diff --git a/.gitignore b/.gitignore
index e69de29..72362fe 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1,6 @@
+bash-4.1.tar.gz
+/bash-4.2-rc2.tar.gz
+/bash-4.2.tar.gz
+/bash-4.3.tar.gz
+/bash-4.4.tar.gz
+/bash-5.0.tar.gz
diff --git a/STAGE1-bash b/STAGE1-bash
new file mode 100644
index 0000000..c9ed3a9
--- /dev/null
+++ b/STAGE1-bash
@@ -0,0 +1,16 @@
+srpm bash
+mcd $BUILDDIR/bash
+cat <<EOF > config.cache
+bash_cv_func_ctype_nonascii=yes
+bash_cv_opendir_not_robust=no
+bash_cv_ulimit_maxfds=yes
+bash_cv_func_sigsetjmp=present
+bash_cv_printf_a_format=yes
+bash_cv_job_control_missing=present
+bash_cv_sys_named_pipes=present
+bash_cv_unusable_rtsigs=no
+EOF
+$SRC/bash-*/configure --prefix=/ --cache-file=config.cache --build=$BUILD --host=$TARGET
+make $J
+make $J install DESTDIR=${ROOTFS}
+(cd $ROOTFS/bin; ln -sf bash sh)
diff --git a/bash-2.03-paths.patch b/bash-2.03-paths.patch
new file mode 100644
index 0000000..24ec5cc
--- /dev/null
+++ b/bash-2.03-paths.patch
@@ -0,0 +1,11 @@
+--- bash-3.0/config-top.h.paths	2003-08-05 15:36:12.000000000 +0100
++++ bash-3.0/config-top.h	2004-07-28 09:36:27.117205637 +0100
+@@ -66,7 +66,7 @@
+    the Posix.2 confstr () function, or CS_PATH define are not present. */
+ #ifndef STANDARD_UTILS_PATH
+ #define STANDARD_UTILS_PATH \
+-  "/bin:/usr/bin:/sbin:/usr/sbin:/etc:/usr/etc"
++  "/bin:/usr/bin:/usr/sbin:/sbin"
+ #endif
+ 
+ /* Default primary and secondary prompt strings. */
diff --git a/bash-2.03-profile.patch b/bash-2.03-profile.patch
new file mode 100644
index 0000000..ba3344b
--- /dev/null
+++ b/bash-2.03-profile.patch
@@ -0,0 +1,12 @@
+diff -up bash-3.2/config-top.h.profile bash-3.2/config-top.h
+--- bash-3.2/config-top.h.profile	2008-07-17 13:35:39.000000000 +0200
++++ bash-3.2/config-top.h	2008-07-17 13:42:18.000000000 +0200
+@@ -26,6 +26,8 @@
+    what POSIX.2 specifies. */
+ #define CONTINUE_AFTER_KILL_ERROR
+ 
++#define NON_INTERACTIVE_LOGIN_SHELLS
++
+ /* Define BREAK_COMPLAINS if you want the non-standard, but useful
+    error messages about `break' and `continue' out of context. */
+ #define BREAK_COMPLAINS
diff --git a/bash-2.05a-interpreter.patch b/bash-2.05a-interpreter.patch
new file mode 100644
index 0000000..110e44d
--- /dev/null
+++ b/bash-2.05a-interpreter.patch
@@ -0,0 +1,218 @@
+diff --git a/config.h.in b/config.h.in
+index 0adc903..366e639 100644
+--- a/config.h.in
++++ b/config.h.in
+@@ -758,6 +758,9 @@
+ /* Define if you have the pselect function.  */
+ #undef HAVE_PSELECT
+ 
++/* Define if you have the pread function. */
++#undef HAVE_PREAD
++
+ /* Define if you have the putenv function.  */
+ #undef HAVE_PUTENV
+ 
+@@ -956,6 +959,9 @@
+ /* Define if you have the <dlfcn.h> header file.  */
+ #undef HAVE_DLFCN_H
+ 
++/* Define if you have the <elf.h> header file.  */
++#undef HAVE_ELF_H
++
+ /* Define if you have the <grp.h> header file.  */
+ #undef HAVE_GRP_H
+ 
+diff --git a/configure.ac b/configure.ac
+index 2c74f13..4e9c3a4 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -782,7 +782,7 @@ dnl checks for system calls
+ AC_CHECK_FUNCS(dup2 eaccess fcntl getdtablesize getgroups gethostname \
+ 		getpagesize getpeername getrlimit getrusage gettimeofday \
+ 		kill killpg lstat pselect readlink select setdtablesize \
+-		setitimer tcgetpgrp uname ulimit waitpid)
++		setitimer tcgetpgrp uname ulimit waitpid pread)
+ AC_REPLACE_FUNCS(rename)
+ 
+ dnl checks for c library functions
+diff --git a/execute_cmd.c b/execute_cmd.c
+index 4eae19c..0af6f8f 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -41,6 +41,10 @@
+ #  include <unistd.h>
+ #endif
+ 
++#ifdef HAVE_ELF_H
++# include <elf.h>
++#endif
++
+ #include "posixtime.h"
+ 
+ #if defined (HAVE_SYS_RESOURCE_H) && !defined (RLIMTYPE)
+@@ -5706,6 +5710,14 @@ shell_execve (command, args, env)
+ 	{
+ 	  /* The file has the execute bits set, but the kernel refuses to
+ 	     run it for some reason.  See why. */
++#if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H)
++       int fd = open (command, O_RDONLY);
++
++       if (fd >= 0)
++               sample_len = read (fd, sample, sizeof (sample));
++       else
++               sample_len = -1;
++#endif
+ #if defined (HAVE_HASH_BANG_EXEC)
+ 	  READ_SAMPLE_BUF (command, sample, sample_len);
+ 	  if (sample_len > 0)
+@@ -5715,6 +5727,7 @@ shell_execve (command, args, env)
+ 	      char *interp;
+ 	      int ilen;
+ 
++          close (fd);
+ 	      interp = getinterp (sample, sample_len, (int *)NULL);
+ 	      ilen = strlen (interp);
+ 	      errno = i;
+@@ -5730,7 +5743,138 @@ shell_execve (command, args, env)
+ 	      return (EX_NOEXEC);
+ 	    }
+ #endif
+-	  errno = i;
++#if defined (HAVE_ELF_H)
++	  if (i == ENOENT
++	      && sample_len > EI_NIDENT
++	      && memcmp (sample, ELFMAG, SELFMAG) == 0)
++	    {
++	      off_t offset = -1;
++
++	      /* It is an ELF file.  Now determine whether it is dynamically
++		 linked and if yes, get the offset of the interpreter
++		 string.  */
++	      if (sample[EI_CLASS] == ELFCLASS32
++		  && sample_len > sizeof (Elf32_Ehdr))
++		{
++		  Elf32_Ehdr ehdr;
++		  Elf32_Phdr *phdr;
++		  int nphdr;
++
++		  /* We have to copy the data since the sample buffer
++		     might not be aligned correctly to be accessed as
++		     an Elf32_Ehdr struct.  */
++		  memcpy (&ehdr, sample, sizeof (Elf32_Ehdr));
++
++		  nphdr = ehdr.e_phnum;
++		  phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize);
++		  if (phdr != NULL)
++		    {
++#ifdef HAVE_PREAD
++		      sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize,
++					  ehdr.e_phoff);
++#else
++		      if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1)
++			sample_len = read (fd, phdr,
++					   nphdr * ehdr.e_phentsize);
++		      else
++			sample_len = -1;
++#endif
++		      if (sample_len == nphdr * ehdr.e_phentsize)
++			while (nphdr-- > 0)
++			  if (phdr[nphdr].p_type == PT_INTERP)
++			    {
++			      offset = phdr[nphdr].p_offset;
++			      break;
++			    }
++		      free (phdr);
++		    }
++		}
++	      else if (sample[EI_CLASS] == ELFCLASS64
++		       && sample_len > sizeof (Elf64_Ehdr))
++		{
++		  Elf64_Ehdr ehdr;
++		  Elf64_Phdr *phdr;
++		  int nphdr;
++
++		  /* We have to copy the data since the sample buffer
++		     might not be aligned correctly to be accessed as
++		     an Elf64_Ehdr struct.  */
++		  memcpy (&ehdr, sample, sizeof (Elf64_Ehdr));
++
++		  nphdr = ehdr.e_phnum;
++		  phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize);
++		  if (phdr != NULL)
++		    {
++#ifdef HAVE_PREAD
++		      sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize,
++					  ehdr.e_phoff);
++#else
++		      if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1)
++			sample_len = read (fd, phdr,
++					   nphdr * ehdr.e_phentsize);
++		      else
++			sample_len = -1;
++#endif
++		      if (sample_len == nphdr * ehdr.e_phentsize)
++			while (nphdr-- > 0)
++			  if (phdr[nphdr].p_type == PT_INTERP)
++			    {
++			      offset = phdr[nphdr].p_offset;
++			      break;
++			    }
++		      free (phdr);
++		    }
++		}
++
++	      if (offset != -1)
++		{
++		  size_t maxlen = 0;
++		  size_t actlen = 0;
++		  char *interp = NULL;
++
++		  do
++		    {
++		      if (actlen == maxlen)
++			{
++			  char *newinterp = realloc (interp, maxlen += 200);
++			  if (newinterp == NULL)
++			    {
++			      actlen = 0;
++			      break;
++			    }
++			  interp = newinterp;
++
++#ifdef HAVE_PREAD
++			  actlen = pread (fd, interp, maxlen, offset);
++#else
++			  if (lseek (fd, offset, SEEK_SET) != -1)
++			    actlen = read (fd, interp, maxlen);
++			  else
++			    actlen = -1;
++#endif
++			}
++		    }
++		  while (actlen > 0 && memchr (interp, '\0', actlen) == NULL);
++
++		  if (actlen > 0)
++		    {
++		      close (fd);
++		      errno = i;
++		      sys_error ("%s: %s: bad ELF interpreter", command,
++				 interp);
++		      free (interp);
++		      return (EX_NOEXEC);
++		    }
++
++		  free (interp);
++		}
++	    }
++#endif
++#if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H)
++	  close (fd);
++#endif
++
++      errno = i;
+ 	  file_error (command);
+ 	}
+       return (last_command_exit_value);
+-- 
+2.17.2
+
diff --git a/bash-2.05b-debuginfo.patch b/bash-2.05b-debuginfo.patch
new file mode 100644
index 0000000..3278cab
--- /dev/null
+++ b/bash-2.05b-debuginfo.patch
@@ -0,0 +1,10 @@
+--- bash-2.05b/builtins/Makefile.in.debuginfo	2003-03-25 17:25:21.000000000 +0000
++++ bash-2.05b/builtins/Makefile.in	2003-03-25 17:25:49.000000000 +0000
+@@ -93,7 +93,6 @@
+ 	$(RM) $@
+ 	./$(MKBUILTINS) $(DIRECTDEFINE) $<
+ 	$(CC) -c $(CCFLAGS) $*.c || ( $(RM) $*.c ; exit 1 )
+-	$(RM) $*.c
+ 
+ # How to make a .c file from a .def file.
+ .def.c:
diff --git a/bash-2.05b-pgrp_sync.patch b/bash-2.05b-pgrp_sync.patch
new file mode 100644
index 0000000..bd7ded6
--- /dev/null
+++ b/bash-2.05b-pgrp_sync.patch
@@ -0,0 +1,11 @@
+--- bash-2.05b/aclocal.m4.pgrp_sync	2002-06-25 14:45:43.000000000 +0100
++++ bash-2.05b/aclocal.m4	2003-01-15 18:17:35.000000000 +0000
+@@ -1255,7 +1255,7 @@
+ 	wait(&status);
+ 	exit(ok ? 0 : 5);
+ }
+-], bash_cv_pgrp_pipe=no,bash_cv_pgrp_pipe=yes,
++], bash_cv_pgrp_pipe=yes,bash_cv_pgrp_pipe=yes,
+    [AC_MSG_WARN(cannot check pgrp synchronization if cross compiling -- defaulting to no)
+     bash_cv_pgrp_pipe=no])
+ ])
diff --git a/bash-3.2-audit.patch b/bash-3.2-audit.patch
new file mode 100644
index 0000000..48a1751
--- /dev/null
+++ b/bash-3.2-audit.patch
@@ -0,0 +1,96 @@
+diff -up bash-4.2/config.h.in.audit bash-4.2/config.h.in
+--- bash-4.2/config.h.in.audit	2013-01-31 16:26:16.857698992 +0100
++++ bash-4.2/config.h.in	2013-01-31 16:26:16.876699255 +0100
+@@ -1131,6 +1131,14 @@
+ 
+ /* End additions for lib/intl */
+ 
++
++/* Additions for lib/readline */
++
++/* Define if you have <linux/audit.h> and it defines AUDIT_USER_TTY */
++#undef HAVE_DECL_AUDIT_USER_TTY
++
++/* End additions for lib/readline */
++
+ #include "config-bot.h"
+ 
+ #endif /* _CONFIG_H_ */
+diff -up bash-4.2/configure.in.audit bash-4.2/configure.in
+--- bash-4.2/configure.in.audit	2013-01-31 16:26:16.858699005 +0100
++++ bash-4.2/configure.ac	2013-01-31 16:26:16.877699269 +0100
+@@ -888,6 +888,8 @@ BASH_FUNC_DUP2_CLOEXEC_CHECK
+ BASH_SYS_PGRP_SYNC
+ BASH_SYS_SIGNAL_VINTAGE
+ 
++AC_CHECK_DECLS([AUDIT_USER_TTY],,, [[#include <linux/audit.h>]])
++
+ dnl checking for the presence of certain library symbols
+ BASH_SYS_ERRLIST
+ BASH_SYS_SIGLIST
+diff -up bash-4.2/lib/readline/readline.c.audit bash-4.2/lib/readline/readline.c
+--- bash-4.2/lib/readline/readline.c.audit	2013-01-31 16:26:16.871699185 +0100
++++ bash-4.2/lib/readline/readline.c	2013-01-31 17:24:23.902744860 +0100
+@@ -55,6 +55,12 @@
+ extern int errno;
+ #endif /* !errno */
+ 
++#if defined (HAVE_DECL_AUDIT_USER_TTY)
++#  include <sys/socket.h>
++#  include <linux/audit.h>
++#  include <linux/netlink.h>
++#endif
++
+ /* System-specific feature definitions and include files. */
+ #include "rldefs.h"
+ #include "rlmbutil.h"
+@@ -301,7 +307,48 @@ rl_set_prompt (prompt)
+   rl_visible_prompt_length = rl_expand_prompt (rl_prompt);
+   return 0;
+ }
+-  
++
++#if defined (HAVE_DECL_AUDIT_USER_TTY)
++/* Report STRING to the audit system. */
++static void
++audit_tty (char *string)
++{
++  struct sockaddr_nl addr;
++  struct msghdr msg;
++  struct nlmsghdr nlm;
++  struct iovec iov[2];
++  size_t size;
++  int fd;
++
++  size = strlen (string) + 1;
++  fd = socket (AF_NETLINK, SOCK_RAW, NETLINK_AUDIT);
++  if (fd < 0)
++    return;
++  nlm.nlmsg_len = NLMSG_LENGTH (size);
++  nlm.nlmsg_type = AUDIT_USER_TTY;
++  nlm.nlmsg_flags = NLM_F_REQUEST;
++  nlm.nlmsg_seq = 0;
++  nlm.nlmsg_pid = 0;
++  iov[0].iov_base = &nlm;
++  iov[0].iov_len = sizeof (nlm);
++  iov[1].iov_base = string;
++  iov[1].iov_len = size;
++  addr.nl_family = AF_NETLINK;
++  addr.nl_pad = 0;
++  addr.nl_pid = 0;
++  addr.nl_groups = 0;
++  msg.msg_name = &addr;
++  msg.msg_namelen = sizeof (addr);
++  msg.msg_iov = iov;
++  msg.msg_iovlen = 2;
++  msg.msg_control = NULL;
++  msg.msg_controllen = 0;
++  msg.msg_flags = 0;
++  (void)sendmsg (fd, &msg, 0);
++  close (fd);
++}
++#endif
++
+ /* Read a line of input.  Prompt with PROMPT.  An empty PROMPT means
+    none.  A return value of NULL means that EOF was encountered. */
+ char *
diff --git a/bash-3.2-ssh_source_bash.patch b/bash-3.2-ssh_source_bash.patch
new file mode 100644
index 0000000..5bd19ce
--- /dev/null
+++ b/bash-3.2-ssh_source_bash.patch
@@ -0,0 +1,12 @@
+diff -up bash-4.0/config-top.h.ssh_source_bash bash-4.0/config-top.h
+--- bash-4.0/config-top.h.ssh_source_bash	2009-01-21 15:20:06.000000000 +0100
++++ bash-4.0/config-top.h	2009-01-21 15:25:46.000000000 +0100
+@@ -90,7 +90,7 @@
+    sshd and source the .bashrc if so (like the rshd behavior).  This checks
+    for the presence of SSH_CLIENT or SSH2_CLIENT in the initial environment,
+    which can be fooled under certain not-uncommon circumstances. */
+-/* #define SSH_SOURCE_BASHRC */
++#define SSH_SOURCE_BASHRC
+ 
+ /* Define if you want the case-capitalizing operators (~[~]) and the
+    `capcase' variable attribute (declare -c). */
diff --git a/bash-4.0-nobits.patch b/bash-4.0-nobits.patch
new file mode 100644
index 0000000..0e77fda
--- /dev/null
+++ b/bash-4.0-nobits.patch
@@ -0,0 +1,154 @@
+diff -up bash-4.0/execute_cmd.c.nobits bash-4.0/execute_cmd.c
+--- bash-4.0/execute_cmd.c.nobits	2009-08-11 11:53:38.000000000 +0200
++++ bash-4.0/execute_cmd.c	2009-08-14 16:18:18.000000000 +0200
+@@ -4747,6 +4747,7 @@ shell_execve (command, args, env)
+ 	      && memcmp (sample, ELFMAG, SELFMAG) == 0)
+ 	    {
+ 	      off_t offset = -1;
++              int dynamic_nobits = 0;
+ 
+ 	      /* It is an ELF file.  Now determine whether it is dynamically
+ 		 linked and if yes, get the offset of the interpreter
+@@ -4756,13 +4757,61 @@ shell_execve (command, args, env)
+ 		{
+ 		  Elf32_Ehdr ehdr;
+ 		  Elf32_Phdr *phdr;
+-		  int nphdr;
++                  Elf32_Shdr *shdr;
++		  int nphdr, nshdr;
+ 
+ 		  /* We have to copy the data since the sample buffer
+ 		     might not be aligned correctly to be accessed as
+ 		     an Elf32_Ehdr struct.  */
+ 		  memcpy (&ehdr, sample, sizeof (Elf32_Ehdr));
+ 
++		  nshdr = ehdr.e_shnum;
++		  shdr = (Elf32_Shdr *) malloc (nshdr * ehdr.e_shentsize);
++                  
++		  if (shdr != NULL)
++		    {
++#ifdef HAVE_PREAD
++		      sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize,
++					  ehdr.e_shoff);
++#else
++		      if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1)
++			sample_len = read (fd, shdr,
++					   nshdr * ehdr.e_shentsize);
++		      else
++			sample_len = -1;
++#endif
++		      if (sample_len == nshdr * ehdr.e_shentsize)
++                        {
++                          char *strings = (char *) malloc (shdr[ehdr.e_shstrndx].sh_size);
++                          if (strings != NULL)
++                            {
++#ifdef HAVE_PREAD
++		              sample_len = pread (fd, strings,
++                                             shdr[ehdr.e_shstrndx].sh_size,
++					     shdr[ehdr.e_shstrndx].sh_offset);
++#else
++		              if (lseek (fd, shdr[ehdr.e_shstrndx].sh_offset,
++                                         SEEK_SET) != -1)
++			        sample_len = read (fd, strings,
++			  		       shdr[ehdr.e_shstrndx].sh_size);
++		              else
++			        sample_len = -1;
++#endif
++                              if (sample_len == shdr[ehdr.e_shstrndx].sh_size)
++			        while (nshdr-- > 0)
++                                  if (strcmp (strings + shdr[nshdr].sh_name,
++                                              ".interp") == 0 &&
++                                      shdr[nshdr].sh_type == SHT_NOBITS)
++                                    {
++                                      dynamic_nobits++;
++                                      break;
++                                    }
++                              free (strings);
++                            }
++                        }
++		      free (shdr);
++		    }
++
+ 		  nphdr = ehdr.e_phnum;
+ 		  phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize);
+ 		  if (phdr != NULL)
+@@ -4792,13 +4841,60 @@ shell_execve (command, args, env)
+ 		{
+ 		  Elf64_Ehdr ehdr;
+ 		  Elf64_Phdr *phdr;
+-		  int nphdr;
++                  Elf64_Shdr *shdr;
++		  int nphdr, nshdr;
+ 
+ 		  /* We have to copy the data since the sample buffer
+ 		     might not be aligned correctly to be accessed as
+ 		     an Elf64_Ehdr struct.  */
+ 		  memcpy (&ehdr, sample, sizeof (Elf64_Ehdr));
+ 
++		  nshdr = ehdr.e_shnum;
++		  shdr = (Elf64_Shdr *) malloc (nshdr * ehdr.e_shentsize);
++		  if (shdr != NULL)
++		    {
++#ifdef HAVE_PREAD
++		      sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize,
++					  ehdr.e_shoff);
++#else
++		      if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1)
++			sample_len = read (fd, shdr,
++					   nshdr * ehdr.e_shentsize);
++		      else
++			sample_len = -1;
++#endif
++		      if (sample_len == nshdr * ehdr.e_shentsize)
++                        {
++                          char *strings = (char *) malloc (shdr[ehdr.e_shstrndx].sh_size);
++                          if (strings != NULL)
++                            {
++#ifdef HAVE_PREAD
++		              sample_len = pread (fd, strings,
++                                             shdr[ehdr.e_shstrndx].sh_size,
++					     shdr[ehdr.e_shstrndx].sh_offset);
++#else
++		              if (lseek (fd, shdr[ehdr.e_shstrndx].sh_offset,
++                                         SEEK_SET) != -1)
++			        sample_len = read (fd, strings,
++			  		       shdr[ehdr.e_shstrndx].sh_size);
++		              else
++			        sample_len = -1;
++#endif
++                              if (sample_len == shdr[ehdr.e_shstrndx].sh_size)
++			        while (nshdr-- > 0)
++                                  if (strcmp (strings + shdr[nshdr].sh_name,
++                                              ".interp") == 0 &&
++                                      shdr[nshdr].sh_type == SHT_NOBITS)
++                                    {
++                                      dynamic_nobits++;
++                                      break;
++                                    }
++                              free (strings);
++                            }
++                        }
++		      free (shdr);
++		    }
++
+ 		  nphdr = ehdr.e_phnum;
+ 		  phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize);
+ 		  if (phdr != NULL)
+@@ -4858,8 +4954,15 @@ shell_execve (command, args, env)
+ 		    {
+ 		      close (fd);
+ 		      errno = i;
+-		      sys_error ("%s: %s: bad ELF interpreter", command,
+-				 interp);
++                      if (dynamic_nobits > 0)
++                        {
++                          sys_error ("%s: bad ELF interpreter", command);
++                        }
++                      else
++                        {
++		          sys_error ("%s: %s: bad ELF interpreter", command,
++				     interp);
++                        }
+ 		      free (interp);
+ 		      return (EX_NOEXEC);
+ 		    }
diff --git a/bash-4.1-broken_pipe.patch b/bash-4.1-broken_pipe.patch
new file mode 100644
index 0000000..e083374
--- /dev/null
+++ b/bash-4.1-broken_pipe.patch
@@ -0,0 +1,12 @@
+diff -up bash-4.1/config-top.h.broken_pipe bash-4.1/config-top.h
+--- bash-4.1/config-top.h.broken_pipe	2011-01-06 18:01:30.000000000 +0100
++++ bash-4.1/config-top.h	2011-01-06 18:02:14.000000000 +0100
+@@ -51,7 +51,7 @@
+ /* Define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS if you don't want builtins
+    like `echo' and `printf' to report errors when output does not succeed
+    due to EPIPE. */
+-/* #define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS */
++#define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS
+ 
+ /* The default value of the PATH variable. */
+ #ifndef DEFAULT_PATH_VALUE
diff --git a/bash-4.1-examples.patch b/bash-4.1-examples.patch
new file mode 100644
index 0000000..19159e7
--- /dev/null
+++ b/bash-4.1-examples.patch
@@ -0,0 +1,24 @@
+diff -up bash-4.1/examples/loadables/Makefile.in.examples bash-4.1/examples/loadables/Makefile.in
+--- bash-4.1/examples/loadables/Makefile.in.examples	2010-06-22 16:20:02.000000000 +0200
++++ bash-4.1/examples/loadables/Makefile.in	2010-06-22 16:20:41.000000000 +0200
+@@ -43,7 +43,7 @@ host_os = @host_os@
+ host_cpu = @host_cpu@
+ host_vendor = @host_vendor@
+ 
+-CFLAGS = @CFLAGS@
++CFLAGS = -O2 -g
+ LOCAL_CFLAGS = @LOCAL_CFLAGS@
+ DEFS = @DEFS@
+ LOCAL_DEFS = @LOCAL_DEFS@
+diff -up bash-4.1/examples/loadables/perl/Makefile.in.examples bash-4.1/examples/loadables/perl/Makefile.in
+--- bash-4.1/examples/loadables/perl/Makefile.in.examples	2010-06-22 16:20:46.000000000 +0200
++++ bash-4.1/examples/loadables/perl/Makefile.in	2010-06-22 16:21:04.000000000 +0200
+@@ -42,7 +42,7 @@ SHELL = @MAKE_SHELL@
+ 
+ PERL5 = perl5
+ 
+-CFLAGS = @CFLAGS@
++CFLAGS = -O2 -g
+ 
+ #
+ # These values are generated for configure by ${topdir}/support/shobj-conf.
