Olaf Hering
b9d38dfc8d
- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution - bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch - Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch - bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch - Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675) - Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch - bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=237
25 lines
925 B
Diff
25 lines
925 B
Diff
References: bnc#814709
|
|
For cpus that contain additional ':' characters in their name
|
|
|
|
Index: xen-4.2.1-testing/tools/python/xen/xend/osdep.py
|
|
===================================================================
|
|
--- xen-4.2.1-testing.orig/tools/python/xen/xend/osdep.py
|
|
+++ xen-4.2.1-testing/tools/python/xen/xend/osdep.py
|
|
@@ -143,10 +143,14 @@ def _linux_get_cpuinfo():
|
|
d = {}
|
|
for line in f:
|
|
keyvalue = line.split(':')
|
|
- if len(keyvalue) != 2:
|
|
+ if len(keyvalue) < 2:
|
|
continue
|
|
key = keyvalue[0].strip()
|
|
- val = keyvalue[1].strip()
|
|
+ for i in range(1, len(keyvalue)):
|
|
+ if i == 1:
|
|
+ val = keyvalue[i].lstrip()
|
|
+ else:
|
|
+ val = val + ":" + keyvalue[i]
|
|
if key == 'processor':
|
|
if p != -1:
|
|
cpuinfo[p] = d
|