OBS User unknown 2007-11-29 21:05:25 +00:00 committed by Git OBS Bridge
parent 61e5c542fb
commit be29349429
3 changed files with 70 additions and 43 deletions

View File

@ -0,0 +1,13 @@
Index: xen-3.1-testing/tools/console/daemon/utils.c
===================================================================
--- xen-3.1-testing.orig/tools/console/daemon/utils.c
+++ xen-3.1-testing/tools/console/daemon/utils.c
@@ -86,7 +86,7 @@ void daemonize(const char *pidfile)
if (chdir("/") < 0)
exit (1);
- fd = open(pidfile, O_RDWR | O_CREAT);
+ fd = open(pidfile, O_RDWR | O_CREAT, S_IRUSR|S_IWUSR);
if (fd == -1) {
exit(1);
}

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Thu Nov 29 13:44:29 MST 2007 - carnold@novell.com
- Added part of upstream c/s 15211. Fixed open call with O_CREAT
because it had no mode flags.
-------------------------------------------------------------------
Mon Nov 5 09:38:14 MST 2007 - jfehlig@novell.com

View File

@ -34,7 +34,7 @@ BuildRequires: glibc-32bit glibc-devel-32bit
BuildRequires: kernel-source kernel-syms module-init-tools xorg-x11
%endif
Version: 3.1.0_15042
Release: 69
Release: 73
License: GPL v2 only
Group: System/Kernel
AutoReqProv: on
@ -72,48 +72,49 @@ Patch11: 15183-32on64-multicall.patch
Patch12: 15185-vtpr.patch
Patch13: 15189-pmtimer.patch
Patch14: 15190-clocksource-opt.patch
Patch15: 15217-hvm-save-restore.patch
Patch16: 15228-hvm-usb-windows-crash.patch
Patch17: 15230-hvm-usb-windows-crash.patch
Patch18: 15234-hvm-usb-windows-crash.patch
Patch19: 15250_xend_device_destroy.patch
Patch20: 15257-hvm-save-restore.patch
Patch21: 15273_libxenapi.patch
Patch22: 15274_xenapi.patch
Patch23: 15275_xenapi.patch
Patch24: 15277-hvm-intel2amd-windows-migrate.patch
Patch25: 15381-log-svm-npt.patch
Patch26: 15383-hvm-usb-windows-crash.patch
Patch27: 15389-32on64-memop-error-path.patch
Patch28: 15390-32on64-setup-error-path.patch
Patch29: 15391-32on64-setup-pgtable.patch
Patch30: 15410-domain-restore.patch
Patch31: 15416-x86_64-failsafe.patch
Patch32: 15418-hvm-usb-windows-crash.patch
Patch33: 15433-pae-ptwr-check.patch
Patch34: 15444-vmxassist-p2r.patch
Patch35: 15469-hvm-save-restore.patch
Patch36: 15477_dev_attach.patch
Patch37: 15480-man-xm.patch
Patch38: 15528-hvm-sles9-install.patch
Patch39: 15587-domid-reset.patch
Patch40: 15595-rtl8139-data-corruption.patch
Patch41: 15596-rtl8139-crc-fix.patch
Patch42: 15609-save-mem-values.patch
Patch43: 15642_uuid_unique.patch
Patch44: 15645-hvm-save-restore.patch
Patch45: 15649_xenapi.patch
Patch46: 15650_xenapi.patch
Patch47: 15651_xenapi.patch
Patch48: 15689_dev_destroy_cleanup.patch
Patch49: 15691-hvm-save-restore.patch
Patch50: 15693-32on64-gnttab-err.patch
Patch51: 15716_dev_detach.patch
Patch52: fix_15716.patch
Patch53: hvm_vnc.diff
Patch54: xend_mem_leak.diff
Patch55: 16157-xenmon-security.patch
Patch56: 15434-irq-permissions.patch
Patch15: 15211-partial-changeset.patch
Patch16: 15217-hvm-save-restore.patch
Patch17: 15228-hvm-usb-windows-crash.patch
Patch18: 15230-hvm-usb-windows-crash.patch
Patch19: 15234-hvm-usb-windows-crash.patch
Patch20: 15250_xend_device_destroy.patch
Patch21: 15257-hvm-save-restore.patch
Patch22: 15273_libxenapi.patch
Patch23: 15274_xenapi.patch
Patch24: 15275_xenapi.patch
Patch25: 15277-hvm-intel2amd-windows-migrate.patch
Patch26: 15381-log-svm-npt.patch
Patch27: 15383-hvm-usb-windows-crash.patch
Patch28: 15389-32on64-memop-error-path.patch
Patch29: 15390-32on64-setup-error-path.patch
Patch30: 15391-32on64-setup-pgtable.patch
Patch31: 15410-domain-restore.patch
Patch32: 15416-x86_64-failsafe.patch
Patch33: 15418-hvm-usb-windows-crash.patch
Patch34: 15433-pae-ptwr-check.patch
Patch35: 15444-vmxassist-p2r.patch
Patch36: 15469-hvm-save-restore.patch
Patch37: 15477_dev_attach.patch
Patch38: 15480-man-xm.patch
Patch39: 15528-hvm-sles9-install.patch
Patch40: 15587-domid-reset.patch
Patch41: 15595-rtl8139-data-corruption.patch
Patch42: 15596-rtl8139-crc-fix.patch
Patch43: 15609-save-mem-values.patch
Patch44: 15642_uuid_unique.patch
Patch45: 15645-hvm-save-restore.patch
Patch46: 15649_xenapi.patch
Patch47: 15650_xenapi.patch
Patch48: 15651_xenapi.patch
Patch49: 15689_dev_destroy_cleanup.patch
Patch50: 15691-hvm-save-restore.patch
Patch51: 15693-32on64-gnttab-err.patch
Patch52: 15716_dev_detach.patch
Patch53: fix_15716.patch
Patch54: hvm_vnc.diff
Patch55: xend_mem_leak.diff
Patch56: 16157-xenmon-security.patch
Patch57: 15434-irq-permissions.patch
# Our patches
Patch100: xen-config.diff
Patch101: xend-config.diff
@ -482,6 +483,7 @@ Authors:
Ian Pratt <ian.pratt@cl.cam.ac.uk>
%if %{?with_kmp}0
%package KMP
Group: System/Kernel
Summary: Xen para-virtual device drivers for fully virtualized guests
@ -528,6 +530,7 @@ Xen, but is not available for release due to license restrictions.
%endif
%package doc-html
Summary: Xen Virtualization: HTML documentation
Group: Documentation/HTML
@ -624,6 +627,7 @@ Authors:
%patch54 -p1
%patch55 -p1
%patch56 -p1
%patch57 -p1
%patch100 -p1
%patch101 -p1
%patch102 -p1
@ -1013,7 +1017,11 @@ rm -f $RPM_BUILD_ROOT/%pysite/*.egg-info
%postun libs
/sbin/ldconfig
%changelog
* Thu Nov 29 2007 - carnold@novell.com
- Added part of upstream c/s 15211. Fixed open call with O_CREAT
because it had no mode flags.
* Mon Nov 05 2007 - jfehlig@novell.com
- Added upstream c/s 15434 to allow access to serial devices.
Bug #338486.