diff --git a/bash-4.2-coverity.patch b/bash-4.2-coverity.patch
new file mode 100644
index 0000000..dc52e52
--- /dev/null
+++ b/bash-4.2-coverity.patch
@@ -0,0 +1,103 @@
+diff --git a/execute_cmd.c b/execute_cmd.c
+index a988400..412128c 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -5760,7 +5760,7 @@ shell_execve (command, args, env)
+ 		  Elf32_Ehdr ehdr;
+ 		  Elf32_Phdr *phdr;
+                   Elf32_Shdr *shdr;
+-		  int nphdr, nshdr;
++		  Elf32_Half nphdr, nshdr;
+ 
+ 		  /* We have to copy the data since the sample buffer
+ 		     might not be aligned correctly to be accessed as
+@@ -5768,12 +5768,12 @@ shell_execve (command, args, env)
+ 		  memcpy (&ehdr, sample, sizeof (Elf32_Ehdr));
+ 
+ 		  nshdr = ehdr.e_shnum;
+-		  shdr = (Elf32_Shdr *) malloc (nshdr * ehdr.e_shentsize);
++		  shdr = (Elf32_Shdr *) malloc ((size_t)nshdr * (size_t)ehdr.e_shentsize);
+                   
+ 		  if (shdr != NULL)
+ 		    {
+ #ifdef HAVE_PREAD
+-		      sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize,
++		      sample_len = pread (fd, shdr, (size_t)nshdr * (size_t)ehdr.e_shentsize,
+ 					  ehdr.e_shoff);
+ #else
+ 		      if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1)
+@@ -5815,11 +5815,11 @@ shell_execve (command, args, env)
+ 		    }
+ 
+ 		  nphdr = ehdr.e_phnum;
+-		  phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize);
++		  phdr = (Elf32_Phdr *) malloc ((size_t)nphdr * (size_t)ehdr.e_phentsize);
+ 		  if (phdr != NULL)
+ 		    {
+ #ifdef HAVE_PREAD
+-		      sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize,
++		      sample_len = pread (fd, phdr, (size_t)nphdr * (size_t)ehdr.e_phentsize,
+ 					  ehdr.e_phoff);
+ #else
+ 		      if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1)
+@@ -5844,7 +5844,7 @@ shell_execve (command, args, env)
+ 		  Elf64_Ehdr ehdr;
+ 		  Elf64_Phdr *phdr;
+                   Elf64_Shdr *shdr;
+-		  int nphdr, nshdr;
++		  Elf32_Half nphdr, nshdr;
+ 
+ 		  /* We have to copy the data since the sample buffer
+ 		     might not be aligned correctly to be accessed as
+@@ -5852,11 +5852,11 @@ shell_execve (command, args, env)
+ 		  memcpy (&ehdr, sample, sizeof (Elf64_Ehdr));
+ 
+ 		  nshdr = ehdr.e_shnum;
+-		  shdr = (Elf64_Shdr *) malloc (nshdr * ehdr.e_shentsize);
++		  shdr = (Elf64_Shdr *) malloc ((size_t)nshdr * (size_t)ehdr.e_shentsize);
+ 		  if (shdr != NULL)
+ 		    {
+ #ifdef HAVE_PREAD
+-		      sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize,
++		      sample_len = pread (fd, shdr, (size_t)nshdr * (size_t)ehdr.e_shentsize,
+ 					  ehdr.e_shoff);
+ #else
+ 		      if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1)
+@@ -5898,11 +5898,11 @@ shell_execve (command, args, env)
+ 		    }
+ 
+ 		  nphdr = ehdr.e_phnum;
+-		  phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize);
++		  phdr = (Elf64_Phdr *) malloc ((size_t)nphdr * (size_t)ehdr.e_phentsize);
+ 		  if (phdr != NULL)
+ 		    {
+ #ifdef HAVE_PREAD
+-		      sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize,
++		      sample_len = pread (fd, phdr, (size_t)nphdr * (size_t)ehdr.e_phentsize,
+ 					  ehdr.e_phoff);
+ #else
+ 		      if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1)
+@@ -5924,8 +5924,8 @@ shell_execve (command, args, env)
+ 
+ 	      if (offset != -1)
+ 		{
+-		  size_t maxlen = 0;
+-		  size_t actlen = 0;
++		  ssize_t maxlen = 0;
++		  ssize_t actlen = 0;
+ 		  char *interp = NULL;
+ 
+ 		  do
+@@ -5974,7 +5974,8 @@ shell_execve (command, args, env)
+ 	    }
+ #endif
+ #if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H)
+-	  close (fd);
++          if (fd >= 0)
++	    close (fd);
+ #endif
+ 
+       errno = i;
+-- 
+2.17.2
+
diff --git a/bash-4.2-manpage_trap.patch b/bash-4.2-manpage_trap.patch
new file mode 100644
index 0000000..e81882f
--- /dev/null
+++ b/bash-4.2-manpage_trap.patch
@@ -0,0 +1,12 @@
+diff -up bash-4.1/doc/bash.1.manpage_trap bash-4.1/doc/bash.1
+--- bash-4.1/doc/bash.1.manpage_trap	2012-08-28 10:06:00.561999092 +0200
++++ bash-4.1/doc/bash.1	2012-08-28 10:06:24.225304505 +0200
+@@ -9251,7 +9251,7 @@ being inverted via
+ These are the same conditions obeyed by the \fBerrexit\fP (\fB\-e\fP) option.
+ .if t .sp 0.5
+ .if n .sp 1
+-Signals ignored upon entry to the shell cannot be trapped or reset.
++Signals ignored upon entry to the shell cannot be trapped, reset or listed.
+ Trapped signals that are not being ignored are reset to their original
+ values in a subshell or subshell environment when one is created.
+ The return status is false if any
diff --git a/bash-4.2-rc2-logout.patch b/bash-4.2-rc2-logout.patch
new file mode 100644
index 0000000..f63c8b6
--- /dev/null
+++ b/bash-4.2-rc2-logout.patch
@@ -0,0 +1,41 @@
+diff --git a/config-top.h b/config-top.h
+index 026d4a4..cb0e002 100644
+--- a/config-top.h
++++ b/config-top.h
+@@ -92,7 +92,7 @@
+ /* #define SYS_BASHRC "/etc/bash.bashrc" */
+ 
+ /* System-wide .bash_logout for login shells. */
+-/* #define SYS_BASH_LOGOUT "/etc/bash.bash_logout" */
++#define SYS_BASH_LOGOUT "/etc/bash.bash_logout"
+ 
+ /* Define this to make non-interactive shells begun with argv[0][0] == '-'
+    run the startup files when not in posix mode. */
+diff --git a/doc/bash.1 b/doc/bash.1
+index 04ce845..bfde55e 100644
+--- a/doc/bash.1
++++ b/doc/bash.1
+@@ -335,8 +335,8 @@ option may be used when the shell is started to inhibit this behavior.
+ When an interactive login shell exits,
+ or a non-interactive login shell executes the \fBexit\fP builtin command,
+ .B bash
+-reads and executes commands from the file \fI~/.bash_logout\fP, if it
+-exists.
++reads and executes commands from the files \fI~/.bash_logout\fP
++and \fI/etc/bash.bash_logout\fP, if the files exists.
+ .PP
+ When an interactive shell that is not a login shell is started,
+ .B bash
+@@ -10558,6 +10558,9 @@ The \fBbash\fP executable
+ .FN /etc/profile
+ The systemwide initialization file, executed for login shells
+ .TP
++.FN /etc/bash.bash_logout
++The systemwide login shell cleanup file, executed when a login shell exits
++.TP
+ .FN ~/.bash_profile
+ The personal initialization file, executed for login shells
+ .TP
+-- 
+2.9.3
+
diff --git a/bash-4.2-size_type.patch b/bash-4.2-size_type.patch
new file mode 100644
index 0000000..ab56677
--- /dev/null
+++ b/bash-4.2-size_type.patch
@@ -0,0 +1,14 @@
+diff -up bash-4.2/variables.h.size_type bash-4.2/variables.h
+--- bash-4.2/variables.h.size_type	2012-11-29 10:33:25.109036844 +0100
++++ bash-4.2/variables.h	2012-11-29 10:46:12.718530162 +0100
+@@ -95,8 +95,8 @@ typedef struct variable {
+ 
+ typedef struct _vlist {
+   SHELL_VAR **list;
+-  int list_size;	/* allocated size */
+-  int list_len;		/* current number of entries */
++  size_t list_size;	/* allocated size */
++  size_t list_len;	/* current number of entries */
+ } VARLIST;
+ 
+ /* The various attributes that a given variable can have. */
diff --git a/bash-4.3-man-ulimit.patch b/bash-4.3-man-ulimit.patch
new file mode 100644
index 0000000..0c3fa0a
--- /dev/null
+++ b/bash-4.3-man-ulimit.patch
@@ -0,0 +1,15 @@
+diff --git a/doc/bash.1 b/doc/bash.1
+index 6e8aebb..e846e68 100644
+--- a/doc/bash.1
++++ b/doc/bash.1
+@@ -10333,6 +10333,7 @@ and
+ which are in 512-byte increments.
+ The return status is 0 unless an invalid option or argument is supplied,
+ or an error occurs while setting a new limit.
++In POSIX Mode 512-byte blocks are used for the `-c' and `-f' options.
+ .RE
+ .TP
+ \fBumask\fP [\fB\-p\fP] [\fB\-S\fP] [\fImode\fP]
+-- 
+2.9.3
+
diff --git a/bash-4.3-memleak-lc_all.patch b/bash-4.3-memleak-lc_all.patch
new file mode 100644
index 0000000..77e86de
--- /dev/null
+++ b/bash-4.3-memleak-lc_all.patch
@@ -0,0 +1,12 @@
+diff -up bash-4.3/locale.c.old bash-4.3/locale.c
+--- bash-4.3/locale.c.old	2015-07-15 11:55:00.002857301 +0200
++++ bash-4.3/locale.c	2015-07-15 11:48:36.698086257 +0200
+@@ -77,8 +77,6 @@ set_default_locale ()
+ {
+ #if defined (HAVE_SETLOCALE)
+   default_locale = setlocale (LC_ALL, "");
+-  if (default_locale)
+-    default_locale = savestring (default_locale);
+ #endif /* HAVE_SETLOCALE */
+   bindtextdomain (PACKAGE, LOCALEDIR);
+   textdomain (PACKAGE);
diff --git a/bash-4.3-noecho.patch b/bash-4.3-noecho.patch
new file mode 100644
index 0000000..8adf36d
--- /dev/null
+++ b/bash-4.3-noecho.patch
@@ -0,0 +1,46 @@
+diff --git a/parse.y b/parse.y
+index 07e6e3e..4cd373f 100644
+--- a/parse.y
++++ b/parse.y
+@@ -4410,6 +4410,8 @@ xparse_dolparen (base, string, indp, flags)
+   save_parser_state (&ps);
+   save_input_line_state (&ls);
+   orig_eof_token = shell_eof_token;
++  /* avoid echoing every substitution again */
++  echo_input_at_read = 0;
+ #if defined (ALIAS) || defined (DPAREN_ARITHMETIC)
+   saved_pushed_strings = pushed_string_list;	/* separate parsing context */
+   pushed_string_list = (STRING_SAVER *)NULL;
+diff --git a/subst.c b/subst.c
+index 9559187..0c2caa6 100644
+--- a/subst.c
++++ b/subst.c
+@@ -9145,6 +9145,7 @@ param_expand (string, sindex, quoted, expanded_something,
+   WORD_LIST *list;
+   WORD_DESC *tdesc, *ret;
+   int tflag;
++  int old_echo_input;
+ 
+ /*itrace("param_expand: `%s' pflags = %d", string+*sindex, pflags);*/
+   zindex = *sindex;
+@@ -9514,6 +9515,9 @@ arithsub:
+ 	}
+ 
+ comsub:
++      old_echo_input = echo_input_at_read;
++      /* avoid echoing every substitution again */
++      echo_input_at_read = 0;
+       if (pflags & PF_NOCOMSUB)
+ 	/* we need zindex+1 because string[zindex] == RPAREN */
+ 	temp1 = substring (string, *sindex, zindex+1);
+@@ -9526,6 +9530,7 @@ comsub:
+ 	}
+       FREE (temp);
+       temp = temp1;
++      echo_input_at_read = old_echo_input;
+       break;
+ 
+     /* Do POSIX.2d9-style arithmetic substitution.  This will probably go
+-- 
+2.17.2
+
diff --git a/bash-4.4-no-loadable-builtins.patch b/bash-4.4-no-loadable-builtins.patch
new file mode 100644
index 0000000..b03459d
--- /dev/null
+++ b/bash-4.4-no-loadable-builtins.patch
@@ -0,0 +1,15 @@
+diff --git a/Makefile.in b/Makefile.in
+index a1f9483..24c646a 100644
+--- a/Makefile.in
++++ b/Makefile.in
+@@ -800,7 +800,6 @@ install:	.made installdirs
+ 		infodir=$(infodir) htmldir=$(htmldir) DESTDIR=$(DESTDIR) $@ )
+ 	-( cd $(DEFDIR) ; $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ )
+ 	-( cd $(PO_DIR) ; $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ )
+-	-( cd $(LOADABLES_DIR) && $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ )
+ 
+ install-strip:
+ 	$(MAKE) $(MFLAGS) INSTALL_PROGRAM='$(INSTALL_PROGRAM) -s' \
+-- 
+2.9.3
+
diff --git a/bash-5.0-patch-1.patch b/bash-5.0-patch-1.patch
new file mode 100644
index 0000000..254fd9e
--- /dev/null
+++ b/bash-5.0-patch-1.patch
@@ -0,0 +1,150 @@
+From 4d2e315490b778707b3a3afdfc514d5083a97a11 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 18 Jan 2019 15:12:37 -0500
+Subject: [PATCH] Bash-5.0 patch 1: fix pathname expansion of directory names
+ containing backslashes
+
+---
+ bashline.c           | 62 +++++++++++++++++++++++++++++++++++++++++---
+ lib/glob/glob_loop.c |  6 -----
+ patchlevel.h         |  2 +-
+ 3 files changed, 60 insertions(+), 10 deletions(-)
+
+diff --git a/bashline.c b/bashline.c
+index 2846aabf..75e79f1a 100644
+--- a/bashline.c
++++ b/bashline.c
+@@ -231,6 +231,7 @@ static int bash_possible_variable_completions __P((int, int));
+ static int bash_complete_command __P((int, int));
+ static int bash_possible_command_completions __P((int, int));
+ 
++static int completion_glob_pattern __P((char *));
+ static char *glob_complete_word __P((const char *, int));
+ static int bash_glob_completion_internal __P((int));
+ static int bash_glob_complete_word __P((int, int));
+@@ -1741,7 +1742,7 @@ bash_default_completion (text, start, end, qc, compflags)
+ 
+   /* This could be a globbing pattern, so try to expand it using pathname
+      expansion. */
+-  if (!matches && glob_pattern_p (text))
++  if (!matches && completion_glob_pattern ((char *)text))
+     {
+       matches = rl_completion_matches (text, glob_complete_word);
+       /* A glob expression that matches more than one filename is problematic.
+@@ -1850,7 +1851,7 @@ command_word_completion_function (hint_text, state)
+ 	  glob_matches = (char **)NULL;
+ 	}
+ 
+-      globpat = glob_pattern_p (hint_text);
++      globpat = completion_glob_pattern ((char *)hint_text);
+ 
+       /* If this is an absolute program name, do not check it against
+ 	 aliases, reserved words, functions or builtins.  We must check
+@@ -3713,6 +3714,61 @@ bash_complete_command_internal (what_to_do)
+   return bash_specific_completion (what_to_do, command_word_completion_function);
+ }
+ 
++static int
++completion_glob_pattern (string)
++     char *string;
++{
++  register int c;
++  char *send;
++  int open;
++
++  DECLARE_MBSTATE;
++
++  open = 0;
++  send = string + strlen (string);
++
++  while (c = *string++)
++    {
++      switch (c)
++	{
++	case '?':
++	case '*':
++	  return (1);
++
++	case '[':
++	  open++;
++	  continue;
++
++	case ']':
++	  if (open)
++	    return (1);
++	  continue;
++
++	case '+':
++	case '@':
++	case '!':
++	  if (*string == '(')	/*)*/
++	    return (1);
++	  continue;
++
++	case '\\':
++	  if (*string == 0)
++	    return (0);	 	  
++	}
++
++      /* Advance one fewer byte than an entire multibyte character to
++	 account for the auto-increment in the loop above. */
++#ifdef HANDLE_MULTIBYTE
++      string--;
++      ADVANCE_CHAR_P (string, send - string);
++      string++;
++#else
++      ADVANCE_CHAR_P (string, send - string);
++#endif
++    }
++  return (0);
++}
++
+ static char *globtext;
+ static char *globorig;
+ 
+@@ -3877,7 +3933,7 @@ bash_vi_complete (count, key)
+       t = substring (rl_line_buffer, p, rl_point);
+     }      
+ 
+-  if (t && glob_pattern_p (t) == 0)
++  if (t && completion_glob_pattern (t) == 0)
+     rl_explicit_arg = 1;	/* XXX - force glob_complete_word to append `*' */
+   FREE (t);
+ 
+diff --git a/lib/glob/glob_loop.c b/lib/glob/glob_loop.c
+index 5f319cc2..7d6ae211 100644
+--- a/lib/glob/glob_loop.c
++++ b/lib/glob/glob_loop.c
+@@ -54,17 +54,11 @@ INTERNAL_GLOB_PATTERN_P (pattern)
+ 	continue;
+ 
+       case L('\\'):
+-#if 0
+ 	/* Don't let the pattern end in a backslash (GMATCH returns no match
+ 	   if the pattern ends in a backslash anyway), but otherwise return 1,
+ 	   since the matching engine uses backslash as an escape character
+ 	   and it can be removed. */
+ 	return (*p != L('\0'));
+-#else
+-	/* The pattern may not end with a backslash. */
+-	if (*p++ == L('\0'))
+-	  return 0;
+-#endif
+       }
+ 
+   return 0;
+diff --git a/patchlevel.h b/patchlevel.h
+index 1cd7c96c..40db1a32 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 0
++#define PATCHLEVEL 1
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-10.patch b/bash-5.0-patch-10.patch
new file mode 100644
index 0000000..b9b916e
--- /dev/null
+++ b/bash-5.0-patch-10.patch
@@ -0,0 +1,116 @@
+From 6a3116f58c876ca58a786f0ddff578ecf126588e Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Thu, 29 Aug 2019 11:20:15 -0400
+Subject: [PATCH] Bash-5.0 patch 10: changes to posix-mode assignment
+ statements preceding functions and special builtins
+
+---
+ patchlevel.h       |  2 +-
+ tests/varenv.right |  6 +++---
+ variables.c        | 38 ++++++++++++++++++++++++++------------
+ 3 files changed, 30 insertions(+), 16 deletions(-)
+
+diff --git a/patchlevel.h b/patchlevel.h
+index 02f1d606..8002af70 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 9
++#define PATCHLEVEL 10
+ 
+ #endif /* _PATCHLEVEL_H_ */
+diff --git a/tests/varenv.right b/tests/varenv.right
+index 159a8773..ca7d4cf1 100644
+--- a/tests/varenv.right
++++ b/tests/varenv.right
+@@ -146,9 +146,9 @@ declare -x foo="abc"
+ inside: declare -x var="value"
+ outside: declare -- var="one"
+ inside: declare -x var="value"
+-outside: declare -x var="value"
+-inside: declare -- var="local"
+-outside: declare -x var="global"
++outside: declare -- var="outside"
++inside: declare -x var="global"
++outside: declare -- var="outside"
+ foo=<unset> environment foo=
+ foo=foo environment foo=foo
+ foo=foo environment foo=foo
+diff --git a/variables.c b/variables.c
+index 610629ab..af3fd04a 100644
+--- a/variables.c
++++ b/variables.c
+@@ -4460,9 +4460,9 @@ char **tempvar_list;
+ int tvlist_ind;
+ 
+ /* Take a variable from an assignment statement preceding a posix special
+-   builtin (including `return') and create a global variable from it. This
+-   is called from merge_temporary_env, which is only called when in posix
+-   mode. */
++   builtin (including `return') and create a variable from it as if a
++   standalone assignment statement had been performed. This is called from
++   merge_temporary_env, which is only called when in posix mode. */
+ static void
+ push_posix_temp_var (data)
+      PTR_T data;
+@@ -4472,16 +4472,27 @@ push_posix_temp_var (data)
+ 
+   var = (SHELL_VAR *)data;
+ 
+-  binding_table = global_variables->table;
+-  if (binding_table == 0)
+-    binding_table = global_variables->table = hash_create (VARIABLES_HASH_BUCKETS);
++  /* Just like do_assignment_internal(). This makes assignments preceding
++     special builtins act like standalone assignment statements when in
++     posix mode, satisfying the posix requirement that this affect the
++     "current execution environment." */
++  v = bind_variable (var->name, value_cell (var), ASS_FORCE|ASS_NOLONGJMP);
+ 
+-  v = bind_variable_internal (var->name, value_cell (var), binding_table, 0, ASS_FORCE|ASS_NOLONGJMP);
++  /* If this modifies an existing local variable, v->context will be non-zero.
