Hello community,

here is the log from the commit of package libvirt for openSUSE:Factory checked 
in at 2013-06-05 13:29:28
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/libvirt (Old)
 and      /work/SRC/openSUSE:Factory/.libvirt.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "libvirt"

Changes:
--------
--- /work/SRC/openSUSE:Factory/libvirt/libvirt.changes  2013-05-27 
09:52:26.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.libvirt.new/libvirt.changes     2013-06-05 
13:29:30.000000000 +0200
@@ -1,0 +2,29 @@
+Tue May 21 08:32:02 MDT 2013 - [email protected]
+
+- Update to libvirt 1.0.5.1 stable release
+  - qemu: Fix cgroup handling when setting VCPU BW
+  - daemon: fix leak after listing all volumes
+  - Fix iohelper usage with streams opened for read
+  - util: fix virFileOpenAs return value and resulting error logs
+  - iscsi: don't leak portal string when starting a pool
+  - don't mention disk controllers in generic controller errors
+  - conf: don't crash on a tpm device with no backends
+  - qemu: allocate network connections sooner during domain startup
+  -  Make detect_scsi_host_caps a function on all architectures
+  - Fix release of resources with lockd plugin
+  - Fix potential use of undefined variable in remote dispatch code
+  - Fix F_DUPFD_CLOEXEC operation args
+  - qemu: fix stupid typos in VFIO cgroup setup/teardown
+  - network: fix network driver startup for qemu:///session
+- Remove patches that are included in the 1.0.5.1 release
+  0471637d-cgroups-vcpu-bw.patch, a2214c52-iohelper.patch,
+  ca697e90-CVE-2013-1962.patch
+
+-------------------------------------------------------------------
+Mon May 20 14:41:16 MDT 2013 - [email protected]
+
+- Don't mount selinux fs in LXC if selinux is disabled
+  95c6cc34-selinux.patch
+  bnc#814680
+
+-------------------------------------------------------------------

Old:
----
  0471637d-cgroups-vcpu-bw.patch
  a2214c52-iohelper.patch
  ca697e90-CVE-2013-1962.patch
  libvirt-1.0.5.tar.bz2

New:
----
  95c6cc34-selinux.patch
  libvirt-1.0.5.1.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ libvirt.spec ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -343,7 +343,7 @@
 
 Name:           libvirt
 Url:            http://libvirt.org/
-Version:        1.0.5
+Version:        1.0.5.1
 Release:        0
 Summary:        A C toolkit to interact with the virtualization capabilities 
of Linux
 License:        LGPL-2.1+
@@ -427,10 +427,8 @@
 Patch1:         486a86eb-cgroups-docs.patch
 Patch2:         0ced83dc-cgroup-escape-dot.patch
 Patch3:         bbe97ae9-no-cgroups.patch
-Patch4:         0471637d-cgroups-vcpu-bw.patch
-Patch5:         c2cf5f1c-no-cgroups-fix.patch
-Patch6:         a2214c52-iohelper.patch
-Patch7:         ca697e90-CVE-2013-1962.patch
+Patch4:         c2cf5f1c-no-cgroups-fix.patch
+Patch5:         95c6cc34-selinux.patch
 # Need to go upstream
 Patch100:       xen-name-for-devid.patch
 Patch101:       clone.patch
@@ -577,8 +575,6 @@
 %patch3 -p1
 %patch4 -p1
 %patch5 -p1
-%patch6 -p1
-%patch7 -p1
 %patch100 -p1
 %patch101
 %patch102 -p1

++++++ 0ced83dc-cgroup-escape-dot.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -8,10 +8,10 @@
     
     Signed-off-by: Daniel P. Berrange <[email protected]>
 
-Index: libvirt-1.0.5/src/util/vircgroup.c
+Index: libvirt-1.0.5.1/src/util/vircgroup.c
 ===================================================================
---- libvirt-1.0.5.orig/src/util/vircgroup.c
-+++ libvirt-1.0.5/src/util/vircgroup.c
+--- libvirt-1.0.5.1.orig/src/util/vircgroup.c
++++ libvirt-1.0.5.1/src/util/vircgroup.c
 @@ -1106,7 +1106,8 @@ static int virCgroupPartitionNeedsEscapi
      if (STRPREFIX(path, "cgroup."))
          return 1;

