-x
85 > group::r-x
86 > group:daemon:rwx #effective:r-x
87 > group:users:r-x
88 > mask::r-x
89 > other::---
90 > default:user::rwx
91- > default:user:bin:rwx #effective:r-x
92 > default:user:daemon:r-x
93+ > default:user:bin:rwx #effective:r-x
94 > default:group::r-x
95 > default:mask::r-x
96 > default:other::---
97@@ -287,16 +287,16 @@ Does mask manipulation work?
98
99 $ getfacl --omit-header d/d
100 > user::rwx
101- > user:bin:r-x
102 > user:daemon:r-x
103+ > user:bin:r-x
104 > group::r-x
105 > group:daemon:r-x
106 > group:users:r-x
107 > mask::r-x
108 > other::---
109 > default:user::rwx
110- > default:user:bin:rwx #effective:r-x
111 > default:user:daemon:r-x
112+ > default:user:bin:rwx #effective:r-x
113 > default:group::r-x
114 > default:mask::r-x
115 > default:other::---
116@@ -308,16 +308,16 @@ Does mask manipulation work?
117
118 $ getfacl --omit-header d/d
119 > user::rwx
120- > user:bin:r-x
121 > user:daemon:r-x
122+ > user:bin:r-x
123 > group::r-x
124 > group:daemon:r-x
125 > group:users:r-x
126 > mask::r-x
127 > other::---
128 > default:user::rwx
129- > default:user:bin:rwx
130 > default:user:daemon:r-x
131+ > default:user:bin:rwx
132 > default:group::r-x
133 > default:mask::rwx
134 > default:other::---
135@@ -333,8 +333,8 @@ Remove the default ACL
136
137 $ getfacl --omit-header d
138 > user::rwx
139- > user:bin:rwx
140 > user:daemon:rw-
141+ > user:bin:rwx
142 > group::r-x
143 > mask::rwx
144 > other::---
145@@ -373,14 +373,14 @@ Now, chmod should change the group_obj entry
146
147 $ getfacl --omit-header d
148 > user::rwx
149- > user:bin:r-x
150 > user:daemon:rwx
151+ > user:bin:r-x
152 > group::rwx
153 > mask::rwx
154 > other::r-x
155 > default:user::rwx
156- > default:user:bin:r-x
157 > default:user:daemon:rwx
158+ > default:user:bin:r-x
159 > default:group::rwx
160 > default:mask::rwx
161 > default:other::r-x
162@@ -392,14 +392,14 @@ Now, chmod should change the group_obj entry
163
164 $ getfacl --omit-header d
165 > user::rwx
166- > user:bin:r-x
167 > user:daemon:rwx #effective:r-x
168+ > user:bin:r-x
169 > group::rwx #effective:r-x
170 > mask::r-x
171 > other::---
172 > default:user::rwx
173- > default:user:bin:r-x
174 > default:user:daemon:rwx
175+ > default:user:bin:r-x
176 > default:group::rwx
177 > default:mask::rwx
178 > default:other::r-x
179@@ -411,14 +411,14 @@ Now, chmod should change the group_obj entry
180
181 $ getfacl --omit-header d
182 > user::rwx
183- > user:bin:r-x
184 > user:daemon:rwx #effective:r-x
185+ > user:bin:r-x
186 > group::rwx #effective:r-x
187 > mask::r-x
188 > other::---
189 > default:user::rwx
190- > default:user:bin:r-x
191 > default:user:daemon:rwx
192+ > default:user:bin:r-x
193 > default:group::rwx
194 > default:mask::rwx
195 > default:other::r-x
196--
1971.7.9.5
198
diff --git a/meta/recipes-support/attr/acl/configure.ac b/meta/recipes-support/attr/acl/configure.ac
deleted file mode 100644
index 7af2e8d886..0000000000
--- a/meta/recipes-support/attr/acl/configure.ac
+++ /dev/null
@@ -1,49 +0,0 @@
1# Copyright (C) 2009 Andreas Gruenbacher <agruen@suse.de>
2#
3# This program is free software: you can redistribute it and/or modify it
4# under the terms of the GNU General Public License as published by
5# the Free Software Foundation, either version 2 of the License, or
6# (at your option) any later version.
