Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
interface name for the vif, e.g. xvif(4) for dom0, and xennet(4)
for domU.
This allows querying the XenStore for the vif names, rather than
hardcoding their syntax in vif-* scripts.
Add a xen-subr shell script that can contain customized functions, and
include it in the vif-ip/vif-bridge scripts.
Introduce xenstore_read_default that returns the value of a specific
key from XenStore, or the default specified value when key is absent.
Bump revision.
ok bouyer@.
See http://mail-index.netbsd.org/port-xen/2011/01/11/msg006405.html
|
|
|
|
|
|
|
|
pciquirk.py: fix uninitialized variable when there's no PERMISSIVE_CONFIG_FILE
add a note about exported PCI devices in netbsd1 example file
Python hacking by Pierre-Emmanuel Le Roux at LIP6 (thanks !)
PKGREVISION++
|
|
changed runtime dependencies now.
|
|
issue reported Damian Sobczak on port-xen@ where xend is started before
mountall.
bump PKGREVISION
|
|
work for linux guests.
Bump PKGREVISION.
|
|
|
|
|
|
|
|
- assume that Python 2.4 and 2.5 are compatible and allow checking for
fallout.
- remove PYTHON_VERSIONS_COMPATIBLE that are obsoleted by the 2.3+
default. Modify the others to deal with the removals.
|
|
|
|
for the first time. This cause a race between xenconsole and xenconsoled,
where the later start writing to the master pty before the former has
switched it back to raw, causing some lines to be echoed back to the
domU.
Fix this by keeping the slave open in xenconsoled, so that when xenconsole
opens it attributes are not reset. Hint provided by fvdl@, thanks !
Because of this we no longer need to set the slave to raw in xenconsole,
so shorten patch-cc.
Bump PKGREVISION.
|
|
|
|
Ok: Manuel Bouyer <bouyer@netbsd.org>
|
|
from files/ (which have the old IOCTL_PRIVCMD_HYPERCALL to be compatible
with NetBSD 4.0).
Properly handle the new IOCTL_PRIVCMD_HYPERCALL ioctl if present.
|
|
in HVM support.
|
|
on packages that are affected by the switch from the openssl 0.9.7
branch to the 0.9.8 branch. ok jlam@
|
|
|
|
Package changes:
point HOMEPAGE to http://xen.org/
looks like the Xen peoples won't put a tarball on their http server
for this; I built one from their repository and put it in
${MASTER_SITE_LOCAL}
Summary of changes since 3.1.0:
some of our patches have been integrated upstream, thanks to Christoph Egger
various performances improvements and bug fixes, including some security
fixes, and one bug that would lead to floating point register
leak/corruption from HVM to PV guests on Intel VMX CPUs.
|
|
|
|
in version numbers, and upgrade to 3.1.0.
Changes since 3.0.4:
* XenAPI 1.0 support
o XML configuration files for virtual machines;
o VM life-cycle management operations; and
o Secure on- or off-box XML-RPC with bindings for many languages
* Basic save/restore/migrate support for HVM (e.g. Windows) VMs;
* Dynamic memory control for HVM guests;
* 32-on-64 PV guest support (run PAE PV VMs on a 64-bit Xen!); and
* Blktap copy-on-write disk support.
It also fixes some HVM bugs.
|