++++++ 486a86eb-cgroups-docs.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -10,10 +10,10 @@
     
     Signed-off-by: Daniel P. Berrange <[email protected]>
 
-Index: libvirt-1.0.5/docs/cgroups.html.in
+Index: libvirt-1.0.5.1/docs/cgroups.html.in
 ===================================================================
 --- /dev/null
-+++ libvirt-1.0.5/docs/cgroups.html.in
++++ libvirt-1.0.5.1/docs/cgroups.html.in
 @@ -0,0 +1,285 @@
 +<?xml version="1.0" encoding="UTF-8"?>
 +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
@@ -300,10 +300,10 @@
 +    </p>
 +  </body>
 +</html>
-Index: libvirt-1.0.5/docs/sitemap.html.in
+Index: libvirt-1.0.5.1/docs/sitemap.html.in
 ===================================================================
---- libvirt-1.0.5.orig/docs/sitemap.html.in
-+++ libvirt-1.0.5/docs/sitemap.html.in
+--- libvirt-1.0.5.1.orig/docs/sitemap.html.in
++++ libvirt-1.0.5.1/docs/sitemap.html.in
 @@ -87,6 +87,10 @@
                  <span>Ensuring exclusive guest access to disks</span>
                </li>

++++++ 95c6cc34-selinux.patch ++++++
commit 95c6cc344bec8405636d2a59fc0c34e0581001ab
Author: Daniel P. Berrange <[email protected]>
Date:   Wed May 15 16:26:59 2013 +0100

    Don't mount selinux fs in LXC if selinux is disabled
    
    Before trying to mount the selinux filesystem in a container
    use is_selinux_enabled() to check if the machine actually
    has selinux support (eg not booted with selinux=0)
    
    Signed-off-by: Daniel P. Berrange <[email protected]>

Index: libvirt-1.0.5.1/src/lxc/lxc_container.c
===================================================================
--- libvirt-1.0.5.1.orig/src/lxc/lxc_container.c
+++ libvirt-1.0.5.1/src/lxc/lxc_container.c
@@ -701,6 +701,12 @@ static int lxcContainerMountBasicFS(bool
             (access(srcpath, R_OK) < 0))
             continue;
 
+#if WITH_SELINUX
+        if (STREQ(mnts[i].src, SELINUX_MOUNT) &&
+            !is_selinux_enabled())
+            continue;
+#endif
+
         if (virFileMakePath(mnts[i].dst) < 0) {
             virReportSystemError(errno,
                                  _("Failed to mkdir %s"),
++++++ bbe97ae9-no-cgroups.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -21,10 +21,10 @@
     its callees.  Also check for ENOENT in qemuInitCgroup() when determining
     if cgroups support is available.
 
-Index: libvirt-1.0.5/src/qemu/qemu_cgroup.c
+Index: libvirt-1.0.5.1/src/qemu/qemu_cgroup.c
 ===================================================================
---- libvirt-1.0.5.orig/src/qemu/qemu_cgroup.c
-+++ libvirt-1.0.5/src/qemu/qemu_cgroup.c
+--- libvirt-1.0.5.1.orig/src/qemu/qemu_cgroup.c
++++ libvirt-1.0.5.1/src/qemu/qemu_cgroup.c
 @@ -415,7 +415,8 @@ int qemuInitCgroup(virQEMUDriverPtr driv
          if (rc != 0) {
              if (rc == -ENXIO ||
@@ -35,10 +35,10 @@
                  VIR_DEBUG("No cgroups present/configured/accessible, ignoring 
error");
                  goto done;
              }
-Index: libvirt-1.0.5/src/util/vircgroup.c
+Index: libvirt-1.0.5.1/src/util/vircgroup.c
 ===================================================================
---- libvirt-1.0.5.orig/src/util/vircgroup.c
-+++ libvirt-1.0.5/src/util/vircgroup.c
+--- libvirt-1.0.5.1.orig/src/util/vircgroup.c
++++ libvirt-1.0.5.1/src/util/vircgroup.c
 @@ -1168,14 +1168,14 @@ static int virCgroupPartitionEscape(char
      return 0;
  }

++++++ c2cf5f1c-no-cgroups-fix.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -14,10 +14,10 @@
     