++     If it comes back with v->context == 0, we bound at the global context.
++     Set binding_table appropriately. It doesn't matter whether it's correct
++     if the variable is local, only that it's not global_variables->table */
++  binding_table = v->context ? shell_variables->table : global_variables->table;
+ 
+   /* global variables are no longer temporary and don't need propagating. */
+-  var->attributes &= ~(att_tempvar|att_propagate);
++  if (binding_table == global_variables->table)
++    var->attributes &= ~(att_tempvar|att_propagate);
++
+   if (v)
+-    v->attributes |= var->attributes;
++    {
++      v->attributes |= var->attributes;
++      v->attributes &= ~att_tempvar;	/* not a temp var now */
++    }
+ 
+   if (find_special_var (var->name) >= 0)
+     tempvar_list[tvlist_ind++] = savestring (var->name);
+@@ -4575,14 +4586,17 @@ dispose_temporary_env (pushf)
+      sh_free_func_t *pushf;
+ {
+   int i;
++  HASH_TABLE *disposer;
+ 
+   tempvar_list = strvec_create (HASH_ENTRIES (temporary_env) + 1);
+   tempvar_list[tvlist_ind = 0] = 0;
+-    
+-  hash_flush (temporary_env, pushf);
+-  hash_dispose (temporary_env);
++
++  disposer = temporary_env;
+   temporary_env = (HASH_TABLE *)NULL;
+ 
++  hash_flush (disposer, pushf);
++  hash_dispose (disposer);
++
+   tempvar_list[tvlist_ind] = 0;
+ 
+   array_needs_making = 1;
+-- 
+2.21.0
+
diff --git a/bash-5.0-patch-11.patch b/bash-5.0-patch-11.patch
new file mode 100644
index 0000000..3a4172e
--- /dev/null
+++ b/bash-5.0-patch-11.patch
@@ -0,0 +1,50 @@
+From d894cfd104086ddf68c286e67a5fb2e02eb43b7b Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Thu, 29 Aug 2019 11:21:20 -0400
+Subject: [PATCH] Bash-5.0 patch 11: fix quoted null character removal in
+ operands of conditional ([[) commands
+
+---
+ patchlevel.h | 2 +-
+ subst.c      | 6 +++++-
+ 2 files changed, 6 insertions(+), 2 deletions(-)
+
+diff --git a/patchlevel.h b/patchlevel.h
+index 8002af70..772676c8 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 10
++#define PATCHLEVEL 11
+ 
+ #endif /* _PATCHLEVEL_H_ */
+diff --git a/subst.c b/subst.c
+index 95591878..fd6db240 100644
+--- a/subst.c
++++ b/subst.c
+@@ -3625,7 +3625,9 @@ remove_backslashes (string)
+    this case, we quote the string specially for the globbing code.  If
+    SPECIAL is 2, this is an rhs argument for the =~ operator, and should
+    be quoted appropriately for regcomp/regexec.  The caller is responsible
+-   for removing the backslashes if the unquoted word is needed later. */   
++   for removing the backslashes if the unquoted word is needed later. In
++   any case, since we don't perform word splitting, we need to do quoted
++   null character removal. */
+ char *
+ cond_expand_word (w, special)
+      WORD_DESC *w;
+@@ -3646,6 +3648,8 @@ cond_expand_word (w, special)
+     {
+       if (special == 0)			/* LHS */
+ 	{
++	  if (l->word)
++	    word_list_remove_quoted_nulls (l);
+ 	  dequote_list (l);
+ 	  r = string_list (l);
+ 	}
+-- 
+2.21.0
+
diff --git a/bash-5.0-patch-12.patch b/bash-5.0-patch-12.patch
new file mode 100644
index 0000000..3b383b1
--- /dev/null
+++ b/bash-5.0-patch-12.patch
@@ -0,0 +1,56 @@
+From b0852fb54efbcee630847fcfdc435133f82043b9 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 7 Feb 2020 15:16:28 -0500
+Subject: [PATCH] Bash-5.0 patch 12: fix problems moving back beyond start of
+ history
+
+---
+ lib/readline/misc.c | 5 ++++-
+ patchlevel.h        | 2 +-
+ 2 files changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/lib/readline/misc.c b/lib/readline/misc.c
+index 64b1457d..42005b0c 100644
+--- a/lib/readline/misc.c
++++ b/lib/readline/misc.c
+@@ -576,6 +576,7 @@ int
+ rl_get_previous_history (int count, int key)
+ {
+   HIST_ENTRY *old_temp, *temp;
++  int had_saved_line;
+ 
+   if (count < 0)
+     return (rl_get_next_history (-count, key));
+@@ -588,6 +589,7 @@ rl_get_previous_history (int count, int key)
+     _rl_history_saved_point = (rl_point == rl_end) ? -1 : rl_point;
+ 
+   /* If we don't have a line saved, then save this one. */
++  had_saved_line = _rl_saved_line_for_history != 0;
+   rl_maybe_save_line ();
+ 
+   /* If the current line has changed, save the changes. */
+@@ -611,7 +613,8 @@ rl_get_previous_history (int count, int key)
+ 
+   if (temp == 0)
+     {
+-      rl_maybe_unsave_line ();
++      if (had_saved_line == 0)
++        _rl_free_saved_history_line ();
+       rl_ding ();
+     }
+   else
+diff --git a/patchlevel.h b/patchlevel.h
+index 772676c8..93dbe0db 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 11
++#define PATCHLEVEL 12
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-13.patch b/bash-5.0-patch-13.patch
new file mode 100644
index 0000000..f9060ae
--- /dev/null
+++ b/bash-5.0-patch-13.patch
@@ -0,0 +1,62 @@
+From f747f9ff4c8aed2d51fa54db3cb10e8118034753 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 7 Feb 2020 15:17:29 -0500
+Subject: [PATCH] Bash-5.0 patch 13: reading history entries with timestamps
+ can result in joined entries
+
+---
+ lib/readline/histfile.c | 15 ++++++++++++++-
+ patchlevel.h            |  2 +-
+ 2 files changed, 15 insertions(+), 2 deletions(-)
+
+diff --git a/lib/readline/histfile.c b/lib/readline/histfile.c
+index a8a92aa3..6c3adc9b 100644
+--- a/lib/readline/histfile.c
++++ b/lib/readline/histfile.c
+@@ -369,9 +369,11 @@ read_history_range (const char *filename, int from, int to)
+     }
+ 
+   has_timestamps = HIST_TIMESTAMP_START (buffer);
+-  history_multiline_entries += has_timestamps && history_write_timestamps;  
++  history_multiline_entries += has_timestamps && history_write_timestamps;
+ 
+   /* Skip lines until we are at FROM. */
++  if (has_timestamps)
++    last_ts = buffer;
+   for (line_start = line_end = buffer; line_end < bufend && current_line < from; line_end++)
+     if (*line_end == '\n')
+       {
+@@ -380,7 +382,18 @@ read_history_range (const char *filename, int from, int to)
+ 	   line.  We should check more extensively here... */
+ 	if (HIST_TIMESTAMP_START(p) == 0)
+ 	  current_line++;
++	else
++	  last_ts = p;
+ 	line_start = p;
++	/* If we are at the last line (current_line == from) but we have
++	   timestamps (has_timestamps), then line_start points to the
++	   text of the last command, and we need to skip to its end. */
++	if (current_line >= from && has_timestamps)
++	  {
++	    for (line_end = p; line_end < bufend && *line_end != '\n'; line_end++)
++	      ;
++	    line_start = (*line_end == '\n') ? line_end + 1 : line_end;
++	  }
+       }
+ 
+   /* If there are lines left to gobble, then gobble them now. */
+diff --git a/patchlevel.h b/patchlevel.h
+index 93dbe0db..779671cd 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 12
++#define PATCHLEVEL 13
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-14.patch b/bash-5.0-patch-14.patch
new file mode 100644
index 0000000..efc0ee5
--- /dev/null
+++ b/bash-5.0-patch-14.patch
@@ -0,0 +1,44 @@
+From 8b6524c482573ea12eb20be756cdb8ca31d945f3 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 7 Feb 2020 15:18:41 -0500
+Subject: [PATCH] Bash-5.0 patch 14: edit-and-execute-command does not handle
+ empty command lines
+
+---
+ bashline.c   | 7 ++-----
+ patchlevel.h | 2 +-
+ 2 files changed, 3 insertions(+), 6 deletions(-)
+
+diff --git a/bashline.c b/bashline.c
+index 824ea9d9..97adaa0f 100644
+--- a/bashline.c
++++ b/bashline.c
+@@ -961,11 +961,8 @@ edit_and_execute_command (count, c, editing_mode, edit_command)
+       /* This breaks down when using command-oriented history and are not
+ 	 finished with the command, so we should not ignore the last command */
+       using_history ();
+-      if (rl_line_buffer[0])
+-	{
+-	  current_command_line_count++;	/* for rl_newline above */
+-	  bash_add_history (rl_line_buffer);
+-	}
++      current_command_line_count++;	/* for rl_newline above */
++      bash_add_history (rl_line_buffer);
+       current_command_line_count = 0;	/* for dummy history entry */
+       bash_add_history ("");
+       history_lines_this_session++;
+diff --git a/patchlevel.h b/patchlevel.h
+index 779671cd..09a3cc84 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 13
++#define PATCHLEVEL 14
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-15.patch b/bash-5.0-patch-15.patch
new file mode 100644
index 0000000..ce5e72f
--- /dev/null
+++ b/bash-5.0-patch-15.patch
@@ -0,0 +1,64 @@
+From ad1b3e68229273b4983b607c5eeb56551536c583 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 7 Feb 2020 15:19:53 -0500
+Subject: [PATCH] Bash-5.0 patch 15: aliases and -c commands can cause
+ premature termination
+
+---
+ builtins/evalstring.c | 6 ++++--
+ patchlevel.h          | 2 +-
+ 2 files changed, 5 insertions(+), 3 deletions(-)
+
+diff --git a/builtins/evalstring.c b/builtins/evalstring.c
+index cadc9bc0..2f13a66a 100644
+--- a/builtins/evalstring.c
++++ b/builtins/evalstring.c
+@@ -91,6 +91,7 @@ should_suppress_fork (command)
+   return (startup_state == 2 && parse_and_execute_level == 1 &&
+ 	  running_trap == 0 &&
+ 	  *bash_input.location.string == '\0' &&
++	  parser_expanding_alias () == 0 &&
+ 	  command->type == cm_simple &&
+ 	  signal_is_trapped (EXIT_TRAP) == 0 &&
+ 	  signal_is_trapped (ERROR_TRAP) == 0 &&
+@@ -105,6 +106,7 @@ can_optimize_connection (command)
+      COMMAND *command;
+ {
+   return (*bash_input.location.string == '\0' &&
++	  parser_expanding_alias () == 0 &&
+ 	  (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') &&
+ 	  command->value.Connection->second->type == cm_simple);
+ }
+@@ -290,7 +292,7 @@ parse_and_execute (string, from_file, flags)
+ 
+   with_input_from_string (string, from_file);
+   clear_shell_input_line ();
+-  while (*(bash_input.location.string))
++  while (*(bash_input.location.string) || parser_expanding_alias ())
+     {
+       command = (COMMAND *)NULL;
+ 
+@@ -545,7 +547,7 @@ parse_string (string, from_file, flags, endp)
+   ostring = string;
+ 
+   with_input_from_string (string, from_file);
+-  while (*(bash_input.location.string))
++  while (*(bash_input.location.string))		/* XXX - parser_expanding_alias () ? */
+     {
+       command = (COMMAND *)NULL;
+ 
+diff --git a/patchlevel.h b/patchlevel.h
+index 09a3cc84..6e9ed3fc 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 14
++#define PATCHLEVEL 15
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-16.patch b/bash-5.0-patch-16.patch
new file mode 100644
index 0000000..a5e710d
--- /dev/null
+++ b/bash-5.0-patch-16.patch
@@ -0,0 +1,53 @@
+From 6c6454cb18d7cd30b3b26d5ba6479431e599f3ed Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 7 Feb 2020 15:20:38 -0500
+Subject: [PATCH] Bash-5.0 patch 16: bash waits too long to reap /dev/fd
+ process substitutions with loops and group commands
+
+---
+ execute_cmd.c | 16 ++++++++++++++++
+ patchlevel.h  |  2 +-
+ 2 files changed, 17 insertions(+), 1 deletion(-)
+
+diff --git a/execute_cmd.c b/execute_cmd.c
+index f1d74bfe..3864986d 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -1103,6 +1103,22 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out,
+       free ((void *)ofifo_list);
+       discard_unwind_frame ("internal_fifos");
+     }
++# if defined (HAVE_DEV_FD)
++  /* Reap process substitutions at the end of loops */
++  switch (command->type)
++    {
++    case cm_while:
++    case cm_until:
++    case cm_for:
++    case cm_group:
++#    if defined (ARITH_FOR_COMMAND)
++    case cm_arith_for:
++#    endif
++      reap_procsubs ();
++    default:
++      break;
++    }
++#  endif /* HAVE_DEV_FD */
+ #endif
+ 
+   /* Invert the return value if we have to */
+diff --git a/patchlevel.h b/patchlevel.h
+index 6e9ed3fc..9074f4dd 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 15
++#define PATCHLEVEL 16
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-17.patch b/bash-5.0-patch-17.patch
new file mode 100644
index 0000000..bca2d4d
--- /dev/null
+++ b/bash-5.0-patch-17.patch
@@ -0,0 +1,213 @@
+From 9e49d343e3cd7e20dad1b86ebfb764e8027596a7 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 24 Apr 2020 11:05:06 -0400
+Subject: [PATCH] Bash-5.0 patch 17: better fix for reaping process
+ substitution file descriptors
+
+---
+ execute_cmd.c | 26 ++++++--------------------
+ patchlevel.h  |  2 +-
+ subst.c       | 35 +++++++++++++++++++++--------------
+ subst.h       |  5 ++---
+ 4 files changed, 30 insertions(+), 38 deletions(-)
+
+diff --git a/execute_cmd.c b/execute_cmd.c
+index 3864986d..4a05758d 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -564,7 +564,7 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out,
+   volatile int save_line_number;
+ #if defined (PROCESS_SUBSTITUTION)
+   volatile int ofifo, nfifo, osize, saved_fifo;
+-  volatile char *ofifo_list;
++  volatile void *ofifo_list;
+ #endif
+ 
+   if (breaking || continuing)
+@@ -750,12 +750,14 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out,
+   reap_procsubs ();
+ #  endif
+ 
+-  if (variable_context != 0)	/* XXX - also if sourcelevel != 0? */
++  /* XXX - also if sourcelevel != 0? */
++  if (variable_context != 0)
+     {
+       ofifo = num_fifos ();
+       ofifo_list = copy_fifo_list ((int *)&osize);
+       begin_unwind_frame ("internal_fifos");
+-      add_unwind_protect (xfree, ofifo_list);
++      if (ofifo_list)
++	add_unwind_protect (xfree, ofifo_list);
+       saved_fifo = 1;
+     }
+   else
+@@ -1099,26 +1101,10 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out,
+     {
+       nfifo = num_fifos ();
+       if (nfifo > ofifo)
+-	close_new_fifos ((char *)ofifo_list, osize);
++	close_new_fifos ((void *)ofifo_list, osize);
+       free ((void *)ofifo_list);
+       discard_unwind_frame ("internal_fifos");
+     }
+-# if defined (HAVE_DEV_FD)
+-  /* Reap process substitutions at the end of loops */
+-  switch (command->type)
+-    {
+-    case cm_while:
+-    case cm_until:
+-    case cm_for:
+-    case cm_group:
+-#    if defined (ARITH_FOR_COMMAND)
+-    case cm_arith_for:
+-#    endif
+-      reap_procsubs ();
+-    default:
+-      break;
+-    }
+-#  endif /* HAVE_DEV_FD */
+ #endif
+ 
+   /* Invert the return value if we have to */
+diff --git a/patchlevel.h b/patchlevel.h
+index 9074f4dd..98e714da 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 16
++#define PATCHLEVEL 17
+ 
+ #endif /* _PATCHLEVEL_H_ */
+diff --git a/subst.c b/subst.c
+index fd6db240..8884b487 100644
+--- a/subst.c
++++ b/subst.c
+@@ -5336,13 +5336,13 @@ clear_fifo_list ()
+ {
+ }
+ 
+-char *
++void *
+ copy_fifo_list (sizep)
+      int *sizep;
+ {
+   if (sizep)
+     *sizep = 0;
+-  return (char *)NULL;
++  return (void *)NULL;
+ }
+ 
+ static void
+@@ -5408,8 +5408,13 @@ unlink_fifo_list ()
+       for (i = j = 0; i < nfifo; i++)
+ 	if (fifo_list[i].file)
+ 	  {
+-	    fifo_list[j].file = fifo_list[i].file;
+-	    fifo_list[j].proc = fifo_list[i].proc;
++	    if (i != j)
++	      {
++		fifo_list[j].file = fifo_list[i].file;
++		fifo_list[j].proc = fifo_list[i].proc;
++		fifo_list[i].file = (char *)NULL;
++		fifo_list[i].proc = 0;
++	      }
+ 	    j++;
+ 	  }
+       nfifo = j;
+@@ -5425,10 +5430,11 @@ unlink_fifo_list ()
+    case it's larger than fifo_list_size (size of fifo_list). */
+ void
+ close_new_fifos (list, lsize)
+-     char *list;
++     void *list;
+      int lsize;
+ {
+   int i;
++  char *plist;
+ 
+   if (list == 0)
+     {
+@@ -5436,8 +5442,8 @@ close_new_fifos (list, lsize)
+       return;
+     }
+ 
+-  for (i = 0; i < lsize; i++)
+-    if (list[i] == 0 && i < fifo_list_size && fifo_list[i].proc != -1)
++  for (plist = (char *)list, i = 0; i < lsize; i++)
++    if (plist[i] == 0 && i < fifo_list_size && fifo_list[i].proc != -1)
+       unlink_fifo (i);
+ 
+   for (i = lsize; i < fifo_list_size; i++)
+@@ -5559,22 +5565,22 @@ clear_fifo_list ()
+   nfds = 0;
+ }
+ 
+-char *
++void *
+ copy_fifo_list (sizep)
+      int *sizep;
+ {
+-  char *ret;
++  void *ret;
+ 
+   if (nfds == 0 || totfds == 0)
+     {
+       if (sizep)
+ 	*sizep = 0;
+-      return (char *)NULL;
++      return (void *)NULL;
+     }
+ 
+   if (sizep)
+     *sizep = totfds;
+-  ret = (char *)xmalloc (totfds * sizeof (pid_t));
++  ret = xmalloc (totfds * sizeof (pid_t));
+   return (memcpy (ret, dev_fd_list, totfds * sizeof (pid_t)));
+ }
+ 
+@@ -5647,10 +5653,11 @@ unlink_fifo_list ()
+    totfds (size of dev_fd_list). */
+ void
+ close_new_fifos (list, lsize)
+-     char *list;
++     void *list;
+      int lsize;
+ {
+   int i;
++  pid_t *plist;
+ 
+   if (list == 0)
+     {
+@@ -5658,8 +5665,8 @@ close_new_fifos (list, lsize)
+       return;
+     }
+ 
+-  for (i = 0; i < lsize; i++)
+-    if (list[i] == 0 && i < totfds && dev_fd_list[i])
++  for (plist = (pid_t *)list, i = 0; i < lsize; i++)
++    if (plist[i] == 0 && i < totfds && dev_fd_list[i])
+       unlink_fifo (i);
+ 
+   for (i = lsize; i < totfds; i++)
+diff --git a/subst.h b/subst.h
+index 34763222..faf831bd 100644
+--- a/subst.h
++++ b/subst.h
+@@ -273,9 +273,8 @@ extern int num_fifos __P((void));
+ extern void unlink_fifo_list __P((void));
+ extern void unlink_fifo __P((int));
+ 
+-extern char *copy_fifo_list __P((int *));
+-extern void unlink_new_fifos __P((char *, int));
+-extern void close_new_fifos __P((char *, int));
++extern void *copy_fifo_list __P((int *));
++extern void close_new_fifos __P((void *, int));
+ 
+ extern void clear_fifo_list __P((void));
+ 
+-- 
+2.25.1
+
diff --git a/bash-5.0-patch-2.patch b/bash-5.0-patch-2.patch
new file mode 100644
index 0000000..b9858ae
--- /dev/null
+++ b/bash-5.0-patch-2.patch
@@ -0,0 +1,96 @@
+From ddf3f643cb9b9a2ca8e6d996c605e4332204874c Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Fri, 18 Jan 2019 15:13:57 -0500
+Subject: [PATCH] Bash-5.0 patch 2: fix expansion of aliases whose value ends
+ with an unquoted tab
+
+---
+ parse.y      | 5 ++++-
+ parser.h     | 1 +
+ patchlevel.h | 2 +-
+ y.tab.c      | 5 ++++-
+ 4 files changed, 10 insertions(+), 3 deletions(-)
+
+diff --git a/parse.y b/parse.y
+index 3ff87bcc..07e6e3e4 100644
+--- a/parse.y
++++ b/parse.y
+@@ -2557,12 +2557,14 @@ next_alias_char:
+   if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE &&
+       pushed_string_list->flags != PSH_DPAREN &&
+       (parser_state & PST_COMMENT) == 0 &&
++      (parser_state & PST_ENDALIAS) == 0 &&	/* only once */
+       shell_input_line_index > 0 &&
+-      shell_input_line[shell_input_line_index-1] != ' ' &&
++      shellblank (shell_input_line[shell_input_line_index-1]) == 0 &&
+       shell_input_line[shell_input_line_index-1] != '\n' &&
+       shellmeta (shell_input_line[shell_input_line_index-1]) == 0 &&
+       (current_delimiter (dstack) != '\'' && current_delimiter (dstack) != '"'))
+     {
++      parser_state |= PST_ENDALIAS;
+       return ' ';	/* END_ALIAS */
+     }
+ #endif
+@@ -2571,6 +2573,7 @@ pop_alias:
+   /* This case works for PSH_DPAREN as well */
+   if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE)
+     {
++      parser_state &= ~PST_ENDALIAS;
+       pop_string ();
+       uc = shell_input_line[shell_input_line_index];
+       if (uc)
+diff --git a/parser.h b/parser.h
+index 54dd2c88..6d08915d 100644
+--- a/parser.h
++++ b/parser.h
+@@ -47,6 +47,7 @@
+ #define PST_REPARSE	0x040000	/* re-parsing in parse_string_to_word_list */
+ #define PST_REDIRLIST	0x080000	/* parsing a list of redirections preceding a simple command name */
+ #define PST_COMMENT	0x100000	/* parsing a shell comment; used by aliases */
++#define PST_ENDALIAS	0x200000	/* just finished expanding and consuming an alias */
+ 
+ /* Definition of the delimiter stack.  Needed by parse.y and bashhist.c. */
+ struct dstack {
+diff --git a/patchlevel.h b/patchlevel.h
+index 40db1a32..a988d852 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 1
++#define PATCHLEVEL 2
+ 
+ #endif /* _PATCHLEVEL_H_ */
+diff --git a/y.tab.c b/y.tab.c
+index 1abe2c50..7efce3c8 100644
+--- a/y.tab.c
++++ b/y.tab.c
+@@ -4873,12 +4873,14 @@ next_alias_char:
+   if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE &&
+       pushed_string_list->flags != PSH_DPAREN &&
+       (parser_state & PST_COMMENT) == 0 &&
++      (parser_state & PST_ENDALIAS) == 0 &&	/* only once */
+       shell_input_line_index > 0 &&
+-      shell_input_line[shell_input_line_index-1] != ' ' &&
++      shellblank (shell_input_line[shell_input_line_index-1]) == 0 &&
+       shell_input_line[shell_input_line_index-1] != '\n' &&
+       shellmeta (shell_input_line[shell_input_line_index-1]) == 0 &&
+       (current_delimiter (dstack) != '\'' && current_delimiter (dstack) != '"'))
+     {
++      parser_state |= PST_ENDALIAS;
+       return ' ';	/* END_ALIAS */
+     }
+ #endif
+@@ -4887,6 +4889,7 @@ pop_alias:
+   /* This case works for PSH_DPAREN as well */
+   if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE)
+     {
++      parser_state &= ~PST_ENDALIAS;
+       pop_string ();
+       uc = shell_input_line[shell_input_line_index];
+       if (uc)
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-3.patch b/bash-5.0-patch-3.patch
new file mode 100644
index 0000000..509f52e
--- /dev/null
+++ b/bash-5.0-patch-3.patch
@@ -0,0 +1,202 @@
+From fcf6ae7d069a64741e9484cf219d7fe95de9e796 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Tue, 19 Mar 2019 10:05:39 -0400
+Subject: [PATCH] Bash-5.0 patch 3: improvements when globbing directory names
+ containing backslashes
+
+---
+ bashline.c           |  2 +-
+ lib/glob/glob.c      | 25 +++++++++++++++++++++----
+ lib/glob/glob.h      |  1 +
+ lib/glob/glob_loop.c | 23 ++++++++++++++++-------
+ patchlevel.h         |  2 +-
+ pathexp.c            | 16 ++++++++++++----
+ 6 files changed, 52 insertions(+), 17 deletions(-)
+
+diff --git a/bashline.c b/bashline.c
+index 75e79f1a..824ea9d9 100644
+--- a/bashline.c
++++ b/bashline.c
+@@ -3752,7 +3752,7 @@ completion_glob_pattern (string)
+ 	  continue;
+ 
+ 	case '\\':
+-	  if (*string == 0)
++	  if (*string++ == 0)
+ 	    return (0);	 	  
+ 	}
+ 
+diff --git a/lib/glob/glob.c b/lib/glob/glob.c
+index 22d90a5c..398253b5 100644
+--- a/lib/glob/glob.c
++++ b/lib/glob/glob.c
+@@ -1061,7 +1061,7 @@ glob_filename (pathname, flags)
+   char *directory_name, *filename, *dname, *fn;
+   unsigned int directory_len;
+   int free_dirname;			/* flag */
+-  int dflags;
++  int dflags, hasglob;
+ 
+   result = (char **) malloc (sizeof (char *));
+   result_size = 1;
+@@ -1110,9 +1110,12 @@ glob_filename (pathname, flags)
+       free_dirname = 1;
+     }
+ 
++  hasglob = 0;
+   /* If directory_name contains globbing characters, then we
+-     have to expand the previous levels.  Just recurse. */
+-  if (directory_len > 0 && glob_pattern_p (directory_name))
++     have to expand the previous levels.  Just recurse.
