Blame SOURCES/0003-As-xen-pv-guest-can-access-cpuid-from-Intel-CPUs-sta.patch

a03d84
From 777143e7b8f598ca16542923207e2874c1961acd Mon Sep 17 00:00:00 2001
445594
From: xiliang <xiliang@redhat.com>
445594
Date: Sun, 18 Jun 2017 00:33:28 +0800
a03d84
Subject: [PATCH 3/8] As xen pv guest can access cpuid from Intel CPUs started
445594
 IvyBridge onwards have CPUID Faulting, added one more check in virt-what.
445594
445594
---
445594
 virt-what.in | 5 +++--
445594
 1 file changed, 3 insertions(+), 2 deletions(-)
445594
445594
diff --git a/virt-what.in b/virt-what.in
445594
index a05e0db..247348e 100644
445594
--- a/virt-what.in
445594
+++ b/virt-what.in
445594
@@ -1,6 +1,6 @@
445594
 #!/bin/sh -
445594
 # @configure_input@
445594
-# Copyright (C) 2008-2015 Red Hat Inc.
445594
+# Copyright (C) 2008-2017 Red Hat Inc.
445594
 #
445594
 # This program is free software; you can redistribute it and/or modify
445594
 # it under the terms of the GNU General Public License as published by
445594
@@ -223,7 +223,8 @@ fi
445594
 
445594
 # Check for Xen.
445594
 
445594
-if [ "$cpuid" = "XenVMMXenVMM" ]; then
445594
+if [ "$cpuid" = "XenVMMXenVMM" ] &&
445594
+    ! echo "$dmi" | grep -q 'No SMBIOS nor DMI entry point found, sorry'; then
445594
     echo xen; echo xen-hvm
445594
     # Check for AWS
445594
     if echo "$dmi" | grep -q 'Version: [0-9]\.[0-9]\.amazon'; then
445594
-- 
a03d84
2.32.0
445594