     Signed-off-by: Daniel P. Berrange <[email protected]>
 
-Index: libvirt-1.0.5/src/qemu/qemu_cgroup.c
+Index: libvirt-1.0.5.1/src/qemu/qemu_cgroup.c
 ===================================================================
---- libvirt-1.0.5.orig/src/qemu/qemu_cgroup.c
-+++ libvirt-1.0.5/src/qemu/qemu_cgroup.c
+--- libvirt-1.0.5.1.orig/src/qemu/qemu_cgroup.c
++++ libvirt-1.0.5.1/src/qemu/qemu_cgroup.c
 @@ -415,8 +415,7 @@ int qemuInitCgroup(virQEMUDriverPtr driv
          if (rc != 0) {
              if (rc == -ENXIO ||
@@ -28,10 +28,10 @@
                  VIR_DEBUG("No cgroups present/configured/accessible, ignoring 
error");
                  goto done;
              }
-Index: libvirt-1.0.5/src/util/vircgroup.c
+Index: libvirt-1.0.5.1/src/util/vircgroup.c
 ===================================================================
---- libvirt-1.0.5.orig/src/util/vircgroup.c
-+++ libvirt-1.0.5/src/util/vircgroup.c
+--- libvirt-1.0.5.1.orig/src/util/vircgroup.c
++++ libvirt-1.0.5.1/src/util/vircgroup.c
 @@ -1110,8 +1110,13 @@ static int virCgroupPartitionNeedsEscapi
          path[0] == '.')
          return 1;

++++++ clone.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -34,7 +34,7 @@
      VIR_FREE(stack);
      if (cpid < 0) {
          virReportSystemError(errno, "%s",
-@@ -2116,6 +2124,9 @@ int lxcContainerStart(virDomainDefPtr de
+@@ -2122,6 +2130,9 @@ int lxcContainerStart(virDomainDefPtr de
                                ttyPaths, nttyPaths, handshakefd};
  
      /* allocate a stack for the container */
@@ -44,7 +44,7 @@
      if (VIR_ALLOC_N(stack, stacksize) < 0) {
          virReportOOMError();
          return -1;
-@@ -2134,7 +2145,11 @@ int lxcContainerStart(virDomainDefPtr de
+@@ -2140,7 +2151,11 @@ int lxcContainerStart(virDomainDefPtr de
          cflags |= CLONE_NEWNET;
      }
  
@@ -56,7 +56,7 @@
      VIR_FREE(stack);
      VIR_DEBUG("clone() completed, new container PID is %d", pid);
  
-@@ -2160,6 +2175,7 @@ int lxcContainerAvailable(int features)
+@@ -2166,6 +2181,7 @@ int lxcContainerAvailable(int features)
      int cpid;
      char *childStack;
      char *stack;
@@ -64,7 +64,7 @@
  
      if (features & LXC_CONTAINER_FEATURE_USER)
          flags |= CLONE_NEWUSER;
-@@ -2167,14 +2183,21 @@ int lxcContainerAvailable(int features)
+@@ -2173,14 +2189,21 @@ int lxcContainerAvailable(int features)
      if (features & LXC_CONTAINER_FEATURE_NET)
          flags |= CLONE_NEWNET;
  

++++++ f493d83f-cgroup-swap-control.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -12,11 +12,11 @@
     
     Signed-off-by: Daniel P. Berrange <[email protected]>
 
-Index: libvirt-1.0.5/src/qemu/qemu_driver.c
+Index: libvirt-1.0.5.1/src/qemu/qemu_driver.c
 ===================================================================
---- libvirt-1.0.5.orig/src/qemu/qemu_driver.c
-+++ libvirt-1.0.5/src/qemu/qemu_driver.c
-@@ -7351,9 +7351,12 @@ qemuDomainGetMemoryParameters(virDomainP
+--- libvirt-1.0.5.1.orig/src/qemu/qemu_driver.c
++++ libvirt-1.0.5.1/src/qemu/qemu_driver.c
+@@ -7352,9 +7352,12 @@ qemuDomainGetMemoryParameters(virDomainP
          case 2: /* fill swap hard limit here */
              rc = virCgroupGetMemSwapHardLimit(priv->cgroup, &val);
              if (rc != 0) {

++++++ fix-pci-attach-xen-driver.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -8,10 +8,10 @@
 This patch changes the xend driver to always call 'device_configure' for
 PCI devices to be consistent with the usage in the xen tools.
 