++     If glob_pattern_p returns != [0,1] we have a pattern that has backslash
++     quotes but no unquoted glob pattern characters. We dequote it below. */
++  if (directory_len > 0 && (hasglob = glob_pattern_p (directory_name)) == 1)
+     {
+       char **directories, *d, *p;
+       register unsigned int i;
+@@ -1175,7 +1178,7 @@ glob_filename (pathname, flags)
+       if (d[directory_len - 1] == '/')
+ 	d[directory_len - 1] = '\0';
+ 
+-      directories = glob_filename (d, dflags);
++      directories = glob_filename (d, dflags|GX_RECURSE);
+ 
+       if (free_dirname)
+ 	{
+@@ -1332,6 +1335,20 @@ only_filename:
+ 	    free (directory_name);
+ 	  return (NULL);
+ 	}
++      /* If we have a directory name with quoted characters, and we are
++	 being called recursively to glob the directory portion of a pathname,
++	 we need to dequote the directory name before returning it so the
++	 caller can read the directory */
++      if (directory_len > 0 && hasglob == 2 && (flags & GX_RECURSE) != 0)
++	{
++	  dequote_pathname (directory_name);
++	  directory_len = strlen (directory_name);
++	}
++
++      /* We could check whether or not the dequoted directory_name is a
++	 directory and return it here, returning the original directory_name
++	 if not, but we don't do that yet. I'm not sure it matters. */
++
+       /* Handle GX_MARKDIRS here. */
+       result[0] = (char *) malloc (directory_len + 1);
+       if (result[0] == NULL)
+diff --git a/lib/glob/glob.h b/lib/glob/glob.h
+index b9462333..56ac08ba 100644
+--- a/lib/glob/glob.h
++++ b/lib/glob/glob.h
+@@ -30,6 +30,7 @@
+ #define GX_NULLDIR	0x100	/* internal -- no directory preceding pattern */
+ #define GX_ADDCURDIR	0x200	/* internal -- add passed directory name */
+ #define GX_GLOBSTAR	0x400	/* turn on special handling of ** */
++#define GX_RECURSE	0x800	/* internal -- glob_filename called recursively */
+ 
+ extern int glob_pattern_p __P((const char *));
+ extern char **glob_vector __P((char *, char *, int));
+diff --git a/lib/glob/glob_loop.c b/lib/glob/glob_loop.c
+index 7d6ae211..3a4f4f1e 100644
+--- a/lib/glob/glob_loop.c
++++ b/lib/glob/glob_loop.c
+@@ -26,10 +26,10 @@ INTERNAL_GLOB_PATTERN_P (pattern)
+ {
+   register const GCHAR *p;
+   register GCHAR c;
+-  int bopen;
++  int bopen, bsquote;
+ 
+   p = pattern;
+-  bopen = 0;
++  bopen = bsquote = 0;
+ 
+   while ((c = *p++) != L('\0'))
+     switch (c)
+@@ -55,13 +55,22 @@ INTERNAL_GLOB_PATTERN_P (pattern)
+ 
+       case L('\\'):
+ 	/* Don't let the pattern end in a backslash (GMATCH returns no match
+-	   if the pattern ends in a backslash anyway), but otherwise return 1,
+-	   since the matching engine uses backslash as an escape character
+-	   and it can be removed. */
+-	return (*p != L('\0'));
++	   if the pattern ends in a backslash anyway), but otherwise note that 
++	   we have seen this, since the matching engine uses backslash as an
++	   escape character and it can be removed. We return 2 later if we
++	   have seen only backslash-escaped characters, so interested callers
++	   know they can shortcut and just dequote the pathname. */
++	if (*p != L('\0'))
++	  {
++	    p++;
++	    bsquote = 1;
++	    continue;
++	  }
++	else 	/* (*p == L('\0')) */
++	  return 0;
+       }
+ 
+-  return 0;
++  return bsquote ? 2 : 0;
+ }
+ 
+ #undef INTERNAL_GLOB_PATTERN_P
+diff --git a/patchlevel.h b/patchlevel.h
+index a988d852..e7e960c1 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 2
++#define PATCHLEVEL 3
+ 
+ #endif /* _PATCHLEVEL_H_ */
+diff --git a/pathexp.c b/pathexp.c
+index b51729a7..c1bf2d89 100644
+--- a/pathexp.c
++++ b/pathexp.c
+@@ -65,11 +65,11 @@ unquoted_glob_pattern_p (string)
+ {
+   register int c;
+   char *send;
+-  int open;
++  int open, bsquote;
+ 
+   DECLARE_MBSTATE;
+ 
+-  open = 0;
++  open = bsquote = 0;
+   send = string + strlen (string);
+ 
+   while (c = *string++)
+@@ -100,7 +100,14 @@ unquoted_glob_pattern_p (string)
+ 	   can be removed by the matching engine, so we have to run it through
+ 	   globbing. */
+ 	case '\\':
+-	  return (*string != 0);
++	  if (*string != '\0' && *string != '/')
++	    {
++	      bsquote = 1;
++	      string++;
++	      continue;
++	    }
++	  else if (*string == 0)
++	    return (0);
+ 	 	  
+ 	case CTLESC:
+ 	  if (*string++ == '\0')
+@@ -117,7 +124,8 @@ unquoted_glob_pattern_p (string)
+       ADVANCE_CHAR_P (string, send - string);
+ #endif
+     }
+-  return (0);
++
++  return (bsquote ? 2 : 0);
+ }
+ 
+ /* Return 1 if C is a character that is `special' in a POSIX ERE and needs to
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-4.patch b/bash-5.0-patch-4.patch
new file mode 100644
index 0000000..8993833
--- /dev/null
+++ b/bash-5.0-patch-4.patch
@@ -0,0 +1,42 @@
+From 16c907aa3bb427618733e5a6f2f4e2fc5a3488d3 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Sat, 20 Apr 2019 14:24:28 -0400
+Subject: [PATCH] Bash-5.0 patch 4: the wait builtin without arguments only
+ waits for known children the shell started
+
+---
+ jobs.c       | 4 +---
+ patchlevel.h | 2 +-
+ 2 files changed, 2 insertions(+), 4 deletions(-)
+
+diff --git a/jobs.c b/jobs.c
+index ce2bdf24..ae3c54c6 100644
+--- a/jobs.c
++++ b/jobs.c
+@@ -2488,10 +2488,8 @@ wait_for_background_pids ()
+     r = wait_for (last_procsub_child->pid);
+   wait_procsubs ();
+   reap_procsubs ();
+-#if 1
++#if 0
+   /* We don't want to wait indefinitely if we have stopped children. */
+-  /* XXX - should add a loop that goes through the list of process
+-     substitutions and waits for each proc in turn before this code. */
+   if (any_stopped == 0)
+     {
+       /* Check whether or not we have any unreaped children. */
+diff --git a/patchlevel.h b/patchlevel.h
+index e7e960c1..c059f0bd 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 3
++#define PATCHLEVEL 4
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-5.patch b/bash-5.0-patch-5.patch
new file mode 100644
index 0000000..1fb4faf
--- /dev/null
+++ b/bash-5.0-patch-5.patch
@@ -0,0 +1,102 @@
+From 41f5420db7a911fb0833be693205f4db41f05434 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Sat, 20 Apr 2019 14:25:52 -0400
+Subject: [PATCH] Bash-5.0 patch 5: prevent optimizing forks away too
+ aggressively
+
+---
+ builtins/evalstring.c | 26 +++++++++++++++++++++++---
+ command.h             |  1 +
+ execute_cmd.c         |  2 ++
+ patchlevel.h          |  2 +-
+ 4 files changed, 27 insertions(+), 4 deletions(-)
+
+diff --git a/builtins/evalstring.c b/builtins/evalstring.c
+index 1496eeec..cadc9bc0 100644
+--- a/builtins/evalstring.c
++++ b/builtins/evalstring.c
+@@ -100,12 +100,22 @@ should_suppress_fork (command)
+ 	  ((command->flags & CMD_INVERT_RETURN) == 0));
+ }
+ 
++int
++can_optimize_connection (command)
++     COMMAND *command;
++{
++  return (*bash_input.location.string == '\0' &&
++	  (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') &&
++	  command->value.Connection->second->type == cm_simple);
++}
++
+ void
+ optimize_fork (command)
+      COMMAND *command;
+ {
+   if (command->type == cm_connection &&
+-      (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR) &&
++      (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') &&
++      (command->value.Connection->second->flags & CMD_TRY_OPTIMIZING) &&
+       should_suppress_fork (command->value.Connection->second))
+     {
+       command->value.Connection->second->flags |= CMD_NO_FORK;
+@@ -412,8 +422,18 @@ parse_and_execute (string, from_file, flags)
+ 		  command->flags |= CMD_NO_FORK;
+ 		  command->value.Simple->flags |= CMD_NO_FORK;
+ 		}
+-	      else if (command->type == cm_connection)
+-		optimize_fork (command);
++
++	      /* Can't optimize forks out here execept for simple commands.
++		 This knows that the parser sets up commands as left-side heavy
++		 (&& and || are left-associative) and after the single parse,
++		 if we are at the end of the command string, the last in a
++		 series of connection commands is
++		 command->value.Connection->second. */
++	      else if (command->type == cm_connection && can_optimize_connection (command))
++		{
++		  command->value.Connection->second->flags |= CMD_TRY_OPTIMIZING;
++		  command->value.Connection->second->value.Simple->flags |= CMD_TRY_OPTIMIZING;
++		}
+ #endif /* ONESHOT */
+ 
+ 	      /* See if this is a candidate for $( <file ). */
+diff --git a/command.h b/command.h
+index 32495162..b9e9b669 100644
+--- a/command.h
++++ b/command.h
+@@ -186,6 +186,7 @@ typedef struct element {
+ #define CMD_COPROC_SUBSHELL 0x1000
+ #define CMD_LASTPIPE	    0x2000
+ #define CMD_STDPATH	    0x4000	/* use standard path for command lookup */
++#define CMD_TRY_OPTIMIZING  0x8000	/* try to optimize this simple command */
+ 
+ /* What a command looks like. */
+ typedef struct command {
+diff --git a/execute_cmd.c b/execute_cmd.c
+index 8b3c83aa..f1d74bfe 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -2767,6 +2767,8 @@ execute_connection (command, asynchronous, pipe_in, pipe_out, fds_to_close)
+ 	  ((command->value.Connection->connector == OR_OR) &&
+ 	   (exec_result != EXECUTION_SUCCESS)))
+ 	{
++	  optimize_fork (command);
++
+ 	  second = command->value.Connection->second;
+ 	  if (ignore_return && second)
+ 	    second->flags |= CMD_IGNORE_RETURN;
+diff --git a/patchlevel.h b/patchlevel.h
+index c059f0bd..1bc098b8 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 4
++#define PATCHLEVEL 5
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-6.patch b/bash-5.0-patch-6.patch
new file mode 100644
index 0000000..bfd8460
--- /dev/null
+++ b/bash-5.0-patch-6.patch
@@ -0,0 +1,39 @@
+From dfd2cc6ac5558e252af0a7cb829a9629bf782e17 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Sat, 20 Apr 2019 14:27:00 -0400
+Subject: [PATCH] Bash-5.0 patch 6: allow building with SYSLOG_HISTORY defined
+ without defining SYSLOG_SHOPT
+
+---
+ builtins/shopt.def | 2 +-
+ patchlevel.h       | 2 +-
+ 2 files changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/builtins/shopt.def b/builtins/shopt.def
+index f6dc6f97..1c485361 100644
+--- a/builtins/shopt.def
++++ b/builtins/shopt.def
+@@ -122,7 +122,7 @@ extern int assoc_expand_once;
+ extern int array_expand_once;
+ #endif
+ 
+-#if defined (SYSLOG_HISTORY) && defined (SYSLOG_SHOPT)
++#if defined (SYSLOG_HISTORY)
+ extern int syslog_history;
+ #endif
+ 
+diff --git a/patchlevel.h b/patchlevel.h
+index 1bc098b8..14bff9fc 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 5
++#define PATCHLEVEL 6
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-7.patch b/bash-5.0-patch-7.patch
new file mode 100644
index 0000000..2a4315e
--- /dev/null
+++ b/bash-5.0-patch-7.patch
@@ -0,0 +1,51 @@
+From 3ba697465bc74fab513a26dea700cc82e9f4724e Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Sat, 20 Apr 2019 14:27:56 -0400
+Subject: [PATCH] Bash-5.0 patch 7: fix exec builtin leaving the terminal in
+ the wrong process group
+
+---
+ jobs.c       | 12 +++++-------
+ patchlevel.h |  2 +-
+ 2 files changed, 6 insertions(+), 8 deletions(-)
+
+diff --git a/jobs.c b/jobs.c
+index ae3c54c6..6bc31dca 100644
+--- a/jobs.c
++++ b/jobs.c
+@@ -4837,15 +4837,13 @@ void
+ end_job_control ()
+ {
+   if (job_control)
+-    {
+-      terminate_stopped_jobs ();
++    terminate_stopped_jobs ();
+ 
+-      if (original_pgrp >= 0)
+-	give_terminal_to (original_pgrp, 1);
+-    }
++  if (original_pgrp >= 0 && terminal_pgrp != original_pgrp)
++    give_terminal_to (original_pgrp, 1);
+ 
+-  if (original_pgrp >= 0)
+-    setpgid (0, original_pgrp);
++  if (original_pgrp >= 0 && setpgid (0, original_pgrp) == 0)
++    shell_pgrp = original_pgrp;
+ }
+ 
+ /* Restart job control by closing shell tty and reinitializing.  This is
+diff --git a/patchlevel.h b/patchlevel.h
+index 14bff9fc..deb9c5b7 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 6
++#define PATCHLEVEL 7
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.17.2
+
diff --git a/bash-5.0-patch-8.patch b/bash-5.0-patch-8.patch
new file mode 100644
index 0000000..cb23681
--- /dev/null
+++ b/bash-5.0-patch-8.patch
@@ -0,0 +1,50 @@
+From 01323582f773ef4d08fa26a90e9a21285a8405f5 Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Wed, 14 Aug 2019 14:57:48 -0400
+Subject: [PATCH] Bash-5.0 patch 8: fix history offset when HISTSIZE == 0 that
+ can lead to crashes
+
+---
+ bashhist.c   | 5 ++++-
+ patchlevel.h | 2 +-
+ 2 files changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/bashhist.c b/bashhist.c
+index 7912cce3..d2155dce 100644
+--- a/bashhist.c
++++ b/bashhist.c
+@@ -560,15 +560,18 @@ pre_process_line (line, print_changes, addit)
+      add that line to the history if ADDIT is non-zero. */
+   if (!history_expansion_inhibited && history_expansion && history_expansion_p (line))
+     {
++      int old_len;
++
+       /* If we are expanding the second or later line of a multi-line
+ 	 command, decrease history_length so references to history expansions
+ 	 in these lines refer to the previous history entry and not the
+ 	 current command. */
++      old_len = history_length;
+       if (history_length > 0 && command_oriented_history && current_command_first_line_saved && current_command_line_count > 1)
+         history_length--;
+       expanded = history_expand (line, &history_value);
+       if (history_length >= 0 && command_oriented_history && current_command_first_line_saved && current_command_line_count > 1)
+-        history_length++;
++        history_length = old_len;
+ 
+       if (expanded)
+ 	{
+diff --git a/patchlevel.h b/patchlevel.h
+index deb9c5b7..16c87404 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 7
++#define PATCHLEVEL 8
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.21.0
+
diff --git a/bash-5.0-patch-9.patch b/bash-5.0-patch-9.patch
new file mode 100644
index 0000000..be8a347
--- /dev/null
+++ b/bash-5.0-patch-9.patch
@@ -0,0 +1,38 @@
+From 9f597fd10993313262cab400bf3c46ffb3f6fd1e Mon Sep 17 00:00:00 2001
+From: Chet Ramey <chet.ramey@case.edu>
+Date: Wed, 14 Aug 2019 14:58:44 -0400
+Subject: [PATCH] Bash-5.0 patch 9: fix file descriptor leak with zero-length
+ history file
+
+---
+ lib/readline/histfile.c | 1 +
+ patchlevel.h            | 2 +-
+ 2 files changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/lib/readline/histfile.c b/lib/readline/histfile.c
+index dc64bde1..a8a92aa3 100644
+--- a/lib/readline/histfile.c
++++ b/lib/readline/histfile.c
+@@ -305,6 +305,7 @@ read_history_range (const char *filename, int from, int to)
+   if (file_size == 0)
+     {
+       free (input);
++      close (file);
+       return 0;	/* don't waste time if we don't have to */
+     }
+ 
+diff --git a/patchlevel.h b/patchlevel.h
+index 16c87404..02f1d606 100644
+--- a/patchlevel.h
++++ b/patchlevel.h
+@@ -25,6 +25,6 @@
+    regexp `^#define[ 	]*PATCHLEVEL', since that's what support/mkversion.sh
+    looks for to find the patch level (for the sccs version string). */
+ 
+-#define PATCHLEVEL 8
++#define PATCHLEVEL 9
+ 
+ #endif /* _PATCHLEVEL_H_ */
+-- 
+2.21.0
+
diff --git a/bash-infotags.patch b/bash-infotags.patch
new file mode 100644
index 0000000..fe39609
--- /dev/null
+++ b/bash-infotags.patch
@@ -0,0 +1,26 @@
+diff --git a/doc/Makefile.in b/doc/Makefile.in
+index 5f0756c..a5fa5a0 100644
+--- a/doc/Makefile.in
++++ b/doc/Makefile.in
+@@ -74,7 +74,6 @@ TEXI2DVI    = ${SUPPORT_SRCDIR}/texi2dvi
+ TEXI2HTML   = ${SUPPORT_SRCDIR}/texi2html
+ MAN2HTML    = ${BUILD_DIR}/support/man2html
+ HTMLPOST    = ${srcdir}/htmlpost.sh
+-INFOPOST    = ${srcdir}/infopost.sh
+ QUIETPS	    = #set this to -q to shut up dvips
+ PAPERSIZE   = letter	# change to a4 for A4-size paper
+ PSDPI       = 600	# could be 300 if you like
+@@ -188,8 +187,8 @@ bashref.pdf: $(BASHREF_FILES) $(HSUSER) $(RLUSER)
+ bashref.html: $(BASHREF_FILES) $(HSUSER) $(RLUSER)
+ 	$(MAKEINFO) --html --no-split -I$(TEXINPUTDIR) $(srcdir)/bashref.texi
+ 
+-bash.info: bashref.info
+-	${SHELL} ${INFOPOST} < $(srcdir)/bashref.info > $@ ; \
++bash.info: $(BASHREF_FILES) $(HSUSER) $(RLUSER)
++	$(MAKEINFO) --no-split -I$(TEXINPUTDIR) $(srcdir)/bashref.texi -o $@
+ 
+ bash.txt: bash.1
+ bash.ps: bash.1
+-- 
+2.9.3
+
diff --git a/bash-requires.patch b/bash-requires.patch
new file mode 100644
index 0000000..6167af1
--- /dev/null
+++ b/bash-requires.patch
@@ -0,0 +1,312 @@
+diff --git a/builtins.h b/builtins.h
+index dac95fd..5b7e811 100644
+--- a/builtins.h
++++ b/builtins.h
+@@ -45,6 +45,7 @@
+ #define ASSIGNMENT_BUILTIN 0x10	/* This builtin takes assignment statements. */
+ #define POSIX_BUILTIN	0x20	/* This builtins is special in the Posix command search order. */
+ #define LOCALVAR_BUILTIN   0x40	/* This builtin creates local variables */
++#define REQUIRES_BUILTIN 0x80  /* This builtin requires other files. */
+ 
+ #define BASE_INDENT	4
+ 
+diff --git a/builtins/mkbuiltins.c b/builtins/mkbuiltins.c
+index 4f51201..91c25db 100644
+--- a/builtins/mkbuiltins.c
++++ b/builtins/mkbuiltins.c
+@@ -69,10 +69,15 @@ extern char *strcpy ();
+ #define whitespace(c) (((c) == ' ') || ((c) == '\t'))
+ 
+ /* Flag values that builtins can have. */
++/*  These flags are for the C code generator,
++    the C which is produced (./builtin.c)
++    includes the flags definitions found
++    in ../builtins.h */
+ #define BUILTIN_FLAG_SPECIAL	0x01
+ #define BUILTIN_FLAG_ASSIGNMENT 0x02
+ #define BUILTIN_FLAG_LOCALVAR	0x04
+ #define BUILTIN_FLAG_POSIX_BUILTIN 0x08
++#define BUILTIN_FLAG_REQUIRES  0x10
+ 
+ #define BASE_INDENT	4
+ 
+@@ -173,11 +178,19 @@ char *posix_builtins[] =
+   (char *)NULL
+ };
+ 
++/* The builtin commands that cause requirements on other files. */
++static char *requires_builtins[] =
++{
++  ".", "command", "exec", "source", "inlib",
++  (char *)NULL
++};
++
+ /* Forward declarations. */
+ static int is_special_builtin ();
+ static int is_assignment_builtin ();
+ static int is_localvar_builtin ();
+ static int is_posix_builtin ();
++static int is_requires_builtin ();
+ 
+ #if !defined (HAVE_RENAME)
+ static int rename ();
+@@ -831,6 +844,8 @@ builtin_handler (self, defs, arg)
+     new->flags |= BUILTIN_FLAG_LOCALVAR;
+   if (is_posix_builtin (name))
+     new->flags |= BUILTIN_FLAG_POSIX_BUILTIN;
++  if (is_requires_builtin (name))
++    new->flags |= BUILTIN_FLAG_REQUIRES;
+ 
+   array_add ((char *)new, defs->builtins);
+   building_builtin = 1;
+@@ -1250,12 +1265,13 @@ write_builtins (defs, structfile, externfile)
+ 		  else
+ 		    fprintf (structfile, "(sh_builtin_func_t *)0x0, ");
+ 
+-		  fprintf (structfile, "%s%s%s%s%s, %s_doc,\n",
++		  fprintf (structfile, "%s%s%s%s%s%s, %s_doc,\n",
+ 		    "BUILTIN_ENABLED | STATIC_BUILTIN",
+ 		    (builtin->flags & BUILTIN_FLAG_SPECIAL) ? " | SPECIAL_BUILTIN" : "",
+ 		    (builtin->flags & BUILTIN_FLAG_ASSIGNMENT) ? " | ASSIGNMENT_BUILTIN" : "",
+ 		    (builtin->flags & BUILTIN_FLAG_LOCALVAR) ? " | LOCALVAR_BUILTIN" : "",
+ 		    (builtin->flags & BUILTIN_FLAG_POSIX_BUILTIN) ? " | POSIX_BUILTIN" : "",
++		    (builtin->flags & BUILTIN_FLAG_REQUIRES) ? " | REQUIRES_BUILTIN" : "",
+ 		    document_name (builtin));
+ 
+ 		  /* Don't translate short document summaries that are identical
+@@ -1645,6 +1661,13 @@ is_posix_builtin (name)
+   return (_find_in_table (name, posix_builtins));
+ }
+ 
++static int
++is_requires_builtin (name)
++     char *name;
++{
++  return (_find_in_table (name, requires_builtins));
++}
++
+ #if !defined (HAVE_RENAME)
+ static int
+ rename (from, to)
+diff --git a/doc/bash.1 b/doc/bash.1
+index d91f1fd..111a66d 100644
+--- a/doc/bash.1
++++ b/doc/bash.1
+@@ -239,6 +239,14 @@ The shell becomes restricted (see
+ .B "RESTRICTED SHELL"
+ below).
