flight 186036 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/186036/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 186035
test-amd64-amd64-xl-qemuu-win7-amd64
flight 186035 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/186035/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 186030
test-amd64-amd64-xl-qemuu-win7-amd64
flight 186033 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/186033/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 186031
flight 186032 linux-linus real [real]
flight 186034 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/186032/
http://logs.test-lab.xenproject.org/osstest/logs/186034/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be
On Fri, May 17, 2024 at 10:05 AM Leigh Brown wrote:
>
> Update add_to_bridge shell function to read the vlan parameter from
> xenstore and set the bridge VLAN configuration for the VID.
>
> Add additional helper functions to parse the vlan specification,
> which consists of one or more of the
From: Petr Beneš
This commit activates the previously introduced altp2m_count parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libs/light/libxl_create.c
From: Petr Beneš
Allow developers using the OCaml bindings to set the altp2m_count parameter.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 11 +++
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Adjustments
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
Reviewed-by: Stefano Stabellini
---
xen/arch/x86/mm/p2m.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index 4a4620e870..db5d9b6c2a 100644
--- a/xen/arch/x86/mm/p2m.c
+++
From: Petr Beneš
Introduce a new altp2m_count parameter to control the maximum number of altp2m
views a domain can use. By default, if altp2m_count is unspecified and altp2m
is enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the
From: Petr Beneš
Update manual pages to include detailed information about the altp2m_count
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
views for the domain during its creation. Previously, the limits were hardcoded
to a maximum of 10. This change allows for greater flexibility in environments
that require more or fewer altp2m views.
On Sat, May 18, 2024 at 3:18 AM Tamas K Lengyel wrote:
>
> > -ap2m = array_access_nospec(d->arch.altp2m_p2m, altp2m_idx);
> > +ap2m = d->arch.altp2m_p2m[altp2m_idx];
>
> Why is it no longer necessary to use array_access_nospec?
>
> Tamas
I was under the impression that when the
flight 186031 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/186031/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 186027
14 matches
Mail list logo