-Index: libvirt-1.0.5/src/xen/xend_internal.c
+Index: libvirt-1.0.5.1/src/xen/xend_internal.c
 ===================================================================
---- libvirt-1.0.5.orig/src/xen/xend_internal.c
-+++ libvirt-1.0.5/src/xen/xend_internal.c
+--- libvirt-1.0.5.1.orig/src/xen/xend_internal.c
++++ libvirt-1.0.5.1/src/xen/xend_internal.c
 @@ -2473,6 +2473,7 @@ xenDaemonAttachDeviceFlags(virDomainPtr
      virBuffer buf = VIR_BUFFER_INITIALIZER;
      char class[8], ref[80];

++++++ install-apparmor-profiles.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,7 +1,7 @@
-Index: libvirt-1.0.5/examples/apparmor/Makefile.am
+Index: libvirt-1.0.5.1/examples/apparmor/Makefile.am
 ===================================================================
---- libvirt-1.0.5.orig/examples/apparmor/Makefile.am
-+++ libvirt-1.0.5/examples/apparmor/Makefile.am
+--- libvirt-1.0.5.1.orig/examples/apparmor/Makefile.am
++++ libvirt-1.0.5.1/examples/apparmor/Makefile.am
 @@ -1,8 +1,45 @@
  ## Copyright (C) 2005-2011 Red Hat, Inc.
  ## See COPYING.LIB for the License of this software
@@ -53,10 +53,10 @@
 +      rm -f $(DESTDIR)$(sysconfdir)/apparmor.d/libvirt/TEMPLATE
 +
 +endif
-Index: libvirt-1.0.5/examples/apparmor/usr.lib.libvirt.virt-aa-helper.in
+Index: libvirt-1.0.5.1/examples/apparmor/usr.lib.libvirt.virt-aa-helper.in
 ===================================================================
 --- /dev/null
-+++ libvirt-1.0.5/examples/apparmor/usr.lib.libvirt.virt-aa-helper.in
++++ libvirt-1.0.5.1/examples/apparmor/usr.lib.libvirt.virt-aa-helper.in
 @@ -0,0 +1,40 @@
 +# Last Modified: Fri Aug 19 11:21:48 2011
 +#include <tunables/global>
@@ -98,9 +98,9 @@
 +  /var/lib/kvm/images/ r,
 +  /var/lib/kvm/images/** r,
 +}
-Index: libvirt-1.0.5/examples/apparmor/usr.lib.libvirt.virt-aa-helper
+Index: libvirt-1.0.5.1/examples/apparmor/usr.lib.libvirt.virt-aa-helper
 ===================================================================
---- libvirt-1.0.5.orig/examples/apparmor/usr.lib.libvirt.virt-aa-helper
+--- libvirt-1.0.5.1.orig/examples/apparmor/usr.lib.libvirt.virt-aa-helper
 +++ /dev/null
 @@ -1,38 +0,0 @@
 -# Last Modified: Mon Apr  5 15:10:27 2010
@@ -141,9 +141,9 @@
 -  /var/lib/libvirt/images/ r,
 -  /var/lib/libvirt/images/** r,
 -}
-Index: libvirt-1.0.5/examples/apparmor/usr.sbin.libvirtd
+Index: libvirt-1.0.5.1/examples/apparmor/usr.sbin.libvirtd
 ===================================================================
---- libvirt-1.0.5.orig/examples/apparmor/usr.sbin.libvirtd
+--- libvirt-1.0.5.1.orig/examples/apparmor/usr.sbin.libvirtd
 +++ /dev/null
 @@ -1,52 +0,0 @@
 -# Last Modified: Mon Apr  5 15:03:58 2010
@@ -198,10 +198,10 @@
 -  change_profile -> 
@{LIBVIRT}-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*,
 -
 -}
-Index: libvirt-1.0.5/examples/apparmor/usr.sbin.libvirtd.in
+Index: libvirt-1.0.5.1/examples/apparmor/usr.sbin.libvirtd.in
 ===================================================================
 --- /dev/null
-+++ libvirt-1.0.5/examples/apparmor/usr.sbin.libvirtd.in
++++ libvirt-1.0.5.1/examples/apparmor/usr.sbin.libvirtd.in
 @@ -0,0 +1,58 @@
 +# Last Modified: Fri Aug 19 11:20:36 2011
 +#include <tunables/global>
@@ -261,9 +261,9 @@
 +  change_profile -> 
@{LIBVIRT}-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*-[0-9a-f]*,
 +
 +}
-Index: libvirt-1.0.5/examples/apparmor/libvirt-qemu
+Index: libvirt-1.0.5.1/examples/apparmor/libvirt-qemu
 ===================================================================
---- libvirt-1.0.5.orig/examples/apparmor/libvirt-qemu
+--- libvirt-1.0.5.1.orig/examples/apparmor/libvirt-qemu
 +++ /dev/null
 @@ -1,129 +0,0 @@
 -# Last Modified: Fri Mar 9 14:43:22 2012
@@ -395,10 +395,10 @@
 -
 -   /usr/libexec/qemu-bridge-helper rmix,
 -  }
-Index: libvirt-1.0.5/examples/apparmor/libvirt-qemu.in
+Index: libvirt-1.0.5.1/examples/apparmor/libvirt-qemu.in
 ===================================================================
 --- /dev/null
-+++ libvirt-1.0.5/examples/apparmor/libvirt-qemu.in
++++ libvirt-1.0.5.1/examples/apparmor/libvirt-qemu.in
 @@ -0,0 +1,132 @@
 +# Last Modified: Fri Mar 9 14:43:22 2012
 +