+ .TP
++.B \-\-rpm-requires
++Produce the list of files that are required for the
++shell script to run.  This implies '-n' and is subject
++to the same limitations as compile time error checking checking;
++Command substitutions, Conditional expressions and
++.BR eval
++builtin are not parsed so some dependencies may be missed.
++.TP
+ .B \-\-verbose
+ Equivalent to \fB\-v\fP.
+ .TP
+diff --git a/doc/bashref.texi b/doc/bashref.texi
+index d33cd57..6fc4d18 100644
+--- a/doc/bashref.texi
++++ b/doc/bashref.texi
+@@ -6453,6 +6453,13 @@ standard.  @xref{Bash POSIX Mode}, for a description of the Bash
+ @item --restricted
+ Make the shell a restricted shell (@pxref{The Restricted Shell}).
+ 
++@item --rpm-requires
++Produce the list of files that are required for the
++shell script to run.  This implies '-n' and is subject
++to the same limitations as compile time error checking checking;
++Command substitutions, Conditional expressions and @command{eval}
++are not parsed so some dependencies may be missed.
++
+ @item --verbose
+ Equivalent to @option{-v}.  Print shell input lines as they're read.
+ 
+diff --git a/eval.c b/eval.c
+index f02d6e4..76c1e8d 100644
+--- a/eval.c
++++ b/eval.c
+@@ -142,7 +142,8 @@ reader_loop ()
+ 
+       if (read_command () == 0)
+ 	{
+-	  if (interactive_shell == 0 && read_but_dont_execute)
++
++	  if (interactive_shell == 0 && (read_but_dont_execute && !rpm_requires))
+ 	    {
+ 	      last_command_exit_value = EXECUTION_SUCCESS;
+ 	      dispose_command (global_command);
+diff --git a/execute_cmd.c b/execute_cmd.c
+index 8b3c83a..4eae19c 100644
+--- a/execute_cmd.c
++++ b/execute_cmd.c
+@@ -542,6 +542,8 @@ async_redirect_stdin ()
+ 
+ #define DESCRIBE_PID(pid) do { if (interactive) describe_pid (pid); } while (0)
+ 
++extern int rpm_requires;
++
+ /* Execute the command passed in COMMAND, perhaps doing it asynchronously.
+    COMMAND is exactly what read_command () places into GLOBAL_COMMAND.
+    ASYNCHROUNOUS, if non-zero, says to do this command in the background.
+@@ -573,7 +575,13 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out,
+ 
+   if (breaking || continuing)
+     return (last_command_exit_value);
+-  if (command == 0 || read_but_dont_execute)
++  if (command == 0 || (read_but_dont_execute && !rpm_requires))
++    return (EXECUTION_SUCCESS);
++  if (rpm_requires && command->type == cm_function_def)
++    return last_command_exit_value =
++      execute_intern_function (command->value.Function_def->name,
++                              command->value.Function_def);
++  if (read_but_dont_execute)
+     return (EXECUTION_SUCCESS);
+ 
+   QUIT;
+@@ -2819,7 +2827,7 @@ execute_for_command (for_command)
+   save_line_number = line_number;
+   if (check_identifier (for_command->name, 1) == 0)
+     {
+-      if (posixly_correct && interactive_shell == 0)
++      if (posixly_correct && interactive_shell == 0 && rpm_requires == 0)
+ 	{
+ 	  last_command_exit_value = EX_BADUSAGE;
+ 	  jump_to_top_level (ERREXIT);
+diff --git a/execute_cmd.h b/execute_cmd.h
+index dc2f15e..506fff4 100644
+--- a/execute_cmd.h
++++ b/execute_cmd.h
+@@ -22,6 +22,9 @@
+ #define _EXECUTE_CMD_H_
+ 
+ #include "stdc.h"
++#include "variables.h"
++#include "command.h"
++
+ 
+ #if defined (ARRAY_VARS)
+ struct func_array_state
+diff --git a/make_cmd.c b/make_cmd.c
+index ecbbfd6..3d8bfa4 100644
+--- a/make_cmd.c
++++ b/make_cmd.c
+@@ -35,6 +35,8 @@
+ #include "bashintl.h"
+ 
+ #include "shell.h"
++#include "builtins.h"
++#include "builtins/common.h"
+ #include "execute_cmd.h"
+ #include "parser.h"
+ #include "flags.h"
+@@ -828,6 +830,30 @@ make_coproc_command (name, command)
+   return (make_command (cm_coproc, (SIMPLE_COM *)temp));
+ }
+ 
++static void
++output_requirement (deptype, filename)
++const char *deptype;
++char *filename;
++{
++  static char *alphabet_set = "abcdefghijklmnopqrstuvwxyz"
++                    "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
++
++  if (strchr(filename, '$') || (filename[0] != '/' && strchr(filename, '/')))
++    return;
++
++  /*
++      if the executable is called via variable substitution we can
++      not dermine what it is at compile time.
++
++      if the executable consists only of characters not in the
++      alphabet we do not consider it a dependency just an artifact
++      of shell parsing (ex "exec < ${infile}").
++  */
++
++  if (strpbrk(filename, alphabet_set))
++    printf ("%s(%s)\n", deptype, filename);
++}
++
+ /* Reverse the word list and redirection list in the simple command
+    has just been parsed.  It seems simpler to do this here the one
+    time then by any other method that I can think of. */
+@@ -845,6 +871,28 @@ clean_simple_command (command)
+ 	REVERSE_LIST (command->value.Simple->redirects, REDIRECT *);
+     }
+ 
++  if (rpm_requires && command->value.Simple->words)
++    {
++      char *cmd0;
++      char *cmd1;
++      struct builtin *b;
++
++      cmd0 = command->value.Simple->words->word->word;
++      b = builtin_address_internal (cmd0, 0);
++      cmd1 = 0;
++      if (command->value.Simple->words->next)
++        cmd1 = command->value.Simple->words->next->word->word;
++
++      if (b) {
++        if ( (b->flags & REQUIRES_BUILTIN) && cmd1)
++          output_requirement ("executable", cmd1);
++      } else {
++        if (!assignment(cmd0, 0))
++          output_requirement (find_function(cmd0) ? "function" : "executable", cmd0);
++      }
++    } /*rpm_requires*/
++
++
+   parser_state &= ~PST_REDIRLIST;
+   return (command);
+ }
+diff --git a/shell.c b/shell.c
+index a2b2a55..c5d99b3 100644
+--- a/shell.c
++++ b/shell.c
+@@ -193,6 +193,9 @@ int have_devfd = 0;
+ /* The name of the .(shell)rc file. */
+ static char *bashrc_file = DEFAULT_BASHRC;
+ 
++/* Non-zero if we are finding the scripts requirements. */
++int rpm_requires;
++
+ /* Non-zero means to act more like the Bourne shell on startup. */
+ static int act_like_sh;
+ 
+@@ -259,6 +262,7 @@ static const struct {
+   { "protected", Int, &protected_mode, (char **)0x0 },
+ #endif
+   { "rcfile", Charp, (int *)0x0, &bashrc_file },
++  { "rpm-requires", Int, &rpm_requires, (char **)0x0 },
+ #if defined (RESTRICTED_SHELL)
+   { "restricted", Int, &restricted, (char **)0x0 },
+ #endif
+@@ -496,6 +500,12 @@ main (argc, argv, env)
+   if (dump_translatable_strings)
+     read_but_dont_execute = 1;
+ 
++  if (rpm_requires)
++    {
++      read_but_dont_execute = 1;
++      initialize_shell_builtins ();
++    }
++
+   if (running_setuid && privileged_mode == 0)
+     disable_priv_mode ();
+ 
+diff --git a/shell.h b/shell.h
+index 8072605..6c4149d 100644
+--- a/shell.h
++++ b/shell.h
+@@ -99,6 +99,7 @@ extern int interactive, interactive_shell;
+ extern int startup_state;
+ extern int reading_shell_script;
+ extern int shell_initialized;
++extern int rpm_requires;
+ extern int bash_argv_initialized;
+ extern int subshell_environment;
+ extern int current_command_number;
diff --git a/bash-setlocale.patch b/bash-setlocale.patch
new file mode 100644
index 0000000..f068ec7
--- /dev/null
+++ b/bash-setlocale.patch
@@ -0,0 +1,10 @@
+--- bash-3.0/builtins/setattr.def.setlocale	2005-08-08 12:22:42.000000000 +0100
++++ bash-3.0/builtins/setattr.def	2005-08-08 12:25:16.000000000 +0100
+@@ -423,4 +423,7 @@
+ 
+   if (var && (exported_p (var) || (attribute & att_exported)))
+     array_needs_making++;	/* XXX */
++
++  if (var)
++    stupidly_hack_special_variables (name);
+ }
diff --git a/bash-tty-tests.patch b/bash-tty-tests.patch
new file mode 100644
index 0000000..f9b6532
--- /dev/null
+++ b/bash-tty-tests.patch
@@ -0,0 +1,61 @@
+diff --git a/tests/exec.right b/tests/exec.right
+index 6075cc8..0b3f02c 100644
+--- a/tests/exec.right
++++ b/tests/exec.right
+@@ -51,7 +51,6 @@ this is ohio-state
+ 0
+ 1
+ testb
+-expand_aliases 	on
+ 1
+ 1
+ 1
+diff --git a/tests/execscript b/tests/execscript
+index c1819de..9227a4a 100644
+--- a/tests/execscript
++++ b/tests/execscript
+@@ -108,8 +108,6 @@ ${THIS_SH} ./exec6.sub
+ # checks for properly deciding what constitutes an executable file
+ ${THIS_SH} ./exec7.sub
+ 
+-${THIS_SH} -i ${PWD}/exec8.sub
+-
+ ${THIS_SH} ./exec9.sub
+ 
+ ${THIS_SH} ./exec10.sub
+diff --git a/tests/read.right b/tests/read.right
+index 73cb704..a92fe7f 100644
+--- a/tests/read.right
++++ b/tests/read.right
+@@ -33,14 +33,6 @@ a = abcdefg
+ a = xyz
+ a = -xyz 123-
+ a = abc
+-timeout 1: ok
+-
+-timeout 2: ok
+-
+-./read2.sub: line 23: read: -3: invalid timeout specification
+-1
+-
+-abcde
+ ./read3.sub: line 4: read: -1: invalid number
+ abc
+ ab
+diff --git a/tests/read.tests b/tests/read.tests
+index f67cd00..083f4a4 100644
+--- a/tests/read.tests
++++ b/tests/read.tests
+@@ -82,9 +82,6 @@ echo " foo" | { IFS=$':' ; read line; recho "$line"; }
+ # test read -d delim behavior
+ ${THIS_SH} ./read1.sub
+ 
+-# test read -t timeout behavior
+-${THIS_SH} ./read2.sub
+-
+ # test read -n nchars behavior
+ ${THIS_SH} ./read3.sub
+ 
+-- 
+2.17.2
+
diff --git a/bash.spec b/bash.spec
new file mode 100644
index 0000000..0fb39cc
--- /dev/null
+++ b/bash.spec
@@ -0,0 +1,1691 @@
+#% define beta_tag rc2
+%define patchleveltag .17
+%define baseversion 5.0
+%bcond_without tests
+
+Version: %{baseversion}%{patchleveltag}
+Name: bash
+Summary: The GNU Bourne Again shell
+Release: 2%{?dist}
+License: GPLv3+
+Url: https://www.gnu.org/software/bash
+Source0: https://ftp.gnu.org/gnu/bash/bash-%{baseversion}.tar.gz
+
+# For now there isn't any doc
+#Source2: ftp://ftp.gnu.org/gnu/bash/bash-doc-%%{version}.tar.gz
+
+Source1: dot-bashrc
+Source2: dot-bash_profile
+Source3: dot-bash_logout
+
+# Official upstream patches
+# Patches are converted to apply with '-p1'
+%{lua:for i=1,17 do print(string.format("Patch%u: bash-5.0-patch-%u.patch\n", i, i)) end}
+
+# Other patches
+# We don't want to add '/etc:/usr/etc' in standard utils path.
+Patch101: bash-2.03-paths.patch
+# Non-interactive shells beginning with argv[0][0] == '-' should run the startup files when not in posix mode.
+Patch102: bash-2.03-profile.patch
+# https://bugzilla.redhat.com/show_bug.cgi?id=60870
+Patch103: bash-2.05a-interpreter.patch
+# Generate info for debuginfo files.
+Patch104: bash-2.05b-debuginfo.patch
+# Pid passed to setpgrp() can not be pid of a zombie process.
+Patch105: bash-2.05b-pgrp_sync.patch
+# Enable audit logs
+Patch106: bash-3.2-audit.patch
+# Source bashrc file when bash is run under ssh.
+Patch107: bash-3.2-ssh_source_bash.patch
+# Use makeinfo to generate .texi file
+Patch108: bash-infotags.patch
+# Try to pick up latest `--rpm-requires` patch from http://git.altlinux.org/gears/b/bash4.git
+Patch109: bash-requires.patch
+Patch110: bash-setlocale.patch
+# Disable tty tests while doing bash builds
+Patch111: bash-tty-tests.patch
+
+# 484809, check if interp section is NOBITS
+Patch116: bash-4.0-nobits.patch
+
+# Do the same CFLAGS in generated Makefile in examples
+Patch117: bash-4.1-examples.patch
+
+# Builtins like echo and printf won't report errors
+# when output does not succeed due to EPIPE
+Patch118: bash-4.1-broken_pipe.patch
+
+# # Enable system-wide .bash_logout for login shells
+Patch119: bash-4.2-rc2-logout.patch
+# 
+# Static analyzis shows some issues in bash-2.05a-interpreter.patch
+Patch120: bash-4.2-coverity.patch
+
+# 799958, updated info about trap
+# This patch should be upstreamed.
+Patch122: bash-4.2-manpage_trap.patch
+
+# https://www.securecoding.cert.org/confluence/display/seccode/INT32-C.+Ensure+that+operations+on+signed+integers+do+not+result+in+overflow
+# This patch should be upstreamed.
+Patch123: bash-4.2-size_type.patch
+# 
+# 1112710 - mention ulimit -c and -f POSIX block size
+# This patch should be upstreamed.
+Patch124: bash-4.3-man-ulimit.patch
+# 
+# 1102815 - fix double echoes in vi visual mode
+Patch125: bash-4.3-noecho.patch
+# 
+# #1241533,1224855 - bash leaks memory when LC_ALL set
+Patch126: bash-4.3-memleak-lc_all.patch
+# 
+# bash-4.4 builds loadable builtin examples by default
+# this patch disables it
+Patch127: bash-4.4-no-loadable-builtins.patch
+
+BuildRequires:  gcc
+BuildRequires: texinfo bison
+BuildRequires: ncurses-devel
+BuildRequires: autoconf, gettext
+# Required for bash tests
+BuildRequires: glibc-all-langpacks
+Requires: filesystem >= 3
+Provides: /bin/sh
+Provides: /bin/bash
+
+%description
+The GNU Bourne Again shell (Bash) is a shell or command language
+interpreter that is compatible with the Bourne shell (sh). Bash
+incorporates useful features from the Korn shell (ksh) and the C shell
+(csh). Most sh scripts can be run by bash without modification.
+
+%package devel
+Summary: Development headers for %{name}
+Requires: %{name}%{?_isa} = %{version}-%{release}
+
+%description devel
+This package contains development headers for %{name}.
+
+%package doc
+Summary: Documentation files for %{name}
+Requires: %{name} = %{version}-%{release}
+
+%description doc
+This package contains documentation files for %{name}.
+
+%prep
+%autosetup -n %{name}-%{baseversion} -p1
+
+echo %{version} > _distribution
+echo %{release} > _patchlevel
+
+# force refreshing the generated files
+rm y.tab.*
+
+%build
+autoconf
+%configure --with-bash-malloc=no --with-afs
+
+# Recycles pids is neccessary. When bash's last fork's pid was X
+# and new fork's pid is also X, bash has to wait for this same pid.
+# Without Recycles pids bash will not wait.
+make "CPPFLAGS=-D_GNU_SOURCE -DRECYCLES_PIDS -DDEFAULT_PATH_VALUE='\"/usr/local/bin:/usr/bin\"' `getconf LFS_CFLAGS`" %{?_smp_mflags}
+
+%install
+if [ -e autoconf ]; then
+  # Yuck. We're using autoconf 2.1x.