7#
8# This program is distributed in the hope that it will be useful,
9# but WITHOUT ANY WARRANTY; without even the implied warranty of
10# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11# GNU General Public License for more details.
12#
13# You should have received a copy of the GNU General Public License
14# along with this program. If not, see <http://www.gnu.org/licenses/>.
15#
16AC_INIT(include/acl.h)
17AC_CONFIG_AUX_DIR([.])
18AC_CONFIG_MACRO_DIR([m4])
19AC_CONFIG_HEADER(include/config.h)
20AC_PREFIX_DEFAULT(/usr)
21
22AC_PROG_LIBTOOL
23
24AC_ARG_ENABLE(shared,
25[ --enable-shared=[yes/no] Enable use of shared libraries [default=yes]],,
26 enable_shared=yes)
27AC_SUBST(enable_shared)
28
29AC_ARG_ENABLE(gettext,
30[ --enable-gettext=[yes/no] Enable alternate language support [default=yes]],,
31 enable_gettext=yes)
32AC_SUBST(enable_gettext)
33
34AC_ARG_ENABLE(lib64,
35[ --enable-lib64=[yes/no] Enable lib64 support [default=no]],,
36 enable_lib64=no)
37AC_SUBST(enable_lib64)
38
39AC_PACKAGE_GLOBALS(acl)
40AC_PACKAGE_UTILITIES(acl)
41AC_PACKAGE_NEED_ATTR_XATTR_H
42AC_PACKAGE_NEED_ATTR_ERROR_H
43AC_MULTILIB($enable_lib64)
44AC_PACKAGE_NEED_GETXATTR_LIBATTR
45AC_MANUAL_FORMAT
46
47AC_FUNC_GCC_VISIBILITY
48
49AC_OUTPUT(include/builddefs)
diff --git a/meta/recipes-support/attr/acl/run-ptest b/meta/recipes-support/attr/acl/run-ptest
index a56946d8e6..4312823365 100644
--- a/meta/recipes-support/attr/acl/run-ptest
+++ b/meta/recipes-support/attr/acl/run-ptest
@@ -4,61 +4,7 @@
4 4
5#umask 077 5#umask 077
6 6
7EXT3_IMAGE=ext3.img 7mkdir -p /tmp/acl-ptest/test
8EXT3_MOUNT_POINT=/mnt/ext3 8cp test/test.* /tmp/acl-ptest/test
9 9
10trap 'rm -f ${EXT3_IMAGE}' EXIT 10make test-suite.log
11
12dd if=/dev/zero of=${EXT3_IMAGE} bs=1M count=1
13if [ "$?" -eq 0 ]; then
14 echo "PASS: dump ext3.img"
15else
16 echo "FAIL: dump ext3.img"
17 exit 1
18fi
19
20mkfs.ext3 -F ${EXT3_IMAGE}
21if [ "$?" -eq 0 ]; then
22 echo "PASS: mkfs.ext3 -F ext3.img"
23else
24 echo "FAIL: mkfs.ext3 -F ext3.img"
25 exit 1
26fi
27
28if [ -d $EXT3_MOUNT_POINT ]; then
29 echo "mount point exist"
30else
31 mkdir -p $EXT3_MOUNT_POINT
32fi
33
34
35mount -o loop,rw,acl ${EXT3_IMAGE} $EXT3_MOUNT_POINT
36if [ "$?" -eq 0 ]; then
37 echo "PASS: mount ext3.img"
38else
39 echo "FAIL: mount ext3.img"
40 exit 1
41fi
42
43cp -rf ./test/ $EXT3_MOUNT_POINT
44
45cd $EXT3_MOUNT_POINT/test/
46
47if sed -e 's!^bin:x:2:$!bin:x:2:daemon!' < /etc/group > gtmp
48then if cp /etc/group group.orig;
49 then cp gtmp /etc/group
50 make -k tests root-tests | sed \
51 -e 's|^\[.*\] \(.*\) -- ok$|PASS: \1|' \
52 -e 's|^\[.*\] \(.*\) -- failed|FAIL: \1|'
53 cp group.orig /etc/group
54 else echo "FAIL: couldn't save original group file."