++++++ libvirt-1.0.5.tar.bz2 -> libvirt-1.0.5.1.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/libvirt/libvirt-1.0.5.tar.bz2 
/work/SRC/openSUSE:Factory/.libvirt.new/libvirt-1.0.5.1.tar.bz2 differ: char 
11, line 1

++++++ libvirt-guests-init-script.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,9 +1,9 @@
 Adjust libvirt-guests init files to conform to SUSE standards
 
-Index: libvirt-1.0.5/tools/libvirt-guests.init.in
+Index: libvirt-1.0.5.1/tools/libvirt-guests.init.in
 ===================================================================
---- libvirt-1.0.5.orig/tools/libvirt-guests.init.in
-+++ libvirt-1.0.5/tools/libvirt-guests.init.in
+--- libvirt-1.0.5.1.orig/tools/libvirt-guests.init.in
++++ libvirt-1.0.5.1/tools/libvirt-guests.init.in
 @@ -3,15 +3,15 @@
  # the following is the LSB init header
  #
@@ -28,10 +28,10 @@
  ### END INIT INFO
  
  # the following is chkconfig init header
-Index: libvirt-1.0.5/tools/libvirt-guests.sh.in
+Index: libvirt-1.0.5.1/tools/libvirt-guests.sh.in
 ===================================================================
---- libvirt-1.0.5.orig/tools/libvirt-guests.sh.in
-+++ libvirt-1.0.5/tools/libvirt-guests.sh.in
+--- libvirt-1.0.5.1.orig/tools/libvirt-guests.sh.in
++++ libvirt-1.0.5.1/tools/libvirt-guests.sh.in
 @@ -1,13 +1,12 @@
  #!/bin/sh
  
@@ -188,10 +188,10 @@
  esac
 -exit $RETVAL
 +rc_exit
-Index: libvirt-1.0.5/tools/libvirt-guests.sysconf
+Index: libvirt-1.0.5.1/tools/libvirt-guests.sysconf
 ===================================================================
---- libvirt-1.0.5.orig/tools/libvirt-guests.sysconf
-+++ libvirt-1.0.5/tools/libvirt-guests.sysconf
+--- libvirt-1.0.5.1.orig/tools/libvirt-guests.sysconf
++++ libvirt-1.0.5.1/tools/libvirt-guests.sysconf
 @@ -1,19 +1,29 @@
 +## Path: System/Virtualization/libvirt-guests
 +