+  export PATH=.:$PATH
+fi
+
+# Fix bug #83776
+sed -i -e 's,bashref\.info,bash.info,' doc/bashref.info
+
+%make_install install-headers
+
+mkdir -p %{buildroot}/%{_sysconfdir}
+
+# make manpages for bash builtins as per suggestion in DOC/README
+pushd doc
+sed -e '
+/^\.SH NAME/, /\\- bash built-in commands, see \\fBbash\\fR(1)$/{
+/^\.SH NAME/d
+s/^bash, //
+s/\\- bash built-in commands, see \\fBbash\\fR(1)$//
+s/,//g
+b
+}
+d
+' builtins.1 > man.pages
+for i in echo pwd test kill; do
+  sed -i -e "s,$i,,g" man.pages
+  sed -i -e "s,  , ,g" man.pages
+done
+
+install -p -m 644 builtins.1 %{buildroot}%{_mandir}/man1/builtins.1
+
+for i in `cat man.pages` ; do
+  echo .so man1/builtins.1 > %{buildroot}%{_mandir}/man1/$i.1
+  chmod 0644 %{buildroot}%{_mandir}/man1/$i.1
+done
+popd
+
+# Link bash man page to sh so that man sh works.
+ln -s bash.1 %{buildroot}%{_mandir}/man1/sh.1
+
+# Not for printf, true and false (conflict with coreutils)
+rm -f %{buildroot}/%{_mandir}/man1/printf.1
+rm -f %{buildroot}/%{_mandir}/man1/true.1
+rm -f %{buildroot}/%{_mandir}/man1/false.1
+
+ln -sf bash %{buildroot}%{_bindir}/sh
+rm -f %{buildroot}%{_infodir}/dir
+mkdir -p %{buildroot}%{_sysconfdir}/skel
+install -p -m644 %SOURCE1 %{buildroot}/etc/skel/.bashrc
+install -p -m644 %SOURCE2 %{buildroot}/etc/skel/.bash_profile
+install -p -m644 %SOURCE3 %{buildroot}/etc/skel/.bash_logout
+LONG_BIT=$(getconf LONG_BIT)
+mv %{buildroot}%{_bindir}/bashbug \
+   %{buildroot}%{_bindir}/bashbug-"${LONG_BIT}"
+ln -s bashbug-"${LONG_BIT}" %{buildroot}%{_bindir}/bashbug
+ln -s bashbug.1 %{buildroot}/%{_mandir}/man1/bashbug-"$LONG_BIT".1
+
+# Fix missing sh-bangs in example scripts (bug #225609).
+for script in \
+  examples/scripts/shprompt
+# I don't know why these are gone in 4.3
+  #examples/scripts/krand.bash \
+  #examples/scripts/bcsh.sh \
+  #examples/scripts/precedence \
+do
+  cp "$script" "$script"-orig
+  echo '#!/bin/bash' > "$script"
+  cat "$script"-orig >> "$script"
+  rm -f "$script"-orig
+done
+
+# bug #820192, need to add execable alternatives for regular built-ins
+for ea in alias bg cd command fc fg getopts hash jobs read type ulimit umask unalias wait
+do
+  cat <<EOF > "%{buildroot}"/%{_bindir}/"$ea"
+#!/bin/sh
+builtin $ea "\$@"
+EOF
+chmod +x "%{buildroot}"/%{_bindir}/"$ea"
+done
+
+%find_lang %{name}
+
+# copy doc to /usr/share/doc
+cat /dev/null > %{name}-doc.files
+mkdir -p %{buildroot}/%{_pkgdocdir}/doc
+# loadables aren't buildable
+rm -rf examples/loadables
+for file in CHANGES COMPAT NEWS NOTES POSIX RBASH README examples
+do
+  cp -rp "$file" %{buildroot}%{_pkgdocdir}/"$file"
+  echo "%%doc %{_pkgdocdir}/$file" >> %{name}-doc.files
+done
+echo "%%doc %{_pkgdocdir}/doc" >> %{name}-doc.files
+
+
+
+%if %{with tests}
+%check
+make check
+%endif
+
+# post is in lua so that we can run it without any external deps.  Helps
+# for bootstrapping a new install.
+# Jesse Keating 2009-01-29 (code from Ignacio Vazquez-Abrams)
+# Roman Rakus 2011-11-07 (code from Sergey Romanov) #740611
+%post -p <lua>
+nl        = '\n'
+sh        = '/bin/sh'..nl
+bash      = '/bin/bash'..nl
+f = io.open('/etc/shells', 'a+')
+if f then
+  local shells = nl..f:read('*all')..nl
+  if not shells:find(nl..sh) then f:write(sh) end
+  if not shells:find(nl..bash) then f:write(bash) end
+  f:close()
+end
+
+%postun -p <lua>
+-- Run it only if we are uninstalling
+if arg[2] == "0"
+then
+  t={}
+  for line in io.lines("/etc/shells")
+  do
+    if line ~= "/bin/bash" and line ~= "/bin/sh"
+    then
+      table.insert(t,line)
+    end
+  end
+
+  f = io.open("/etc/shells", "w+")
+  for n,line in pairs(t)
+  do
+    f:write(line.."\n")
+  end
+  f:close()
+end
+
+%files -f %{name}.lang
+%config(noreplace) /etc/skel/.b*
+%{_bindir}/sh
+%{_bindir}/bash
+%{_bindir}/alias
+%{_bindir}/bg
+%{_bindir}/cd
+%{_bindir}/command
+%{_bindir}/fc
+%{_bindir}/fg
+%{_bindir}/hash
+%{_bindir}/getopts
+%{_bindir}/jobs
+%{_bindir}/read
+%{_bindir}/type
+%{_bindir}/ulimit
+%{_bindir}/umask
+%{_bindir}/unalias
+%{_bindir}/wait
+%dir %{_pkgdocdir}/
+%license COPYING
+%attr(0755,root,root) %{_bindir}/bashbug[-.]*
+%{_bindir}/bashbug
+%{_infodir}/bash.info*
+%{_mandir}/*/*
+%{_mandir}/*/..1*
+%doc RBASH README
+%doc doc/{FAQ,INTRO,README,bash{,ref}.html}
+
+%files doc -f %{name}-doc.files
+%doc doc/*.ps doc/*.0 doc/*.html doc/article.txt
+
+%files devel
+%{_includedir}/%{name}
+%{_libdir}/pkgconfig/%{name}.pc
+
+%changelog
+* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 5.0.17-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
+
+* Mon Jun 01 2020 Siteshwar Vashisht <svashisht@redhat.com> - 5.0.17-1
+- Update to bash-5.0 patchlevel 17
+
+* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 5.0.11-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
+
+* Fri Dec 06 2019 Siteshwar Vashisht <svashisht@redhat.com> - 5.0.11-1
+- Update to bash-5.0 patchlevel 11
+  Resolves: #1745602
+
+* Fri Aug 02 2019 Kamil Dudka <kdudka@redhat.com> - 5.0.7-3
+- Sanitize public header file <shell.h>
+  Resolves: #1736676
+
+* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> - 5.0.7-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
+
+* Tue May 07 2019 Siteshwar Vashisht <svashisht@redhat.com> - 5.0.7-1
+- Update to bash-5.0 patchlevel 7
+
+* Thu Feb 14 2019 Siteshwar Vashisht <svashisht@redhat.com> - 5.0.2-1
+- Rebase to bash 5.0
+  Resolves: #1675080
+
+* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.23-7
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
+
+* Thu Jan 10 2019 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.23-6
+- Avoid duplicating user path entries
+  Resolves: #1652639
+
+* Mon Oct 08 2018 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.23-5
+- Fix some issues identified by coverity
+
+* Mon Sep 10 2018 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.23-4
+- Set custom PATH in non-login shells
+  Resolves: #1615131
+
+* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.23-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
+
+* Mon Jun 25 2018 Miro Hrončok <mhroncok@redhat.com> - 4.4.23-2
+- Move user bin directories in front of the PATH
+  See: https://fedoraproject.org/wiki/Changes/UserPathPrioritization
+  Resolves: #1595098
+
+* Tue Jun 12 2018 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.23-1
+- Update to bash-4.4 patchlevel 23
+  Resolves: #1585510
+
+* Thu Mar 15 2018 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.19-2
+- Fix handling case statement in command subsitution
+  Resolves: #1556867
+
+* Mon Feb 12 2018 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.19-1
+- Update to bash-4.4 patchlevel 19
+  Resolves: #1540383
+
+* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.12-14
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
+
+* Wed Nov 08 2017 Christoph Junghans <junghans@votca.org> - 4.4.12-13
+- Package headers in devel package, in prep for MPI-bash
+
+* Mon Oct 30 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-12
+- Revert change to always source from /etc/bashrc
+
+* Tue Aug 29 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-11
+- Always source from /etc/bashrc
+  Resolves: #1193590
+
+* Tue Aug 22 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-10
+- Enable parallel builds
+
+* Tue Aug 08 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-9
+- command should not be treated as special builtin
+  Resolves: #1479220
+
+* Wed Aug 02 2017 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.12-8
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
+
+* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.12-7
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
+
+* Fri Jun 30 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-6
+- Fix test for comparing file modification times when they differ by subsecond
+  Resolves: #1458008
+
+* Tue May 30 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-5
+- command builtin should not abort on variable assignment errors
+  Resolves: #1389838
+
+* Wed Apr 26 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-4
+- Explicitly unset nonblocking mode while reading from stdin
+  Resolves: #1068697
+
+* Wed Apr 26 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-3
+- Fix heredoc file descriptor leak
+  Resolves: #1413676
+
+* Tue Apr 18 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-2
+- Document 'bashbug' for reporting bugs
+  Resolves: #1255886
+
+* Mon Apr 10 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.12-1
+- Update to bash-4.4 patchlevel 12
+
+* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 4.4.11-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
+
+* Sat Jan 21 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.11-1
+- Update to bash-4.4 patchlevel 11
+
+* Mon Jan 16 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.5-1
+- Update to bash-4.4 patchlevel 5
+
+* Fri Jan 06 2017 Siteshwar Vashisht <svashisht@redhat.com> - 4.4.0-1
+- Rebase to bash-4.4
+  Resolves: #1376609
+
+* Fri Sep 30 2016 Siteshwar Vashisht <svashisht@redhat.com> - 4.3.43-4
+- CVE-2016-7543: Fix for arbitrary code execution via SHELLOPTS+PS4 variables
+  Resolves: #1379634
+
+* Wed Sep 21 2016 David Kaspar [Dee'Kej] <dkaspar@redhat.com> - 4.3.43-3
+- CVE-2016-0634 - Fix for arbitrary code execution via malicious hostname
+  Resolves: #1377614
+
+* Tue Sep  6 2016 David Kaspar [Dee'Kej] <dkaspar@redhat.com> - 4.3.43-2
+- Inverted the condition for UsrMove safeguard check, so we comply with:
+  https://fedoraproject.org/wiki/Packaging:Conflicts
+
+* Thu Jun 23 2016 Siteshwar Vashisht <svashisht@redhat.com> - 4.3.43-1
+- Fix a crash in nested pipeline in lastpipe mode
+  Resolves: #1349430
+
+* Tue May 17 2016 Siteshwar Vashisht <svashisht@redhat.com> - 4.3.42-5
+- Do not set terminate_immediately and interrupt_immediately while expanding tilda
+  Resolves: #1336800
+
+* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 4.3.42-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
+
+* Mon Jan 11 2016 Ondrej Oprala <ooprala@redhat.com> - 4.3.42-3
+- Actually do it properly this time
+  Related: #1297166
+
+* Mon Jan 11 2016 Ondrej Oprala <ooprala@redhat.com> - 4.3.42-2
+- Provide exec-able alternatives to hash, type and ulimit
+  Resolves: #1297166
+
+* Tue Aug 18 2015 Ondrej Oprala - 4.3.42-1
+- Patchlevel 42
+
+* Mon Aug 03 2015 Ondrej Oprala - 4.3.39-6
+- #1245233 - fixed memleak
+
+* Wed Jul 15 2015 Ondrej Oprala - 4.3.39-5
+- #1182278 - bash crashes on `select' if REPLY is readonly
+- #1241533,1224855 - bash memleak when LC_ALL set
+
+* Tue Jun 30 2015 Ondrej Oprala - 4.3.39-4
+- Fix a leak introduced by plevel39
+
+* Tue Jun 30 2015 Ondrej Oprala - 4.3.39-3
+- Fix --rpm-requires
+
+* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.3.39-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
+
+* Thu May 21 2015 Ondrej Oprala <ooprala@redhat.com> - 4.3.39-1
+- Patchlevel 39
+
+* Mon Mar 16 2015 Than Ngo <than@redhat.com> 4.3.33-3
+- rebuild against new gcc
+
+* Fri Jan 23 2015 Elad Alfassa <elad@fedoraproject.org> - 4.3.25-3
+- Enable PIE (hardened build)
+
+* Tue Dec 30 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.33-1
+- Patchlevel 33
+
+* Wed Oct 08 2014 Dan Horák <dan[at]danny.cz> - 4.3.30-2
+- force refreshing generated files, fixes build on s390
+
+* Mon Oct 06 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.30-1
+- Patchlevel 30
+
+* Mon Oct 06 2014  Ondrej Oprala <ooprala@redhat.com> - 4.3.28-1
+- RedHat's patchlevel 28
+
+* Thu Sep 25 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.25-2
+- CVE-2014-7169
+  Resolves: #1146319
++
+* Thu Sep 25 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.25-1
+- Patchlevel 25
+
+* Wed Sep 24 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.24-2
+- Inhibit code injection - patch by Stephane Chazelas
+
+* Wed Aug 20 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.24-1
+- Patchlevel 24
+
+* Fri Aug 15 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.3.22-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
+
+* Mon Aug 04 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.22-1
+- Patchlevel 22
+
+* Wed Jul 30 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.18-7
+- #1102815 - fix double echo in vi visual mode
+
+* Thu Jul 24 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.18-6
+- Apply all upstream patches since 4.3-18-1 up to this date
+
+* Thu Jul 24 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.18-5
+- Array name expansion - apply upstream quickfix
+
+* Mon Jul 21 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.18-4
+- Mention ulimit -c and -f block size in POSIX mode
+
+* Fri Jul 11 2014 Tom Callaway <spot@fedoraproject.org> - 4.3.18-3
+- fix license handling
+
+* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.3.18-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
+
+* Mon Apr 14 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.18-1
+- Patchlevel 18
+
+* Mon Apr 14 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.11-2
+- And let the build system know...
+
+* Mon Apr 14 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.11-1
+- Patchlevel 11
+
+* Tue Apr 01 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.8-1
+- Patchlevel 8
+
+* Thu Feb 27 2014 Ondrej Oprala <ooprala@redhat.com> - 4.3.0-1
+- Update to bash-4.3
+
+* Wed Dec 04 2013 Ondrej Oprala <ooprala@redhat.com> - 4.2.45-6
+- Change the paths for format-security patch
+
+* Wed Dec 04 2013 Ondrej Oprala <ooprala@redhat.com> - 4.2.45-5
+- bash FTBFS if -Werror=format-string is used (#1036998)
+
+* Fri Aug 09 2013 Roman Rakus <rrakus@redhat.com> - 4.2.45-4
+- Added suggestion to .bashrc how to disable autopaging in systemctl
+
+* Fri Jul 26 2013 Ville Skyttä <ville.skytta@iki.fi> - 4.2.45-3
+- Install docs to %%{_pkgdocdir} where available.
+- Fix bogus dates in %%changelog.
+
+* Thu Jun 27 2013 Roman Rakus <rrakus@redhat.com> - 4.2.45-2
+- Fixed a bug that caused trap handlers to be executed recursively,
+  corrupting internal data structures.
+
+* Mon Mar 11 2013 Roman Rakus <rrakus@redhat.com> - 4.2.45-1
+- Patchlevel 45
+
+* Thu Jan 31 2013 Roman Rakus <rrakus@redhat.com> - 4.2.42-3
+- Fix usage of partial unitialized structure
+  Resolves: #857948
+
+* Thu Jan 31 2013 Roman Rakus <rrakus@redhat.com> - 4.2.42-2
+- Fix fd leaks
+  Resolves: #903833
+
+* Thu Jan 03 2013 Roman Rakus <rrakus@redhat.com> - 4.2.42-1
+- Patchlevel 42
+
+* Thu Nov 29 2012 Roman Rakus <rrakus@redhat.com> - 4.2.39-3
+- Use unsigned type for size
+
+* Tue Nov 27 2012 Roman Rakus <rrakus@redhat.com> - 4.2.39-2
+- Create bashbug symlink
+
+* Fri Nov 02 2012 Roman Rakus <rrakus@redhat.com> - 4.2.39-1
+- Patchlevel 39
+
+* Tue Aug 28 2012 Roman Rakus <rrakus@redhat.com> - 4.2.37-8
+- Fix a comments in rpm changelog
+
+* Tue Aug 28 2012 Roman Rakus <rrakus@redhat.com> - 4.2.37-7
+- Update info about trap in man page
+  Resolves: #799958
+- instead of setting the signal handler to SIG_IGN while installing
+  the new trap handler, block the signal and unblock it after the new handler
+  is installed
+  Resolves: #695656
+
+* Wed Aug 22 2012 Ondrej Oprala <ooprala@redhat.com> - 4.2.37-6
+- Revert revision 4.2.37-5 - already fixed upstream
+
+* Tue Aug 21 2012 Ondrej Oprala <ooprala@redhat.com> - 4.2.37-5
+- Don't filter out environmental variables with
+  a dot in the name
+  Resolves: #819995
+
+* Wed Aug 08 2012 Roman Rakus <rrakus@redhat.com> - 4.2.37-4
+- Added doc subdir to bash-doc ownership list
+  Resolves: #846734
+
+* Tue Jul 24 2012 Roman Rakus <rrakus@redhat.com> - 4.2.37-3
+- Increment patchlevel tag
+
+* Tue Jul 24 2012 Roman Rakus <rrakus@redhat.com> - 4.2.36-3
+- Patchlevel 37
+
+* Wed Jul 18 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.2.36-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
+
+* Tue Jul 10 2012 Roman Rakus <rrakus@redhat.com> - 4.2.36-1
+- Patchlevel 36
+
+* Sat Jun 23 2012 Roman Rakus <rrakus@redhat.com> - 4.2.29-3
+- Remove /bin from DEFAULT_PATH_VALUE
+  Resolves: #834571
+
+* Thu May 31 2012 Roman Rakus <rrakus@redhat.com> - 4.2.29-2
+- Patchlevel 29
+- Also keep release at -2, so we are newer then f16 and f17
+
+* Tue May 29 2012 Roman Rakus <rrakus@redhat.com> - 4.2.28-2
+- Provide exec-able alternatives to some builtins
+  Resolves #820192
+
+* Wed May 09 2012 Roman Rakus <rrakus@redhat.com> - 4.2.28-1
+- Patchlevel 28
+
+* Mon Apr 23 2012 Roman Rakus <rrakus@redhat.com> - 4.2.24-2
+- Don't call malloc in signal handler
+
+* Tue Mar 13 2012 Roman Rakus <rrakus@redhat.com> - 4.2.24-1
+- Patchlevel 24
+
+* Wed Jan 25 2012 Harald Hoyer <harald@redhat.com> 4.2.20-4
+- install everything in /usr
+  https://fedoraproject.org/wiki/Features/UsrMove
+
+* Thu Jan 12 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.2.20-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
+
+* Thu Nov 24 2011 Roman Rakus <rrakus@redhat.com> - 4.2.20-2
+- Add missing f:close() in postun
+- Patchlevel 20
+
+* Thu Nov 10 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-7
+- erase /bin/bash and /bin/sh in postun only if we are uninstalling (#752827)
+
+* Mon Nov 07 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-6
+- Simplified lua post script (#740611)
+
+* Fri Jul 29 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-5
+- Clean up unneeded bash-doc files (Ville Skyttä) (#721116)
+
+* Wed Jun 22 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-4
+- Don't crash when use `read' with associative array (#715050)
+
+* Tue Jun 07 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-3
+- Added $HOME/.local/bin to PATH in .bash_profile (#699812)
+
+* Thu May 05 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-2
+- Inc. a release no.
+
+* Thu May 05 2011 Roman Rakus <rrakus@redhat.com> - 4.2.10-1
+- Patchlevel 10
+
+* Thu Mar 31 2011 Roman Rakus <rrakus@redhat.com> - 4.2.8-2
+- Remove bash-4.2-xdupmbstowcs2-patch, which introduced another bugs
+
+* Tue Mar 15 2011 Roman Rakus <rrakus@redhat.com> - 4.2.8-1
+- Patchlevel 8
+
+* Tue Mar 15 2011 Roman Rakus <rrakus@redhat.com> - 4.2.7-3
+- #684293, fix the infinite loop with invalid wide char
+
+* Mon Mar 14 2011 Roman Rakus <rrakus@redhat.com> - 4.2.7-2
+- Use lua script in postun
+
+* Mon Mar 07 2011 Roman Rakus <rrakus@redhat.com> - 4.2.7-1
+- Patchlevel 7
+
+* Wed Mar 02 2011 Roman Rakus <rrakus@redhat.com> - 4.2.6-1
+- Patchlevel 6
+
+* Tue Mar 01 2011 Roman Rakus <rrakus@redhat.com> - 4.2.5-1
+- Patchlevel 5
+- Static analyzis show some issues in some patches
+- Some cleanup
+
+* Wed Feb 16 2011 Roman Rakus <rrakus@redhat.com> - 4.2.0-2
+- pattern matching glitch, patch from upstream
+
+* Wed Feb 16 2011 Roman Rakus <rrakus@redhat.com> - 4.2.0-1
+- Release bash-4.2
+
+* Mon Feb 14 2011 Roman Rakus <rrakus@redhat.com> - 4.2.0-0.2.rc2
+- Enable system-wide .bash_logout for login shells
+
+* Wed Feb 09 2011 Roman Rakus <rrakus@redhat.com> - 4.2.0-0.1.rc2
+- Update to bash-4.2-rc2
+
+* Mon Feb 07 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.1.9-6
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
+
+* Thu Jan 06 2011 Roman Rakus <rrakus@redhat.com> - 4.1.9-5
+- Builtins like echo and printf won't report errors
+  when output does not succeed due to EPIPE
+
+* Thu Dec 16 2010 Roman Rakus <rrakus@redhat.com> - 4.1.9-4
+- Drop doc/examples/loadables
+
+* Wed Dec 01 2010 Roman Rakus <rrakus@redhat.com> - 4.1.9-3
+- don't segfault when trying to bind int variable to array
+  with bad array subsrcipt
+  Resolves: #618289
+
+* Fri Oct 15 2010 Ville Skyttä <ville.skytta@iki.fi> - 4.1.9-2
+- Move doc dir ownership to main package.
+- Preserve doc timestamps.
+- Add --without tests option for building without running the test suite.
