bitkeeper revision 1.937 (40c0939elXhbQIKlWAMqL7ohYLPX6Q)
authorkaf24@scramble.cl.cam.ac.uk <kaf24@scramble.cl.cam.ac.uk>
Fri, 4 Jun 2004 15:22:06 +0000 (15:22 +0000)
committerkaf24@scramble.cl.cam.ac.uk <kaf24@scramble.cl.cam.ac.uk>
Fri, 4 Jun 2004 15:22:06 +0000 (15:22 +0000)
Undo temporary xend hack.

tools/xend/lib/main.py

index 963146c60a80e2f755fad32f371f4c696e4f113f..ce7c9ec44b3a9da2a76d64b913f13a4c239a9070 100755 (executable)
@@ -201,7 +201,7 @@ def daemon_loop():
                     xend.blkif.backend_rx_req(port, msg)
                 elif type == CMSG_NETIF_FE and net_if:
                     net_if.ctrlif_rx_req(port, msg)
-                elif type == CMSG_NETIF_BE:
+                elif type == CMSG_NETIF_BE and port == xend.netif.be_port:
                     xend.netif.backend_rx_req(port, msg)
                 else:
                     port.write_response(msg)
@@ -213,7 +213,7 @@ def daemon_loop():
                 type = (msg.get_header())['type']
                 if type == CMSG_BLKIF_BE and port == dom0_port:
                     xend.blkif.backend_rx_rsp(port, msg)
-                elif type == CMSG_NETIF_BE:
+                elif type == CMSG_NETIF_BE and port == xend.netif.be_port:
                     xend.netif.backend_rx_rsp(port, msg)
 
             # Send console data.