++++++ libvirt-suse-netcontrol.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,7 +1,7 @@
-Index: libvirt-1.0.5/configure.ac
+Index: libvirt-1.0.5.1/configure.ac
 ===================================================================
---- libvirt-1.0.5.orig/configure.ac
-+++ libvirt-1.0.5/configure.ac
+--- libvirt-1.0.5.1.orig/configure.ac
++++ libvirt-1.0.5.1/configure.ac
 @@ -159,6 +159,7 @@ LIBVIRT_CHECK_DBUS
  LIBVIRT_CHECK_FUSE
  LIBVIRT_CHECK_HAL
@@ -34,10 +34,10 @@
  LIBVIRT_RESULT_NUMACTL
  LIBVIRT_RESULT_OPENWSMAN
  LIBVIRT_RESULT_PCIACCESS
-Index: libvirt-1.0.5/src/Makefile.am
+Index: libvirt-1.0.5.1/src/Makefile.am
 ===================================================================
---- libvirt-1.0.5.orig/src/Makefile.am
-+++ libvirt-1.0.5/src/Makefile.am
+--- libvirt-1.0.5.1.orig/src/Makefile.am
++++ libvirt-1.0.5.1/src/Makefile.am
 @@ -715,6 +715,10 @@ if WITH_NETCF
  INTERFACE_DRIVER_SOURCES +=                                   \
                interface/interface_backend_netcf.c
@@ -66,10 +66,10 @@
  if WITH_DRIVER_MODULES
  libvirt_driver_interface_la_LIBADD += ../gnulib/lib/libgnu.la
  libvirt_driver_interface_la_LDFLAGS += -module -avoid-version
-Index: libvirt-1.0.5/tools/virsh.c
+Index: libvirt-1.0.5.1/tools/virsh.c
 ===================================================================
---- libvirt-1.0.5.orig/tools/virsh.c
-+++ libvirt-1.0.5/tools/virsh.c
+--- libvirt-1.0.5.1.orig/tools/virsh.c
++++ libvirt-1.0.5.1/tools/virsh.c
 @@ -2888,6 +2888,8 @@ vshShowVersion(vshControl *ctl ATTRIBUTE
      vshPrint(ctl, " Interface");
  # if defined(WITH_NETCF)
@@ -79,10 +79,10 @@
  # elif defined(WITH_UDEV)
      vshPrint(ctl, " udev");
  # endif
-Index: libvirt-1.0.5/src/interface/interface_backend_netcf.c
+Index: libvirt-1.0.5.1/src/interface/interface_backend_netcf.c
 ===================================================================
---- libvirt-1.0.5.orig/src/interface/interface_backend_netcf.c
-+++ libvirt-1.0.5/src/interface/interface_backend_netcf.c
+--- libvirt-1.0.5.1.orig/src/interface/interface_backend_netcf.c
++++ libvirt-1.0.5.1/src/interface/interface_backend_netcf.c
 @@ -23,7 +23,12 @@
  
  #include <config.h>
@@ -146,10 +146,10 @@
      /* open netcf */
      if (ncf_init(&driverState->netcf, NULL) != 0)
      {
-Index: libvirt-1.0.5/src/interface/interface_driver.c
+Index: libvirt-1.0.5.1/src/interface/interface_driver.c
 ===================================================================
---- libvirt-1.0.5.orig/src/interface/interface_driver.c
-+++ libvirt-1.0.5/src/interface/interface_driver.c
+--- libvirt-1.0.5.1.orig/src/interface/interface_driver.c
++++ libvirt-1.0.5.1/src/interface/interface_driver.c
 @@ -28,8 +28,15 @@ interfaceRegister(void) {
      if (netcfIfaceRegister() == 0)
          return 0;
@@ -167,10 +167,10 @@
      if (udevIfaceRegister() == 0)
          return 0;
  #endif /* WITH_UDEV */
-Index: libvirt-1.0.5/m4/virt-netcontrol.m4
+Index: libvirt-1.0.5.1/m4/virt-netcontrol.m4
 ===================================================================
 --- /dev/null
-+++ libvirt-1.0.5/m4/virt-netcontrol.m4
++++ libvirt-1.0.5.1/m4/virt-netcontrol.m4
 @@ -0,0 +1,35 @@
 +dnl The libnetcontrol library
 +dnl