+
+* Thu Oct 14 2010 Roman Rakus <rrakus@redhat.com> - 4.1.9-1
+- Patch level 9
+
+* Mon Aug 02 2010 Roman Rakus <rrakus@redhat.com> - 4.1.7-4
+- Use better nomenclature for --rpm-requires bash option (#557134)
+
+* Tue Jun 22 2010 Roman Rakus <rrakus@redhat.com> - 4.1.7-3
+- Added missing patch
+
+* Tue Jun 22 2010 Roman Rakus <rrakus@redhat.com> - 4.1.7-2
+- Do the same CFLAGS in generated Makefile in examples
+
+* Fri May 21 2010 Roman Rakus <rrakus@redhat.com> - 4.1.7-1
+- Patch level 7
+
+* Mon Apr 12 2010 Roman Rakus <rrakus@redhat.com> - 4.1.5-1
+- Patch level 5
+- There's no more need for Requires(post) ncurses-libs
+
+* Tue Mar 30 2010 Roman Rakus <rrakus@redhat.com> - 4.1.2-4
+- Corrected requires patch (#563301)
+
+* Fri Jan 22 2010 rrakus@redhat.com 4.1.2-3
+- Don't use cond-rmatch patch
+- Use manso patch
+- Include COPYING in base bash rpm
+
+* Fri Jan 22 2010 rrakus@redhat.com 4.1.2-2
+- Correct patchlevel 2
+
+* Fri Jan 22 2010 Roman Rakus rrakus@redhat.com 4.1.2-1
+- Patchlevel 4.2
+- Removed old patch
+- Returned back manso patch
+
+* Fri Jan 08 2010 Roman Rakus rrakus@redhat.com 4.1.0-2
+- Include COPYING in doc dir
+
+* Mon Jan 04 2010 Roman Rakus <rrakus@redhat.com> - 4.1.0-1
+- Upstream 4.1
+
+* Sun Dec 27 2009 Roman Rakus <rrakus@redhat.com> - 4.1-0.2.rc1
+- Fixed patch for fuzz=0
+
+* Sun Dec 27 2009 Roman Rakus <rrakus@redhat.com> - 4.1-0.1.rc1
+- Upstream 4.1.rc1
+
+* Fri Dec 11 2009 Roman Rakus <rrakus@redhat.com> - 4.0.35-2
+- Don't segfault when TERM=eterm* and EMACS is unset (#530911)
+
+* Thu Oct 29 2009 Roman Rakus <rrakus@redhat.com> - 4.0.35-1
+- Patch level 35
+
+* Mon Oct 05 2009 Roman Rakus <rrakus@redhat.com> - 4.0.33-2
+- Make symlink from bashbug-suffix to bashbug man pages
+
+* Wed Sep 16 2009 Roman Rakus <rrakus@redhat.com> - 4.0.33-1
+- Patch level 33
+- spec file cleanup
+
+* Fri Sep 04 2009 Roman Rakus <rrakus@redhat.com> - 4.0.28-3
+- check if interp section is NOBITS
+- define Recycles pids
+
+* Wed Aug 26 2009 Roman Rakus <rrakus@redhat.com> - 4.0.28-2
+- alloc memory for key in creation associative array (#518644)
+
+* Tue Jul 28 2009 Roman Rakus <rrakus@redhat.com> - 4.0.28-1
+- Upstream patch level 28
+
+* Fri Jul 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.0.24-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
+
+* Tue May 19 2009 Roman Rakus <rrakus@redhat.com> - 4.0.24-1
+- Upstream patch level 24
+
+* Wed Apr 22 2009 Roman Rakus <rrakus@redhat.com> - 4.0.16-1
+- better to use patch level in version tag like vim do
+
+* Tue Apr 21 2009 Roman Rakus <rrakus@redhat.com> - 4.0-7.16
+- Use patch level in Release tag
+
+* Wed Apr 08 2009 Roman Rakus <rrakus@redhat.com> - 4.0-6
+- Official upstream patch level 16
+
+* Mon Mar 30 2009 Roman Rakus <rrakus@redhat.com> - 4.0-5
+- Split documentation, use bash-doc package
+  Resolves: #492447
+
+* Sat Mar 21 2009 Lubomir Rintel <lkundrak@v3.sk> - 4.0-4
+- Add full URLs to upstream patches
+- Don't uselessly use %%version macro
+
+* Wed Mar 11 2009 Roman Rakus <rrakus@redhat.com> - 4.0-3
+- Official upstream patch level 10
+
+* Wed Feb 25 2009 Roman Rakus <rrakus@redhat.com> - 4.0-2
+- Save parser state in pcomplete.
+  Resolves: #487257
+
+* Tue Feb 24 2009 Roman Rakus <rrakus@redhat.com> - 4.0-1
+- Release of bash-4.0
+
+* Mon Feb 23 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.0-0.5.rc1
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
+
+* Wed Feb 11 2009 Roman Rakus <rrakus@redhat.com> - 4.0-0.4.rc1
+- Fix handling pipelines with `set -e'
+  Resolves: #483385
+
+* Thu Jan 29 2009 Roman Rakus <rrakus@redhat.com> - 4.0-0.3.rc1
+- No more debug output
+  Resolves: #483002
+
+* Wed Jan 28 2009 Jesse Keating <jkeating@redhat.com> - 4.0-0.2.rc1
+- Replace post code with lua to be able to not have external deps
+
+* Mon Jan 26 2009 Roman Rakus <rrakus@redhat.com> - 4.0-0.1.rc1
+- Fixed release tag
+
+* Wed Jan 21 2009 Roman Rakus <rrakus@redhat.com> - 4.0-rc1.1
+- Bump to upstream bash-4.0-rc1
+
+* Mon Dec 15 2008 Roman Rakus <rrakus@redhat.com> - 3.2-33
+- fc builtin fix
+  Resolves: #438841
+
+* Mon Dec 15 2008 Roman Rakus <rrakus@redhat.com> - 3.2-32
+- Enabling auditing
+  Resolves: #476216
+
+* Tue Dec 09 2008 Roman Rakus <rrakus@redhat.com> - 3.2-31
+- Patchlevel 48
+
+* Thu Dec 04 2008 Roman Rakus <rrakus@redhat.com> - 3.2-30
+- Added check for `command_not_found_handler' shell function
+  Resolves: #432579
+
+* Tue Oct 28 2008 Jesse Keating <jkeating@redhat.com> - 3.2-29
+- Add the Requires(post) back for ncurses-libs, so that rpm knows
+  where to break the loop.  The post actually does require the curses
+  libs for the sh calls.  Could consider doing this in LUA and not have
+  any external deps.
+
+* Thu Oct 23 2008 Roman Rakus <rrakus@redhat.com> - 3.2-28
+- Removing Requires for mktemp and ncurses, which cause
+  dependencing loop
+- Enabling #define SSH_SOURCE_BASHRC, because ssh changed.
+  Resolves: #458839
+- Catch signals right after calling execve()
+  Resolves: #455548
+
+* Thu Jul 17 2008 Roman Rakus <rrakus@redhat.com> - 3.2-27
+- Changes in man page - #442018, #445692, #446625, #453409
+- Changed patches to satisfy fuzz=0
+
+* Thu Jun  5 2008 Roman Rakus <rrakus@redhat.com> - 3.2-26
+- Patchlevel 39
+
+* Tue Jun  3 2008 Roman Rakus <rrakus@redhat.com> - 3.2-25
+- #449512 - reverting back last change - don't use glob library
+
+* Wed May 28 2008 Roman Rakus <rrakus@redhat.com> - 3.2-24
+- #217359 - use posix glob library
+
+* Thu May 22 2008 Roman Rakus <rrakus@redhat.com> - 3.2-23
+- #446420 - COMP_WORDBREAKS settings now works
+
+* Fri Feb 29 2008 Tomas Janousek <tjanouse@redhat.com> - 3.2-22
+- drop /usr/bin/clear from /etc/skel/.bash_logout as suggested by #429406
+
+* Wed Feb 20 2008 Fedora Release Engineering <rel-eng@fedoraproject.org> - 3.2-21
+- Autorebuild for GCC 4.3
+
+* Mon Jan 14 2008 Tomas Janousek <tjanouse@redhat.com> - 3.2-20
+- Added bash32-026 upstream official patch
+- Added bash32-027 upstream official patch (#249987)
+- Added bash32-028 upstream official patch
+- Added bash32-029 upstream official patch (#286861)
+- Added bash32-030 upstream official patch
+- Added bash32-031 upstream official patch (#358231)
+- Added bash32-032 upstream official patch
+- Added bash32-033 upstream official patch
+- Fix insert command repeating in vi mode (#190350)
+
+* Tue Nov 06 2007 Tomas Janousek <tjanouse@redhat.com> - 3.2-19
+- fix cursor position when prompt has one invisible character (#358231)
+- dropped examples/loadables/ from docs, since it wasn't possible to build them
+  anyway (#174380)
+- fix #286861: Wrong input confuses bash's arithmetic unit permanently
+- fix #344411: $RANDOM stays the same when job executed in the background
+
+* Fri Aug 31 2007 Pete Graner <pgraner@redhat.com> - 3.2-18
+- Added bash32-021 upstream official patch
+- Added bash32-025 upstream official patch
+- Added bash32-024 upstream official patch
+- Added bash32-023 upstream official patch
+- Added bash32-022 upstream official patch
+
+* Wed Aug 29 2007 Pete Graner <pgraner@redhat.com> - 3.2-17
+- Added bash32-018 upstream official patch
+- Added bash32-020 upstream official patch
+- Added bash32-019 upstream official patch
+
+* Thu Aug 23 2007 Pete Graner <pgraner@redhat.com> - 3.2-16
+- Rebuild
+
+* Mon Aug 20 2007 Pete Graner <pgraner@redhat.com> - 3.2-15
+- Update to the Improve bash $RANDOM pseudo RNG (bug #234906) 
+  now works with subshells and make $RANDOM on demand thus reducing the 
+  amount of AVCs thrown.
+
+* Thu Aug 16 2007 Pete Graner <pgraner@redhat.com> - 3.2-15
+- Changed spec file License to GPLv2+
+
+* Wed Aug 15 2007 Pete Graner <pgraner@redhat.com> - 3.2-13
+- Improve bash $RANDOM pseudo RNG (bug #234906)
+
+* Fri Jul 20 2007 Tim Waugh <twaugh@redhat.com> 3.2-12
+- Quote environment variables in the post scriptlet to prevent upgrade
+  failures (bug #249005).
+
+* Thu Jul  5 2007 Tim Waugh <twaugh@redhat.com> 3.2-11
+- Patchlevel 17 (bug #241647).
+
+* Wed Jul  4 2007 Tim Waugh <twaugh@redhat.com> 3.2-10
+- Clarification in the ulimit man page (bug #220657).
+
+* Mon Feb 12 2007 Tim Waugh <twaugh@redhat.com> 3.2-9
+- Rebuild to link with libtinfo instead of libncurses.
+
+* Wed Feb  7 2007 Tim Waugh <twaugh@redhat.com> 3.2-8
+- Avoid %%makeinstall (bug #225609).
+
+* Tue Feb  6 2007 Tim Waugh <twaugh@redhat.com> 3.2-7
+- Reinstated this change:
+  - Post requires ncurses (bug #224567).
+- Reverted this change:
+  - Added triggers for install-info (bug #225609).
+
+* Tue Feb  6 2007 Tim Waugh <twaugh@redhat.com> 3.2-6
+- Reverted this change:
+  - Post requires ncurses (bug #224567).
+
+* Mon Feb  5 2007 Tim Waugh <twaugh@redhat.com> 3.2-5
+- Added triggers for install-info (bug #225609).
+- Use full path to utilities in scriptlets (bug #225609).
+- Fix missing sh-bangs in example scripts (bug #225609).
+- Post requires ncurses (bug #224567).
+- Removed Prefix tag (bug #225609).
+- Fixed BuildRoot tag (bug #225609).
+- Removed trailing full-stop from summary (bug #225609).
+- Spec file is now UTF-8 (bug #225609).
+- Removed obsolete Obsoletes (bug #225609).
+- Moved 'make check' to new 'check' section (bug #225609).
+- Removed uses of RPM_SOURCE_DIR (bug #225609).
+- Fixed macros in changelog (bug #225609).
+- Changed tabs to spaces (bug #225609).
+
+* Tue Jan 23 2007 Tim Waugh <twaugh@redhat.com> 3.2-4
+- Slightly better .bash_logout (bug #223960).
+
+* Fri Jan 19 2007 Tim Waugh <twaugh@redhat.com> 3.2-3
+- Back out rmatch change introduced in 3.2 (bug #220087).
+
+* Tue Jan 16 2007 Miroslav Lichvar <mlichvar@redhat.com> 3.2-2
+- Link with ncurses.
+
+* Fri Dec 15 2006 Tim Waugh <twaugh@redhat.com> 3.2-1
+- Build requires autoconf and gettext.
+- 3.2.  No longer need aq, login, ulimit, sighandler or read-memleak
+  patches.
+
+* Wed Jul 12 2006 Tim Waugh <twaugh@redhat.com> 3.1-17
+- Fixed 'tags out of date' problem with 'info bash' (bug #150118).
+
+* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 3.1-16.1
+- rebuild
+
+* Wed Jun 28 2006 Tim Waugh <twaugh@redhat.com> 3.1-16
+- Removed 'unset USERNAME' from default .bash_profile (bug #196735).
+
+* Thu Jun 15 2006 Tim Waugh <twaugh@redhat.com> 3.1-15
+- Updated requires patch to the ALT version.
+
+* Wed May 31 2006 Tim Waugh <twaugh@redhat.com> 3.1-14
+- More sighandler fixes, this time hypothetical.
+
+* Thu May 25 2006 Tim Waugh <twaugh@redhat.com> 3.1-13
+- Another fix for the sighandler patch (bug #192297).
+
+* Thu Apr 13 2006 Tim Waugh <twaugh@redhat.com> 3.1-12
+- Patchlevel 17.
+
+* Tue Apr  4 2006 Tim Waugh <twaugh@redhat.com> 3.1-11
+- Patchlevel 16.
+
+* Thu Mar 23 2006 Tim Waugh <twaugh@redhat.com> 3.1-10
+- Patchlevel 14.
+
+* Thu Mar  2 2006 Tim Waugh <twaugh@redhat.com> 3.1-9
+- Fixed duplicate documentation of ulimit '-x' option introduced by
+  ulimit patch (bug #183596).
+
+* Tue Feb 21 2006 Tim Waugh <twaugh@redhat.com> 3.1-8
+- Patchlevel 10.
+
+* Thu Feb 16 2006 Tim Waugh <twaugh@redhat.com> 3.1-7
+- Patchlevel 8.
+
+* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 3.1-6.2
+- bump again for double-long bug on ppc(64)
+
+* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 3.1-6.1
+- rebuilt for new gcc4.1 snapshot and glibc changes
+
+* Sun Feb  5 2006 Tim Waugh <twaugh@redhat.com> 3.1-6
+- Patchlevel 7.
+
+* Wed Jan 18 2006 Tim Waugh <twaugh@redhat.com>
+- Removed inaccuracies from %%description (bug #178189).
+
+* Fri Jan 13 2006 Tim Waugh <twaugh@redhat.com> 3.1-5
+- Fix 'exec -l /bin/bash'.
+
+* Thu Jan 12 2006 Tim Waugh <twaugh@redhat.com> 3.1-4
+- Fix sighandler patch bug (bug #177545).
+
+* Tue Jan 10 2006 Tim Waugh <twaugh@redhat.com> 3.1-3
+- Patchlevel 5.
+
+* Fri Jan  6 2006 Tim Waugh <twaugh@redhat.com> 3.1-2
+- No longer need loadables, mbinc or shellfunc patches.
+- Use literal single-quote in bash man page where appropriate (bug #177051).
+
+* Mon Jan  2 2006 Tim Waugh <twaugh@redhat.com> 3.1-1
+- 3.1.
+- No longer need ia64, utf8, multibyteifs, jobs, sigpipe,
+  read-e-segfault, manpage, crash, pwd, afs, subshell patches.
+- Remove wrap patch for now.
+- Use upstream patch to fix arrays.
+
+* Thu Dec 15 2005 Tim Waugh <twaugh@redhat.com> 3.0-41
+- Missed another loop for improved sighandler patch (bug #169231).
+
+* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
+- rebuilt
+
+* Thu Dec  8 2005 Tim Waugh <twaugh@redhat.com> 3.0-40
+- Fix read memleak when reading from non-blocking fd (bug #173283).
+- Missed another loop for improved sighandler patch (bug #169231).
+
+* Wed Dec  7 2005 Tim Waugh <twaugh@redhat.com> 3.0-39
+- Missed a loop for improved sighandler patch (bug #169231).
+
+* Tue Dec  6 2005 Tim Waugh <twaugh@redhat.com> 3.0-38
+- Test out improved sighandler patch (bug #169231).
+
+* Tue Nov 22 2005 Tim Waugh <twaugh@redhat.com> 3.0-37
+- Applied patch from upstream to fix parsing problem (bug #146638).
+
+* Wed Nov  9 2005 Tim Waugh <twaugh@redhat.com> 3.0-36
+- Added Url: tag (bug #172770).
+- Do not explicitly gzip info pages (bug #172770).
+- Fix permissions on bashbug (bug #172770).
+
+* Thu Oct  6 2005 Tim Waugh <twaugh@redhat.com> 3.0-35
+- Fixed memory allocation bug in multibyteifs patch (bug #169996).
+
+* Fri Sep 23 2005 Tim Waugh <twaugh@redhat.com>
+- Use 'volatile' in sighandler patch.
+
+* Wed Sep 21 2005 Tim Waugh <twaugh@redhat.com> 3.0-34
+- Avoid writing history files during signal handling (bug #163235).
+
+* Mon Aug  8 2005 Tim Waugh <twaugh@redhat.com> 3.0-33
+- Fixed multibyte IFS handling for invalid input (bug #165243).
+
+* Mon Aug  8 2005 Tim Waugh <twaugh@redhat.com> 3.0-32
+- Fixed 'LC_ALL=C export LC_ALL' behaviour (bug #165249).
+
+* Thu Jun 23 2005 Tim Waugh <twaugh@redhat.com>
+- Added ulimit support for RLIMIT_NICE and RLIMIT_RTPRIO (bug #157049).
+
+* Wed Jun  8 2005 Tim Waugh <twaugh@redhat.com>
+- Move a comment in dot-bashrc (bug #159522).
+
+* Tue May 10 2005 Tim Waugh <twaugh@redhat.com> 3.0-31
+- Small fix for multibyteifs patch to prevent segfault (bug #157260).
+
+* Wed Apr 20 2005 Tim Waugh <twaugh@redhat.com>
+- Fixed AFS support for output redirection, so that the correct errors
+  are reported for other filesystems (bug #155373).
+
+* Tue Mar 15 2005 Tim Waugh <twaugh@redhat.com> 3.0-30
+- Fix PS1 expansion crash when PWD is unset (bg #151116).
+
+* Wed Mar  2 2005 Tim Waugh <twaugh@redhat.com> 3.0-29
+- Rebuild for new GCC.
+
+* Thu Feb 17 2005 Tim Waugh <twaugh@redhat.com> 3.0-28
+- Define _GNU_SOURCE in CPPFLAGS (bug #147573).
+
+* Mon Feb 14 2005 Tim Waugh <twaugh@redhat.com>
+- Reverted this change:
+  - Added code to /etc/skel/.bash_logout to support the gpm selection buffer
+    invalidation on virtual terminals (bug #115493).
+
+* Mon Jan 31 2005 Tim Waugh <twaugh@redhat.com> 3.0-27
+- Applied upstream patch to fix a potential NULL dereference.
+
+* Fri Jan 28 2005 Tim Waugh <twaugh@redhat.com> 3.0-26
+- Fixed job handling bug (bug #145124).
+
+* Sun Dec  5 2004 Tim Waugh <twaugh@redhat.com> 3.0-25
+- Applied patch from Florian La Roche to fix CPPFLAGS quoting in spec file.
+
+* Tue Nov 30 2004 Tim Waugh <twaugh@redhat.com>
+- Fixed typo in man page (spotted on bug-bash).
+
+* Thu Nov 18 2004 Tim Waugh <twaugh@redhat.com> 3.0-24
+- Use upstream patch to fix bug #139575 and bug #139306.
+
+* Thu Nov 18 2004 Tim Waugh <twaugh@redhat.com> 3.0-23
+- Fixed last patch to avoid regressions (bug #139575).
+
+* Mon Nov 15 2004 Tim Waugh <twaugh@redhat.com> 3.0-22
+- Fixed prompt wrapping code to cope with zero-length prompts (bug #139306).
+
+* Thu Nov 11 2004 Tim Waugh <twaugh@redhat.com> 3.0-21
+- Added code to /etc/skel/.bash_logout to support the gpm selection buffer
+  invalidation on virtual terminals (bug #115493).
+
+* Wed Nov 10 2004 Tim Waugh <twaugh@redhat.com> 3.0-20
+- Patchlevel 16.
+
+* Mon Nov  1 2004 Tim Waugh <twaugh@redhat.com>
+- Patchlevel 15.
+
+* Tue Oct 19 2004 Tim Waugh <twaugh@redhat.com> 3.0-17
+- Patchlevel 14.
+- No longer need brace patch.
+
+* Wed Sep 29 2004 Tim Waugh <twaugh@redhat.com> 3.0-16
+- Apply patch from Chet Ramey to fix brace expansion.
+
+* Fri Sep 24 2004 Tim Waugh <twaugh@redhat.com> 3.0-15
+- Minor fix for job handling.
+
+* Mon Sep 13 2004 Tim Waugh <twaugh@redhat.com>
+- Add bashbug back in (with suffix).
+
+* Mon Sep 13 2004 Tim Waugh <twaugh@redhat.com>
+- Remove bash2.
+
+* Fri Sep 10 2004 Tim Waugh <twaugh@redhat.com> 3.0-14
+- Don't run tests that read from /dev/tty.
+- Patchlevel 13.
+
+* Wed Sep  8 2004 Tim Waugh <twaugh@redhat.com> 3.0-13
+- Check for EINVAL from waitpid() and avoid WCONTINUED in that case.
+- Fixed jobs4 test.
+- Applied experimental upstream patch for trap compatibility.
+- Re-make documentation to reflect source changes.
+
+* Tue Sep  7 2004 Tim Waugh <twaugh@redhat.com> 3.0-12
+- Remove 'bashbug' from the documentation, because we don't ship it due
+  to biarch concerns.
+
+* Thu Sep  2 2004 Tim Waugh <twaugh@redhat.com> 3.0-11
+- Fixed multibyte parameter length expansion.
+
+* Tue Aug 31 2004 Tim Waugh <twaugh@redhat.com> 3.0-9
+- Fix ulimits patch from Ulrich Drepper (bug #129800).
+
+* Fri Aug 27 2004 Tim Waugh <twaugh@redhat.com> 3.0-8
+- Provide support for new limits (bug #129800).