55 exit 1
56 fi
57else echo "FAIL: couldn't create modified group file."
58 exit 1
59fi
60
61cd -
62umount $EXT3_MOUNT_POINT
63rm -rf $EXT3_MOUNT_POINT
64rm $EXT3_IMAGE
diff --git a/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch b/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch
deleted file mode 100644
index e64990ad5b..0000000000
--- a/meta/recipes-support/attr/acl/test-fix-directory-permissions.patch
+++ /dev/null
@@ -1,37 +0,0 @@
1From 311589fedf196168382d8f0db303ab328bcf9d83 Mon Sep 17 00:00:00 2001
2From: Peter Seebach <peter.seebach@windriver.com>
3Date: Wed, 11 May 2016 15:16:06 -0500
4Subject: [PATCH] acl.inc, run-ptest: improve ptest functionality on limited
5
6commit c45bae84817a70fef6c2b661a07a492a0d23ae85
7
8 Fix permissions on temporary directory
9
10 The temporary directory's permissions have to allow other users to
11 view the directory. A default umask of 022 is common, but not mandatory,
12 and secure systems may have more restrictive defaults.
13
14 Signed-off-by: Peter Seebach <peter.seebach@windriver.com>
15
16Upstream-Status: Backport [ http://git.savannah.gnu.org/cgit/acl.git/commit/?id=c6772a958800de064482634f77c20a0faafc5af6 ]
17
18Signed-off-by: Dengke Du <dengke.du@windriver.com>
19---
20 test/root/permissions.test | 1 +
21 1 file changed, 1 insertion(+)
22
23diff --git a/test/root/permissions.test b/test/root/permissions.test
24index 42615f5..098b52a 100644
25--- a/test/root/permissions.test
26+++ b/test/root/permissions.test
27@@ -16,6 +16,7 @@ Cry immediately if we are not running as root.
28 First, set up a temporary directory and create a regular file with
29 defined permissions.
30
31+ $ umask 022
32 $ mkdir d
33 $ cd d
34 $ umask 027
35--
362.8.1
37
diff --git a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch b/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch
deleted file mode 100644
index f392465b58..0000000000
--- a/meta/recipes-support/attr/acl/test-fix-insufficient-quoting-of.patch
+++ /dev/null
@@ -1,100 +0,0 @@
1From e98ce8acf84d12ea67a3ac76bf63c6d87d9af86d Mon Sep 17 00:00:00 2001
2From: Kamil Dudka <kdudka@redhat.com>
3Date: Mon, 20 May 2013 16:38:06 +0200
4Subject: [PATCH] test: fix insufficient quoting of '\'
5
6This is a follow-up to 7f2c91b8369242a8dbc2b304a5b71b2a85f5b855, which
7caused sbits-restore.test to fail in the following way in case SELinux
8was disabled:
9
10*** sbits-restore.test ***
11[3] $ umask 022 -- ok
12[4] $ mkdir d -- ok
13[5] $ touch d/g -- ok
14[6] $ touch d/u -- ok
15[7] $ chmod u+s d/u -- ok
16[8] $ chmod g+s d/g -- ok
17[9] $ chmod +t d -- ok
18[10] $ getfacl -R d > d.acl -- ok
19[11] $ rm -R d -- ok
20[12] $ mkdir d -- ok
21[13] $ touch d/g -- ok
22[14] $ touch d/u -- ok
23[15] $ setfacl --restore d.acl -- ok
24[16] $ ls -dl d | awk '{print $1}' | sed 's/.$//g' -- failed
25drwxr-xr- != drwxr-xr-t
26[18] $ ls -dl d/u | awk '{print $1}' | sed 's/.$//g' -- failed
27-rwSr--r- != -rwSr--r--
28[20] $ ls -dl d/g | awk '{print $1}' | sed 's/.$//g' -- failed
29-rw-r-Sr- != -rw-r-Sr--