++++++ libvirtd-defaults.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,7 +1,7 @@
-Index: libvirt-1.0.5/daemon/libvirtd.conf
+Index: libvirt-1.0.5.1/daemon/libvirtd.conf
 ===================================================================
---- libvirt-1.0.5.orig/daemon/libvirtd.conf
-+++ libvirt-1.0.5/daemon/libvirtd.conf
+--- libvirt-1.0.5.1.orig/daemon/libvirtd.conf
++++ libvirt-1.0.5.1/daemon/libvirtd.conf
 @@ -18,8 +18,8 @@
  # It is necessary to setup a CA and issue server certificates before
  # using this capability.
@@ -13,10 +13,10 @@
  
  # Listen for unencrypted TCP connections on the public TCP/IP port.
  # NB, must pass the --listen flag to the libvirtd process for this to
-Index: libvirt-1.0.5/daemon/libvirtd-config.c
+Index: libvirt-1.0.5.1/daemon/libvirtd-config.c
 ===================================================================
---- libvirt-1.0.5.orig/daemon/libvirtd-config.c
-+++ libvirt-1.0.5/daemon/libvirtd-config.c
+--- libvirt-1.0.5.1.orig/daemon/libvirtd-config.c
++++ libvirt-1.0.5.1/daemon/libvirtd-config.c
 @@ -233,7 +233,7 @@ daemonConfigNew(bool privileged ATTRIBUT
          return NULL;
      }

++++++ libvirtd-init-script.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,9 +1,9 @@
 Adjust libvirtd sysconfig file to conform to SUSE standards
 
-Index: libvirt-1.0.5/daemon/libvirtd.sysconf
+Index: libvirt-1.0.5.1/daemon/libvirtd.sysconf
 ===================================================================
---- libvirt-1.0.5.orig/daemon/libvirtd.sysconf
-+++ libvirt-1.0.5/daemon/libvirtd.sysconf
+--- libvirt-1.0.5.1.orig/daemon/libvirtd.sysconf
++++ libvirt-1.0.5.1/daemon/libvirtd.sysconf
 @@ -1,16 +1,25 @@
 +## Path: System/Virtualization/libvirt
 +

++++++ relax-qemu-usergroup-check.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -7,10 +7,10 @@
 daemon.  Then the qemu driver would only be loaded when needed,
 which would never be the case on a xen-only configuration.
 
-Index: libvirt-1.0.5/src/qemu/qemu_conf.c
+Index: libvirt-1.0.5.1/src/qemu/qemu_conf.c
 ===================================================================
---- libvirt-1.0.5.orig/src/qemu/qemu_conf.c
-+++ libvirt-1.0.5/src/qemu/qemu_conf.c
+--- libvirt-1.0.5.1.orig/src/qemu/qemu_conf.c
++++ libvirt-1.0.5.1/src/qemu/qemu_conf.c
 @@ -435,15 +435,15 @@ int virQEMUDriverConfigLoadFile(virQEMUD
  
      p = virConfGetValue(conf, "user");

++++++ support-managed-pci-xen-driver.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -8,10 +8,10 @@
  src/xenxs/xen_xm.c   |   28 +++++++++++++++++++++++++++-
  2 files changed, 35 insertions(+), 15 deletions(-)
 
-Index: libvirt-1.0.5/src/xenxs/xen_sxpr.c
+Index: libvirt-1.0.5.1/src/xenxs/xen_sxpr.c
 ===================================================================
---- libvirt-1.0.5.orig/src/xenxs/xen_sxpr.c
-+++ libvirt-1.0.5/src/xenxs/xen_sxpr.c
+--- libvirt-1.0.5.1.orig/src/xenxs/xen_sxpr.c
++++ libvirt-1.0.5.1/src/xenxs/xen_sxpr.c
 @@ -1035,6 +1035,7 @@ xenParseSxprPCI(virDomainDefPtr def,
          int busID;
          int slotID;
@@ -78,10 +78,10 @@
              xenFormatSxprPCI(def->hostdevs[i], buf);
          }
      }
-Index: libvirt-1.0.5/src/xenxs/xen_xm.c
+Index: libvirt-1.0.5.1/src/xenxs/xen_xm.c
 ===================================================================
---- libvirt-1.0.5.orig/src/xenxs/xen_xm.c
-+++ libvirt-1.0.5/src/xenxs/xen_xm.c
+--- libvirt-1.0.5.1.orig/src/xenxs/xen_xm.c
++++ libvirt-1.0.5.1/src/xenxs/xen_xm.c
 @@ -815,6 +815,8 @@ xenParseXM(virConfPtr conf, int xendConf
              int busID;
              int slotID;

