diff --git a/15211-partial-changeset.patch b/15211-partial-changeset.patch new file mode 100644 index 0000000..b1ff5ce --- /dev/null +++ b/15211-partial-changeset.patch @@ -0,0 +1,13 @@ +Index: xen-3.1-testing/tools/console/daemon/utils.c +=================================================================== +--- xen-3.1-testing.orig/tools/console/daemon/utils.c ++++ xen-3.1-testing/tools/console/daemon/utils.c +@@ -86,7 +86,7 @@ void daemonize(const char *pidfile) + if (chdir("/") < 0) + exit (1); + +- fd = open(pidfile, O_RDWR | O_CREAT); ++ fd = open(pidfile, O_RDWR | O_CREAT, S_IRUSR|S_IWUSR); + if (fd == -1) { + exit(1); + } diff --git a/xen.changes b/xen.changes index aa7324b..3ecaa92 100644 --- a/xen.changes +++ b/xen.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Thu Nov 29 13:44:29 MST 2007 - carnold@novell.com + +- Added part of upstream c/s 15211. Fixed open call with O_CREAT + because it had no mode flags. + ------------------------------------------------------------------- Mon Nov 5 09:38:14 MST 2007 - jfehlig@novell.com diff --git a/xen.spec b/xen.spec index 438b019..1eac7d0 100644 --- a/xen.spec +++ b/xen.spec @@ -34,7 +34,7 @@ BuildRequires: glibc-32bit glibc-devel-32bit BuildRequires: kernel-source kernel-syms module-init-tools xorg-x11 %endif Version: 3.1.0_15042 -Release: 69 +Release: 73 License: GPL v2 only Group: System/Kernel AutoReqProv: on @@ -72,48 +72,49 @@ Patch11: 15183-32on64-multicall.patch Patch12: 15185-vtpr.patch Patch13: 15189-pmtimer.patch Patch14: 15190-clocksource-opt.patch -Patch15: 15217-hvm-save-restore.patch -Patch16: 15228-hvm-usb-windows-crash.patch -Patch17: 15230-hvm-usb-windows-crash.patch -Patch18: 15234-hvm-usb-windows-crash.patch -Patch19: 15250_xend_device_destroy.patch -Patch20: 15257-hvm-save-restore.patch -Patch21: 15273_libxenapi.patch -Patch22: 15274_xenapi.patch -Patch23: 15275_xenapi.patch -Patch24: 15277-hvm-intel2amd-windows-migrate.patch -Patch25: 15381-log-svm-npt.patch -Patch26: 15383-hvm-usb-windows-crash.patch -Patch27: 15389-32on64-memop-error-path.patch -Patch28: 15390-32on64-setup-error-path.patch -Patch29: 15391-32on64-setup-pgtable.patch -Patch30: 15410-domain-restore.patch -Patch31: 15416-x86_64-failsafe.patch -Patch32: 15418-hvm-usb-windows-crash.patch -Patch33: 15433-pae-ptwr-check.patch -Patch34: 15444-vmxassist-p2r.patch -Patch35: 15469-hvm-save-restore.patch -Patch36: 15477_dev_attach.patch -Patch37: 15480-man-xm.patch -Patch38: 15528-hvm-sles9-install.patch -Patch39: 15587-domid-reset.patch -Patch40: 15595-rtl8139-data-corruption.patch -Patch41: 15596-rtl8139-crc-fix.patch -Patch42: 15609-save-mem-values.patch -Patch43: 15642_uuid_unique.patch -Patch44: 15645-hvm-save-restore.patch -Patch45: 15649_xenapi.patch -Patch46: 15650_xenapi.patch -Patch47: 15651_xenapi.patch -Patch48: 15689_dev_destroy_cleanup.patch -Patch49: 15691-hvm-save-restore.patch -Patch50: 15693-32on64-gnttab-err.patch -Patch51: 15716_dev_detach.patch -Patch52: fix_15716.patch -Patch53: hvm_vnc.diff -Patch54: xend_mem_leak.diff -Patch55: 16157-xenmon-security.patch -Patch56: 15434-irq-permissions.patch +Patch15: 15211-partial-changeset.patch +Patch16: 15217-hvm-save-restore.patch +Patch17: 15228-hvm-usb-windows-crash.patch +Patch18: 15230-hvm-usb-windows-crash.patch +Patch19: 15234-hvm-usb-windows-crash.patch +Patch20: 15250_xend_device_destroy.patch +Patch21: 15257-hvm-save-restore.patch +Patch22: 15273_libxenapi.patch +Patch23: 15274_xenapi.patch +Patch24: 15275_xenapi.patch +Patch25: 15277-hvm-intel2amd-windows-migrate.patch +Patch26: 15381-log-svm-npt.patch +Patch27: 15383-hvm-usb-windows-crash.patch +Patch28: 15389-32on64-memop-error-path.patch +Patch29: 15390-32on64-setup-error-path.patch +Patch30: 15391-32on64-setup-pgtable.patch +Patch31: 15410-domain-restore.patch +Patch32: 15416-x86_64-failsafe.patch +Patch33: 15418-hvm-usb-windows-crash.patch +Patch34: 15433-pae-ptwr-check.patch +Patch35: 15444-vmxassist-p2r.patch +Patch36: 15469-hvm-save-restore.patch +Patch37: 15477_dev_attach.patch +Patch38: 15480-man-xm.patch +Patch39: 15528-hvm-sles9-install.patch +Patch40: 15587-domid-reset.patch +Patch41: 15595-rtl8139-data-corruption.patch +Patch42: 15596-rtl8139-crc-fix.patch +Patch43: 15609-save-mem-values.patch +Patch44: 15642_uuid_unique.patch +Patch45: 15645-hvm-save-restore.patch +Patch46: 15649_xenapi.patch +Patch47: 15650_xenapi.patch +Patch48: 15651_xenapi.patch +Patch49: 15689_dev_destroy_cleanup.patch +Patch50: 15691-hvm-save-restore.patch +Patch51: 15693-32on64-gnttab-err.patch +Patch52: 15716_dev_detach.patch +Patch53: fix_15716.patch +Patch54: hvm_vnc.diff +Patch55: xend_mem_leak.diff +Patch56: 16157-xenmon-security.patch +Patch57: 15434-irq-permissions.patch # Our patches Patch100: xen-config.diff Patch101: xend-config.diff @@ -482,6 +483,7 @@ Authors: Ian Pratt %if %{?with_kmp}0 + %package KMP Group: System/Kernel Summary: Xen para-virtual device drivers for fully virtualized guests @@ -528,6 +530,7 @@ Xen, but is not available for release due to license restrictions. %endif + %package doc-html Summary: Xen Virtualization: HTML documentation Group: Documentation/HTML @@ -624,6 +627,7 @@ Authors: %patch54 -p1 %patch55 -p1 %patch56 -p1 +%patch57 -p1 %patch100 -p1 %patch101 -p1 %patch102 -p1 @@ -1013,7 +1017,11 @@ rm -f $RPM_BUILD_ROOT/%pysite/*.egg-info %postun libs /sbin/ldconfig + %changelog +* Thu Nov 29 2007 - carnold@novell.com +- Added part of upstream c/s 15211. Fixed open call with O_CREAT + because it had no mode flags. * Mon Nov 05 2007 - jfehlig@novell.com - Added upstream c/s 15434 to allow access to serial devices. Bug #338486.