+
+* Thu Aug 26 2004 Tim Waugh <twaugh@redhat.com> 3.0-7
+- Use upstream patch for last fix.
+
+* Thu Aug 26 2004 Tim Waugh <twaugh@redhat.com> 3.0-6
+- Fixed history saved-line handling.
+
+* Tue Aug 24 2004 Tim Waugh <twaugh@redhat.com>
+- Fixed multibyte IFS handling.
+
+* Wed Aug 18 2004 Tim Waugh <twaugh@redhat.com>
+- Applied bug-bash list patch to fix pipefail.
+
+* Tue Aug 17 2004 Tim Waugh <twaugh@redhat.com> 3.0-5
+- Make trap usage string show POSIX usage (bug #128938).
+- Updated ${x[@]:1} expansion fix from bug-bash list.
+- Updated patch to fix unset array crash (from bug-bash list).
+
+* Sun Aug 15 2004 Tim Waugh <twaugh@redhat.com>
+- Fix ${x[@]:1} expansion (William Park, bug-bash list).
+
+* Tue Aug 10 2004 Tim Waugh <twaugh@redhat.com> 3.0-4
+- Fix vi-change-char behaviour at EOL (bug #129526).
+
+* Mon Aug  9 2004 Tim Waugh <twaugh@redhat.com> 3.0-3
+- Applied bug-bash list patch to fix multiline PS1 prompting (bug #129382).
+
+* Wed Aug  4 2004 Tim Waugh <twaugh@redhat.com> 3.0-2
+- Fixed brace expansion (bug #129128).
+- Build with AFS support again, since bug #86514 seems fixed upstream
+  (bug #129094).
+
+* Tue Aug  3 2004 Tim Waugh <twaugh@redhat.com>
+- Fixed crash when unsetting an unset array (from bug-bash list).
+
+* Wed Jul 28 2004 Tim Waugh <twaugh@redhat.com> 3.0-1
+- 3.0.
+
+* Wed Jul 21 2004 Tim Waugh <twaugh@redhat.com> 2.05b-44
+- Don't report SIGPIPE errors (bug #128274).
+
+* Thu Jul  8 2004 Tim Waugh <twaugh@redhat.com> 2.05b-43
+- Fixed command substitution problem (bug #127242).
+
+* Mon Jun 28 2004 Tim Waugh <twaugh@redhat.com> 2.05b-42
+- Fixed multibyte variable substitution patch (bug #126399).
+
+* Thu Jun 17 2004 Karsten Hopp <karsten@redhat.de> 2.05b-41 
+- remove bashbug script/docs to avoid conflicting files in
+  biarch installs.
+
+* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Fri Jun  4 2004 Tim Waugh <twaugh@redhat.com>
+- Build requires bison (bug #125307).
+
+* Wed Jun  2 2004 Tim Waugh <twaugh@redhat.com> 2.05b-39
+- Build requires libtermcap-devel (bug #125068).
+
+* Wed May 19 2004 Tim Waugh <twaugh@redhat.com>
+- Don't ship empty %%{_libdir}/bash (bug #123556).
+
+* Thu Mar 11 2004 Tim Waugh <twaugh@redhat.com> 2.05b-38
+- Apply patch from Nalin Dahyabhai fixing an overread.
+
+* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Thu Jan 22 2004 Tim Waugh <twaugh@redhat.com> 2.05b-36
+- Fix the bug causing bindings to need reparsing .inputrc (bug #114101).
+
+* Mon Jan  5 2004 Tim Waugh <twaugh@redhat.com> 2.05b-35
+- Fix parameter expansion in multibyte locales (bug #112657).
+- Run 'make check'.
+
+* Tue Dec  9 2003 Tim Waugh <twaugh@redhat.com> 2.05b-34
+- Build requires texinfo (bug #111171).
+
+* Fri Nov 28 2003 Tim Waugh <twaugh@redhat.com> 2.05b-33
+- Speed up UTF-8 command-line redrawing in the common case (bug #102353,
+  bug #110777).
+
+* Thu Nov  6 2003 Tim Waugh <twaugh@redhat.com> 2.05b-32
+- Apply upstream patches (bug #109269 among others).
+
+* Fri Oct 31 2003 Tim Waugh <twaugh@redhat.com>
+- Fix bash.info (bug #83776).
+
+* Tue Oct 28 2003 Tim Waugh <twaugh@redhat.com> 2.05b-31
+- Add bash205b-007 patch to fix bug #106876.
+
+* Thu Oct 23 2003 Tim Waugh <twaugh@redhat.com> 2.05b-30
+- Rebuilt.
+
+* Thu Sep 18 2003 Tim Waugh <twaugh@redhat.com> 2.05b-29.1
+- Rebuilt.
+
+* Thu Sep 18 2003 Tim Waugh <twaugh@redhat.com> 2.05b-29
+- Avoid crashing on multibyte input when locale is set incorrectly
+  (bug #74266).
+
+* Fri Sep  5 2003 Tim Waugh <twaugh@redhat.com> 2.05b-28.1
+- Rebuilt.
+
+* Fri Sep  5 2003 Tim Waugh <twaugh@redhat.com> 2.05b-28
+- Avoid built-in malloc implementation (bug #103768).
+
+* Wed Sep  3 2003 Tim Waugh <twaugh@redhat.com> 2.05b-27.1
+- Rebuilt.
+
+* Wed Sep  3 2003 Tim Waugh <twaugh@redhat.com> 2.05b-27
+- LFS support (bug #103627).
+
+* Thu Jul 31 2003 Tim Waugh <twaugh@redhat.com> 2.05b-26.1
+- Rebuilt.
+
+* Thu Jul 31 2003 Tim Waugh <twaugh@redhat.com> 2.05b-26
+- Merge bash-doc into main package (bug #100632).
+
+* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com> 2.05b-25
+- rebuilt
+
+* Mon May 12 2003 Tim Waugh <twaugh@redhat.com> 2.05b-24
+- Fix completion display when multibyte or control characters are to be
+  shown (bug #90201).
+
+* Wed Mar 26 2003 Tim Waugh <twaugh@redhat.com> 2.05b-23
+- Fix a warning message (bug #79629).
+- Don't remove generated source during build, for debuginfo package.
+- Don't build with AFS support (bug #86514).
+
+* Tue Mar 25 2003 Tim Waugh <twaugh@redhat.com> 2.05b-22
+- Really fix bug #78455.
+
+* Tue Mar 11 2003 Tim Waugh <twaugh@redhat.com> 2.05b-21
+- Don't explicitly strip binaries (bug #85995).
+
+* Tue Feb 11 2003 Tim Waugh <twaugh@redhat.com> 2.05b-20
+- Really fix bug #83331 for good.
+
+* Mon Feb 10 2003 Tim Waugh <twaugh@redhat.com> 2.05b-19
+- Fix builtins.1.
+
+* Fri Feb  7 2003 Tim Waugh <twaugh@redhat.com> 2.05b-18
+- Actually apply the patch (bug #83331).
+
+* Wed Feb  5 2003 Tim Waugh <twaugh@redhat.com> 2.05b-17
+- Fix history/UTF-8 bug (bug #83331).
+
+* Sun Jan 26 2003 Tim Waugh <twaugh@redhat.com> 2.05b-16
+- More tab-completion fixing (bug #72512).
+
+* Wed Jan 22 2003 Tim Powers <timp@redhat.com> 2.05b-15
+- rebuilt
+
+* Wed Jan 15 2003 Tim Waugh <twaugh@redhat.com> 2.05b-14
+- Force pgrp synchronization (bug #81653).
+
+* Thu Dec 05 2002 Elliot Lee <sopwith@redhat.com> 2.05b-13
+- (patch26) Don't call 'size' in makefile. Pointless, and interferes with 
+  cross compiles.
+
+* Tue Dec  3 2002 Tim Waugh <twaugh@redhat.com> 2.05b-12
+- Prevent prompt overwriting output (bug #74383).
+
+* Wed Nov 27 2002 Tim Waugh <twaugh@redhat.com> 2.05b-11
+- Fix '-rbash' (bug #78455).
+
+* Thu Nov 21 2002 Tim Waugh <twaugh@redhat.com> 2.05b-10
+- Rebuild.
+
+* Wed Nov 20 2002 Elliot Lee <sopwith@redhat.com>
+- Use the configure macro instead of calling ./configure directly
+
+* Wed Nov 13 2002 Tim Waugh <twaugh@redhat.com>
+- Revert previous change.
+
+* Wed Nov 13 2002 Tim Waugh <twaugh@redhat.com> 2.05b-8
+- PreReq libtermcap.
+
+* Fri Oct 18 2002 Tim Waugh <twaugh@redhat.com> 2.05b-7
+- Add readline-init patch (bug #74925).
+
+* Wed Oct 16 2002 Tim Waugh <twaugh@redhat.com> 2.05b-6
+- Add the (4) patches from ftp.gnu.org (bug #75888, bug #72512).
+- Ship '.' man page, which doesn't get picked up by glob.
+- Don't install files not shipped when building.
+- Locale shell variables fix (bug #74701).
+
+* Fri Aug 23 2002 Tim Powers <timp@redhat.com> 2.05b-5
+- re-bzip the docs, something was corrupted
+
+* Thu Aug 22 2002 Tim Waugh <twaugh@redhat.com> 2.05b-4
+- Fix history substitution modifiers in UTF-8 (bug #70294, bug #71186).
+- Fix ADVANCE_CHAR at end of string (bug #70819).
+- docs: CWRU/POSIX.NOTES no longer exists, but ship POSIX.
+
+* Wed Aug 07 2002 Phil Knirsch <pknirsch@redhat.com> 2.05b-3
+- Fixed out of memory problem with readline.
+
+* Tue Jul 23 2002 Phil Knirsch <pknirsch@redhat.com> 2.05b-2
+- Added symlink for sh.1 in man1 section so that man sh works (#44039).
+
+* Mon Jul 22 2002 Phil Knirsch <pknirsch@redhat.com> 2.05b-1
+- Update to 2.05b
+
+* Wed Jul 10 2002 Phil Knirsch <pknirsch@redhat.com> 2.05a-16
+- Fixed readline utf8 problem (#68313).
+
+* Fri Jun 21 2002 Tim Powers <timp@redhat.com> 2.05a-15
+- automated rebuild
+
+* Thu May 23 2002 Tim Powers <timp@redhat.com> 2.05a-14
+- automated rebuild
+
+* Fri Apr 12 2002 Tim Powers <timp@redhat.com> 2.05a-13
+- don't build the stuff in examples/loadables. It breaks FHS
+  compliance
+
+* Fri Apr  5 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-12
+- Fix the fix for #62418
+
+* Thu Apr  4 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-11
+- Fix kill builtin (#62418)
+
+* Mon Mar 25 2002 Trond Eivind Glomsrød <teg@redhat.com> 2.0.5a-10
+- Get rid of completion subpackage
+- Use %%{_tmppath}
+
+* Mon Mar 11 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-9
+- Add patch from Ulrich Drepper to get better error messages when trying
+  to launch an application with a bad ELF interpreter (e.g. libc5 ld.so)
+  (#60870)
+
+* Fri Feb 22 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-8
+- Update completion
+
+* Wed Jan 30 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-7
+- Update completion stuff and move it to a separate package
+
+* Sat Jan 26 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-6
+- Add patches from Ian Macdonald <ian@caliban.org>
+
+* Wed Jan 23 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-5
+- Add programmable completion (optional)
+
+* Thu Jan 17 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-4
+- Fix mailcheck (#57792)
+
+* Tue Jan 15 2002 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-3
+- Fix autoconf mess
+- Build --with-afs, some users may be using it
+
+* Wed Jan 09 2002 Tim Powers <timp@redhat.com>
+- automated rebuild
+
+* Thu Nov 22 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-2
+- Fix conflict with sh-utils (printf builtin manpage vs. printf binary manpage)
+  (#56590)
+
+* Tue Nov 20 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05a-1
+- 2.05a
+
+* Wed Oct 10 2001 Florian La Roche <Florian.LaRoche@redhat.de>
+- disable s390x fix, not needed anymore
+
+* Mon Oct  1 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-9
+- Add patch from readline 4.2-3 to bash's internal libreadline
+
+* Mon Jul  9 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-8
+- Merge Pekka Savola's patch (RFE#47762)
+
+* Mon Jul  2 2001 Pekka Savola <pekkas@netcore.fi>
+- Add IPv6 patch from PLD (only redirection to /dev/{tcp,udp}/host/port
+  support)
+
+* Sun Jun 24 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-7
+- Add some bugfix patches from the maintainer
+
+* Mon Jun 11 2001 Florian La Roche <Florian.LaRoche@redhat.de>
+- added patch for s390x from <oliver.paukstadt@millenux.com>
+
+* Wed May 23 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-5
+- Don't set BASH_ENV in .bash_profile, it causes .bashrc to be sourced
+  twice in interactive non-login shells.
+- s/Copyright/License/
+
+* Sat May  5 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-4
+- Fix tempfile creation in bashbug
+
+* Wed May  2 2001 Preston Brown <pbrown@redhat.com> 2.05-3
+- bashrc moved to setup package
+
+* Tue Apr 24 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-2
+- bash comes with its own copy of readline... Add the patches we're
+  applying in the readline package.
+
+* Tue Apr 24 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.05-1
+- Update to 2.05
+- Change PROMPT_COMMAND in bashrc for xterms
+  to something less space consuming (#24159)
+- Provide plugs for alternate prompt commands (#30634), but don't
+  default to them
+
+* Mon Mar 19 2001 Preston Brown <pbrown@redhat.com>
+- add default aliases for 'dir' and 'df' to have human readable output
+
+* Wed Feb 28 2001 Matt Wilson <msw@redhat.com>
+- don't Prereq: /sbin/install-info!
+
+* Tue Feb 27 2001 Preston Brown <pbrown@redhat.com>
+- noreplace config files
+- don't own /etc/skel directory
+
+* Thu Feb 22 2001 Harald Hoyer <harald@redhat.de>
+- changed /etc/bashrc to work with backspace = 0177 (rxvt)
+
+* Wed Feb 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
+- changed /etc/skel/.bash_profile to "unset USERNAME"
+
+* Mon Feb  5 2001 Yukihiro Nakai <ynakai@redhat.com>
+- Delete Japanese resources from dot-bashrc
+  and move them to each package.
+
+* Fri Dec 15 2000 Yukihiro Nakai <ynakai@redhat.com>
+- Add Japanese resource to dot-bashrc
+
+* Mon Dec 11 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- rebuild to get rid of 0777 doc dirs
+
+* Thu Nov 16 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- restore the ^Hs in documentation, they're highlighting sequences
+  for less (#20654) 
+
+* Fri Sep 15 2000 Florian La Roche <Florian.LaRoche@redhat.de>
+- bash-2.04-export.patch is reported to fix compilation
+  of older glibc-2.1 sources
+
+* Tue Aug 22 2000 Matt Wilson <msw@redhat.com>
+- fixed the summary of bash-doc to use %%{version} instead of "2.03"
+
+* Tue Aug  8 2000 Bill Nottingham <notting@redhat.com>
+- 'exit' in bashrc is very bad.
+
+* Tue Aug  8 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- minor bashrc fix (Bug #8518)
+
+* Mon Jul 17 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- Don't use tput etc. in bashrc if /usr isn't available (Bug #14116)
+
+* Wed Jul 12 2000 Prospector <bugzilla@redhat.com>
+- automatic rebuild
+
+* Thu Jun 22 2000 Bill Nottingham <notting@redhat.com>
+- fix for some IA-64 issues from Stephane Eranian
+
+* Thu Jun 15 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- Fix summary and description, they had old version numbers (Bug #12092)
+
+* Tue Jun  6 2000 Bill Nottingham <notting@redhat.com>
+- add /etc/skel/.bash* ; obsolete etcskel
+
+* Tue May  2 2000 Bill Nottingham <notting@redhat.com>
+- fix for shell functions on 64-bit architectures...
+
+* Wed Mar 29 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- Add some backwards compatibility (for i in ; do something; done)
+
+* Tue Mar 21 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- 2.04 final
+- remove the echo, pwd, test and kill man pages from the package,
+  we're getting them from sh-utils
+
+* Sun Mar 19 2000 Bernhard Rosenkraenzer <bero@redhat.com>
+- 2.04beta5
+- adapt patches
+- Fix up bashrc
+- Don't put in bashrc1, this should be done by the bash1 package
+- use install -c instead of plain install to work on *BSD
+- remove the collected patches - they're now in the base version.
+- make compressed man pages optional
+
+* Thu Mar 16 2000 Florian La Roche <Florian.LaRoche@redhat.com>
+- add some collected patches for bash2
+- change it over to be the main bash package
+- install man-pages root:root
+- obsolete bash2, bash2-doc
+
+* Wed Feb 02 2000 Cristian Gafton <gafton@redhat.com>
+- man pages are compressed
+- fix description
+
+* Thu Dec  2 1999 Ken Estes <kestes@staff.mail.com>
+- updated patch to detect what executables are required by a script.
+
+* Tue Sep 14 1999 Dale Lovelace <dale@redhat.com>
+- Remove annoying ^H's from documentation
+
+* Fri Jul 16 1999 Ken Estes <kestes@staff.mail.com>
+- patch to detect what executables are required by a script.
+
+* Sun Mar 21 1999 Cristian Gafton <gafton@redhat.com> 
+- auto rebuild in the new build environment (release 4)
+
+* Fri Mar 19 1999 Jeff Johnson <jbj@redhat.com>
+- strip binaries.
+- include bash-doc correctly.
+
+* Thu Mar 18 1999 Preston Brown <pbrown@redhat.com>
+- fixed post/postun /etc/shells work.
+
+* Thu Mar 18 1999 Cristian Gafton <gafton@redhat.com>
+- updated again text in the spec file
+
+* Mon Feb 22 1999 Jeff Johnson <jbj@redhat.com>
+- updated text in spec file.
+- update to 2.03.
+
+* Fri Feb 12 1999 Cristian Gafton <gafton@redhat.com>
+- build it as bash2 instead of bash
+
+* Tue Feb  9 1999 Bill Nottingham <notting@redhat.com>
+- set 'NON_INTERACTIVE_LOGIN_SHELLS' so profile gets read
+
+* Thu Jan 14 1999 Jeff Johnson <jbj@redhat.com>
+- rename man pages in bash-doc to avoid packaging conflicts (#606).
+
+* Wed Dec 02 1998 Cristian Gafton <gafton@redhat.com>
+- patch for the arm
+- use $RPM_ARCH-redhat-linux as the build target
+
+* Tue Oct  6 1998 Bill Nottingham <notting@redhat.com>
+- rewrite %%pre, axe %%postun (to avoid prereq loops)
+
+* Wed Aug 19 1998 Jeff Johnson <jbj@redhat.com>
+- resurrect for RH 6.0.
+
+* Sun Jul 26 1998 Jeff Johnson <jbj@redhat.com>
+- update to 2.02.1
+
+* Thu Jun 11 1998 Jeff Johnson <jbj@redhat.com>
+- Package for 5.2.
+
+* Mon Apr 20 1998 Ian Macdonald <ianmacd@xs4all.nl>
+- added POSIX.NOTES doc file
+- some extraneous doc files removed
+- minor .spec file changes
+
+* Sun Apr 19 1998 Ian Macdonald <ianmacd@xs4all.nl>
+- upgraded to version 2.02
+- Alpha, MIPS & Sparc patches removed due to lack of test platforms
+- glibc & signal patches no longer required
+- added documentation subpackage (doc)
+
+* Fri Nov 07 1997 Donnie Barnes <djb@redhat.com>
+- added signal handling patch from Dean Gaudet <dgaudet@arctic.org> that
+  is based on a change made in bash 2.0.  Should fix some early exit
+  problems with suspends and fg.
+
+* Mon Oct 20 1997 Donnie Barnes <djb@redhat.com>
+- added %%clean
+
+* Mon Oct 20 1997 Erik Troan <ewt@redhat.com>
+- added comment explaining why install-info isn't used
+- added mips patch 
+
+* Fri Oct 17 1997 Donnie Barnes <djb@redhat.com>
+- added BuildRoot
+
+* Tue Jun 03 1997 Erik Troan <ewt@redhat.com>
+- built against glibc
diff --git a/dot-bash_logout b/dot-bash_logout
new file mode 100644
index 0000000..af7c6fd
--- /dev/null
+++ b/dot-bash_logout
@@ -0,0 +1,2 @@
+# ~/.bash_logout
+
diff --git a/dot-bash_profile b/dot-bash_profile
new file mode 100644
index 0000000..55136b9
--- /dev/null
+++ b/dot-bash_profile
@@ -0,0 +1,8 @@
+# .bash_profile
+
+# Get the aliases and functions
+if [ -f ~/.bashrc ]; then
+	. ~/.bashrc
+fi
+
+# User specific environment and startup programs
diff --git a/dot-bashrc b/dot-bashrc
new file mode 100644
index 0000000..d81e0b5
--- /dev/null
+++ b/dot-bashrc
@@ -0,0 +1,18 @@
+# .bashrc
+
+# Source global definitions
+if [ -f /etc/bashrc ]; then
+	. /etc/bashrc
+fi
+
+# User specific environment
+if ! [[ "$PATH" =~ "$HOME/.local/bin:$HOME/bin:" ]]
+then
+    PATH="$HOME/.local/bin:$HOME/bin:$PATH"
+fi
+export PATH
+
+# Uncomment the following line if you don't like systemctl's auto-paging feature:
+# export SYSTEMD_PAGER=
+
+# User specific aliases and functions
diff --git a/sources b/sources
new file mode 100644
index 0000000..dff100d
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+SHA512 (bash-5.0.tar.gz) = bb4519f06e278f271d08722b531e49d2e842cc3e0b02a6b3eee422e2efcb5b6226111af43f5e5eae56beb85ac8bfebcd6a4aacbabb8f609e529aa4d571890864
diff --git a/tests/tests.yml b/tests/tests.yml
new file mode 100644
index 0000000..2eaaa7a
--- /dev/null
+++ b/tests/tests.yml
@@ -0,0 +1,29 @@
+---
+
+# Tests that run in classic context
+- hosts: localhost
+  roles:
+  - role: standard-test-beakerlib
+    tags:
+    - classic
+    repositories:
+    - repo: "https://src.fedoraproject.org/tests/shell.git"
+      dest: "shell"
+      fmf_filter: "tier: 1, 2 & tags: classic"
+    required_packages:
+    - expect            # login requires expect
+    - which             # smoke requires which
+
+# Tests that run in container and atomic contexts
+- hosts: localhost
+  roles:
+  - role: standard-test-beakerlib
+    tags:
+    - container
+    - atomic
+    repositories:
+    - repo: "https://src.fedoraproject.org/tests/shell.git"
+      dest: "shell"
+      fmf_filter: "tier: 1, 2 & tags: container, atomic"
+    required_packages:
+    - which             # smoke requires which