++++++ suse-qemu-conf.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,7 +1,7 @@
-Index: libvirt-1.0.5/src/qemu/qemu.conf
+Index: libvirt-1.0.5.1/src/qemu/qemu.conf
 ===================================================================
---- libvirt-1.0.5.orig/src/qemu/qemu.conf
-+++ libvirt-1.0.5/src/qemu/qemu.conf
+--- libvirt-1.0.5.1.orig/src/qemu/qemu.conf
++++ libvirt-1.0.5.1/src/qemu/qemu.conf
 @@ -169,7 +169,16 @@
  # a special value; security_driver can be set to that value in
  # isolation, but it cannot appear in a list of drivers.

++++++ virtlockd-init-script.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,9 +1,9 @@
 Adjust virtlockd init files to conform to SUSE standards
 
-Index: libvirt-1.0.5/src/locking/virtlockd.sysconf
+Index: libvirt-1.0.5.1/src/locking/virtlockd.sysconf
 ===================================================================
---- libvirt-1.0.5.orig/src/locking/virtlockd.sysconf
-+++ libvirt-1.0.5/src/locking/virtlockd.sysconf
+--- libvirt-1.0.5.1.orig/src/locking/virtlockd.sysconf
++++ libvirt-1.0.5.1/src/locking/virtlockd.sysconf
 @@ -1,3 +1,7 @@
 +## Path: System/Virtualization/virtlockd
 +
@@ -12,10 +12,10 @@
  #
  # Pass extra arguments to virtlockd
  #VIRTLOCKD_ARGS=
-Index: libvirt-1.0.5/src/locking/virtlockd.init.in
+Index: libvirt-1.0.5.1/src/locking/virtlockd.init.in
 ===================================================================
---- libvirt-1.0.5.orig/src/locking/virtlockd.init.in
-+++ libvirt-1.0.5/src/locking/virtlockd.init.in
+--- libvirt-1.0.5.1.orig/src/locking/virtlockd.init.in
++++ libvirt-1.0.5.1/src/locking/virtlockd.init.in
 @@ -4,11 +4,13 @@
  # 
http://www.linux-foundation.org/spec//booksets/LSB-Core-generic/LSB-Core-generic.html#INITSCRCOMCONV
  #

++++++ xen-name-for-devid.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -14,10 +14,10 @@
     is inactive.  We obviously can't search xenstore when the domain is
     inactive.
 
-Index: libvirt-1.0.5/src/xen/xend_internal.c
+Index: libvirt-1.0.5.1/src/xen/xend_internal.c
 ===================================================================
---- libvirt-1.0.5.orig/src/xen/xend_internal.c
-+++ libvirt-1.0.5/src/xen/xend_internal.c
+--- libvirt-1.0.5.1.orig/src/xen/xend_internal.c
++++ libvirt-1.0.5.1/src/xen/xend_internal.c
 @@ -60,8 +60,8 @@
  #define XEND_RCV_BUF_MAX_LEN (256 * 1024)
  

++++++ xen-pv-cdrom.patch ++++++
--- /var/tmp/diff_new_pack.aHlRhE/_old  2013-06-05 13:29:33.000000000 +0200
+++ /var/tmp/diff_new_pack.aHlRhE/_new  2013-06-05 13:29:33.000000000 +0200
@@ -1,7 +1,7 @@
-Index: libvirt-1.0.5/src/xenxs/xen_sxpr.c
+Index: libvirt-1.0.5.1/src/xenxs/xen_sxpr.c
 ===================================================================
---- libvirt-1.0.5.orig/src/xenxs/xen_sxpr.c
-+++ libvirt-1.0.5/src/xenxs/xen_sxpr.c
+--- libvirt-1.0.5.1.orig/src/xenxs/xen_sxpr.c
++++ libvirt-1.0.5.1/src/xenxs/xen_sxpr.c
 @@ -341,7 +341,7 @@ error:
  static int
  xenParseSxprDisks(virDomainDefPtr def,

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to