eeeeaf88a6
xend-devid-or-name.patch - Upstream patches from Jan 22019-x86-cpuidle-online-check.patch 22051-x86-forced-EOI.patch 22067-x86-irq-domain.patch 22068-vtd-irte-RH-bit.patch 22071-ept-get-entry-lock.patch 22084-x86-xsave-off.patch - bnc#638465 - hypervisor panic in memory handling heaplock.patch - Update to Xen 4.0.1. This is a bug fix release. OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=73
23 lines
698 B
Diff
23 lines
698 B
Diff
Open SuSEfirewall2 FORWARD rule when use xen nat
|
|
|
|
Index: xen-4.0.1-testing/tools/hotplug/Linux/network-nat
|
|
===================================================================
|
|
--- xen-4.0.1-testing.orig/tools/hotplug/Linux/network-nat
|
|
+++ xen-4.0.1-testing/tools/hotplug/Linux/network-nat
|
|
@@ -83,6 +83,7 @@ function dhcp_stop()
|
|
op_start() {
|
|
echo 1 >/proc/sys/net/ipv4/ip_forward
|
|
iptables -t nat -A POSTROUTING -o ${netdev} -j MASQUERADE
|
|
+ iptables -P FORWARD ACCEPT
|
|
[ "$dhcp" != 'no' ] && dhcp_start
|
|
}
|
|
|
|
@@ -90,6 +91,7 @@ op_start() {
|
|
op_stop() {
|
|
[ "$dhcp" != 'no' ] && dhcp_stop
|
|
iptables -t nat -D POSTROUTING -o ${netdev} -j MASQUERADE
|
|
+ iptables -P FORWARD DROP
|
|
}
|
|
|
|
|