ed105f0f54
topology - fate#311376: EFI support in SP2 - fate#311529: Native UEFI booting under Xen (installation) 23074-pfn.h.patch 23571-vtd-fault-verbosity.patch 23574-x86-dom0-compressed-ELF.patch 23575-x86-DMI.patch 23610-x86-topology-info.patch 23611-amd-fam15-topology.patch 23613-EFI-headers.patch 23614-x86_64-EFI-boot.patch 23615-x86_64-EFI-runtime.patch 23616-x86_64-EFI-MPS.patch - Mark xen-scsi.ko supported (bnc#582265, fate#309459). - fate#310308: Hypervisor assisted watchdog driver ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch tools-watchdog-support.patch - bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection (CVE-2011-1898) Fixed in Xen version 4.1.1 - fate#310956: Support Direct Kernel Boot for FV guests kernel-boot-hvm.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=130
14 lines
676 B
Diff
14 lines
676 B
Diff
Index: xen-4.1.1-testing/tools/python/xen/xend/XendDomainInfo.py
|
|
===================================================================
|
|
--- xen-4.1.1-testing.orig/tools/python/xen/xend/XendDomainInfo.py
|
|
+++ xen-4.1.1-testing/tools/python/xen/xend/XendDomainInfo.py
|
|
@@ -2927,7 +2927,7 @@ class XendDomainInfo:
|
|
|
|
self.guest_bitsize = self.image.getBitSize()
|
|
# Make sure there's enough RAM available for the domain
|
|
- balloon.free(memory + shadow + vtd_mem, self)
|
|
+ balloon.free(memory + shadow + vtd_mem + 512, self)
|
|
|
|
# Set up the shadow memory
|
|
shadow_cur = xc.shadow_mem_control(self.domid, shadow / 1024)
|