30[22] $ rm -Rf d -- ok
3117 commands (14 passed, 3 failed)
32
33Upstream-Status: Backport
34http://git.savannah.gnu.org/cgit/acl.git/commit/?id=e98ce8acf84d12ea67a3ac76bf63c6d87d9af86d
35
36Signed-off-by: Kamil Dudka <kdudka@redhat.com>
37Signed-off-by: He Zhe <zhe.he@windriver.com>
38
39Index: acl-2.2.52/test/cp.test
40===================================================================
41--- acl-2.2.52.orig/test/cp.test
42+++ acl-2.2.52/test/cp.test
43@@ -9,7 +9,7 @@ The cp utility should only copy ACLs if
44 > -rw-rw-r--+
45
46 $ cp f g
47- $ ls -l g | awk -- '{ print $1 }' | sed 's/\.$//g'
48+ $ ls -l g | awk -- '{ print $1 }' | sed 's/\\.$//g'
49 > -rw-r--r--
50
51 $ rm g
52Index: acl-2.2.52/test/misc.test
53===================================================================
54--- acl-2.2.52.orig/test/misc.test
55+++ acl-2.2.52/test/misc.test
56@@ -254,7 +254,7 @@ Add some users and groups
57 Symlink in directory with default ACL?
58
59 $ ln -s d d/l
60- $ ls -dl d/l | awk '{print $1}' | sed 's/\.$//g'
61+ $ ls -dl d/l | awk '{print $1}' | sed 's/\\.$//g'
62 > lrwxrwxrwx
63
64 $ ls -dl -L d/l | awk '{print $1}'
65@@ -343,7 +343,7 @@ Remove the default ACL
66 Reset to base entries
67
68 $ setfacl -b d
69- $ ls -dl d | awk '{print $1}' | sed 's/\.$//g'
70+ $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g'
71 > drwxr-x---
72
73 $ getfacl --omit-header d
74@@ -355,7 +355,7 @@ Reset to base entries
75 Now, chmod should change the group_obj entry
76
77 $ chmod 775 d
78- $ ls -dl d | awk '{print $1}' | sed 's/\.$//g'
79+ $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g'
80 > drwxrwxr-x
81
82 $ getfacl --omit-header d
83Index: acl-2.2.52/test/sbits-restore.test
84===================================================================
85--- acl-2.2.52.orig/test/sbits-restore.test
86+++ acl-2.2.52/test/sbits-restore.test
87@@ -13,10 +13,10 @@ Ensure setting of SUID/SGID/sticky via -
88 $ touch d/g
89 $ touch d/u
90 $ setfacl --restore d.acl
91- $ ls -dl d | awk '{print $1}' | sed 's/\.$//g'
92+ $ ls -dl d | awk '{print $1}' | sed 's/\\.$//g'
93 > drwxr-xr-t
94- $ ls -dl d/u | awk '{print $1}' | sed 's/\.$//g'
95+ $ ls -dl d/u | awk '{print $1}' | sed 's/\\.$//g'
96 > -rwSr--r--
97- $ ls -dl d/g | awk '{print $1}' | sed 's/\.$//g'
98+ $ ls -dl d/g | awk '{print $1}' | sed 's/\\.$//g'
99 > -rw-r-Sr--
100 $ rm -Rf d
diff --git a/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch b/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch
deleted file mode 100644
index 8cc11a63e1..0000000000
--- a/meta/recipes-support/attr/acl/test-fixups-on-SELinux-machines-for-root-testcases.patch
+++ /dev/null
@@ -1,84 +0,0 @@
1From d2f49ee6fe4850b8dda5b08676b36201d3c43710 Mon Sep 17 00:00:00 2001
2From: He Zhe <zhe.he@windriver.com>
3Date: Wed, 2 Mar 2016 15:46:57 +0800
4Subject: [PATCH] test: fixups on SELinux machines for root testcases
5
6ls adds a '.' at the end of the permission field list on SELinux
7machines, filter this out so root tests work on SELinux machines.
