Blame SOURCES/0003-As-xen-pv-guest-can-access-cpuid-from-Intel-CPUs-sta.patch

662be1
From a821dc9961d457c086fffcc16a911cb6f9f8659a Mon Sep 17 00:00:00 2001
662be1
From: xiliang <xiliang@redhat.com>
662be1
Date: Sun, 18 Jun 2017 00:33:28 +0800
662be1
Subject: [PATCH 3/4] As xen pv guest can access cpuid from Intel CPUs started
662be1
 IvyBridge onwards have CPUID Faulting, added one more check in virt-what.
662be1
662be1
---
662be1
 virt-what.in | 5 +++--
662be1
 1 file changed, 3 insertions(+), 2 deletions(-)
662be1
662be1
diff --git a/virt-what.in b/virt-what.in
662be1
index a05e0db..247348e 100644
662be1
--- a/virt-what.in
662be1
+++ b/virt-what.in
662be1
@@ -1,6 +1,6 @@
662be1
 #!/bin/sh -
662be1
 # @configure_input@
662be1
-# Copyright (C) 2008-2015 Red Hat Inc.
662be1
+# Copyright (C) 2008-2017 Red Hat Inc.
662be1
 #
662be1
 # This program is free software; you can redistribute it and/or modify
662be1
 # it under the terms of the GNU General Public License as published by
662be1
@@ -223,7 +223,8 @@ fi
662be1
 
662be1
 # Check for Xen.
662be1
 
662be1
-if [ "$cpuid" = "XenVMMXenVMM" ]; then
662be1
+if [ "$cpuid" = "XenVMMXenVMM" ] &&
662be1
+    ! echo "$dmi" | grep -q 'No SMBIOS nor DMI entry point found, sorry'; then
662be1
     echo xen; echo xen-hvm
662be1
     # Check for AWS
662be1
     if echo "$dmi" | grep -q 'Version: [0-9]\.[0-9]\.amazon'; then
662be1
-- 
662be1
2.13.2
662be1