8
9Upstream-Status: Accepted
10http://git.savannah.gnu.org/cgit/acl.git/commit/?id=26a87d36f80d5e98bccb5878834d9e69dadfe3e9
11
12Signed-off-by: He Zhe <zhe.he@windriver.com>
13---
14 test/root/permissions.test | 8 ++++----
15 test/root/restore.test | 2 +-
16 test/root/setfacl.test | 2 +-
17 3 files changed, 6 insertions(+), 6 deletions(-)
18
19diff --git a/test/root/permissions.test b/test/root/permissions.test
20index 9b9e3de..665339a 100644
21--- a/test/root/permissions.test
22+++ b/test/root/permissions.test
23@@ -19,7 +19,7 @@ defined permissions.
24 $ cd d
25 $ umask 027
26 $ touch f
27- $ ls -l f | awk -- '{ print $1, $3, $4 }'
28+ $ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g'
29 > -rw-r----- root root
30
31
32@@ -39,7 +39,7 @@ Now, change the ownership of the file to bin:bin and verify that this
33 gives user bin write access.
34
35 $ chown bin:bin f
36- $ ls -l f | awk -- '{ print $1, $3, $4 }'
37+ $ ls -l f | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g'
38 > -rw-r----- bin bin
39 $ su bin
40 $ echo bin >> f
41@@ -256,12 +256,12 @@ directories if the file has an ACL and only CAP_FOWNER would grant them.
42 $ mkdir -m 600 x
43 $ chown daemon:daemon x
44 $ echo j > x/j
45- $ ls -l x/j | awk -- '{ print $1, $3, $4 }'
46+ $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g'
47 > -rw-r----- root root
48
49 $ setfacl -m u:daemon:r x
50
51- $ ls -l x/j | awk -- '{ print $1, $3, $4 }'
52+ $ ls -l x/j | awk -- '{ print $1, $3, $4 }' | sed 's/\\.//g'
53 > -rw-r----- root root
54 (With the bug this gives: `ls: x/j: Permission denied'.)
55
56diff --git a/test/root/restore.test b/test/root/restore.test
57index 63a9d01..c85097c 100644
58--- a/test/root/restore.test
59+++ b/test/root/restore.test
60@@ -21,7 +21,7 @@ Cry immediately if we are not running as root.
61 $ chown bin passwd
62 $ chmod u+s passwd
63 $ setfacl --restore passwd.acl
64- $ ls -dl passwd | awk '{print $1 " " $3 " " $4}'
65+ $ ls -dl passwd | awk '{print $1 " " $3 " " $4}' | sed 's/\\.//g'
66 > -rwsr-xr-x root root
67
68 $ rm passwd passwd.acl
69diff --git a/test/root/setfacl.test b/test/root/setfacl.test
70index a46a9f4..7efbad7 100644
71--- a/test/root/setfacl.test
72+++ b/test/root/setfacl.test
73@@ -12,7 +12,7 @@ Cry immediately if we are not running as root.
74 $ sg bin
75 $ umask 027
76 $ touch g
77- $ ls -dl g | awk '{print $1}'
78+ $ ls -dl g | awk '{print $1}' | sed 's/\\.//g'
79 > -rw-r-----
80
81 $ setfacl -m m:- g
82--
831.9.1
84