On 16. Sep 2019, at 18:23, Ross Lagerwall
mailto:ross.lagerw...@citrix.com>> wrote:
On 9/16/19 11:59 AM, Pawel Wieczorkiewicz wrote:
This change is part of a independant stacked hotpatch modules
feature. This feature allows to bypass dependencies between modules
upon loading, but still verifies
On 16. Sep 2019, at 19:01, Ross Lagerwall
mailto:ross.lagerw...@citrix.com>> wrote:
On 9/16/19 11:59 AM, Pawel Wieczorkiewicz wrote:
snip
+/*
+ * Parse user provided action flags.
+ * This function expects to only receive an array of input parameters being
flags.
+ * Expected action is specifi
On 17. Sep 2019, at 10:27, Jan Beulich
mailto:jbeul...@suse.com>> wrote:
On 16.09.2019 12:59, Pawel Wieczorkiewicz wrote:
@@ -951,11 +952,13 @@ struct xen_sysctl_livepatch_list {
amount of payloads and version.
> On 17. Sep 2019, at 10:48, Jan Beulich wrote:
>
> On 17.09.2019 10:40, Wieczorkiewicz, Pawel wrote:
>>
>>
>> On 17. Sep 2019, at 10:27, Jan Beulich
>> mailto:jbeul...@suse.com>> wrote:
>>
>> On 16.09.2019 12:59, Pawel Wi
> On 16. Sep 2019, at 19:54, Ross Lagerwall wrote:
>
>>
snip
>> 2) post-apply hook
>> runs after the apply action has been executed and quiescing zone
>> exited. Its main purpose is to provide an ability to follow-up on
>> actions performed by the pre- hook, when module application was
>
> On 18. Sep 2019, at 11:49, Jan Beulich wrote:
>
> On 18.09.2019 09:35, Pawel Wieczorkiewicz wrote:
>> This is needed for more precise patchability verification.
>> Only non-special .rodata sections should be subject
>> for such a non-referenced check in kpatch_verify_patchability().
>> Curren
> On 18. Sep 2019, at 12:41, Ian Jackson wrote:
>
> Julien Grall writes ("Re: [PATCH] create-diff-object: more precisely identify
> .rodata sections"):
>> On 18/09/2019 10:52, Wieczorkiewicz, Pawel wrote:
>>> $ scripts/./add_maintainers.pl -d ~/git/livepat
> On 18. Sep 2019, at 13:19, Julien Grall wrote:
>
> Hi Pawel,
>
> On 18/09/2019 11:44, Wieczorkiewicz, Pawel wrote:
>>> On 18. Sep 2019, at 12:41, Ian Jackson wrote:
>>>
>>> Julien Grall writes ("Re: [PATCH] create-diff-object: more precisely
> On 18. Sep 2019, at 17:23, Lars Kurth wrote:
>
>
>
> On 18/09/2019, 12:27, "Wieczorkiewicz, Pawel" wrote:
>
>
>
>> On 18. Sep 2019, at 13:19, Julien Grall wrote:
>>
>> Hi Pawel,
>>
>> On 18/09/2019 11:44, Wieczork
> On 19. Sep 2019, at 17:18, Ross Lagerwall wrote:
>
> On 9/16/19 11:59 AM, Pawel Wieczorkiewicz wrote:
>> Livepatch only tracks an entire payload applied/reverted state. But,
>> with an option to supply the apply_payload() and/or revert_payload()
>> functions as optional hooks, it becomes possi
> On 19. Sep 2019, at 18:06, Ross Lagerwall wrote:
>
> On 9/16/19 11:59 AM, Pawel Wieczorkiewicz wrote:
>> This is the initial implementation of the expectations enhancement
>> to improve inline asm hotpatching.
>> Expectations are designed as optional feature, since the main use of
>> them is
> On 25. Sep 2019, at 17:47, Ross Lagerwall wrote:
>
> On 9/16/19 11:59 AM, Pawel Wieczorkiewicz wrote:
>> Extend the livepatch list operation to fetch also payloads' metadata.
>> This is achieved by extending the sysctl list interface with 2 extra
>> guest handles:
>> * metadata - an array
> On 25. Sep 2019, at 18:47, Ross Lagerwall wrote:
>
> On 9/16/19 12:40 PM, Pawel Wieczorkiewicz wrote:
>> Extend the XC python bindings library to support also all common
>> livepatch operations and actions.
>> Add the python bindings for the following operations:
>> - status (pyxc_livepatch_s
> On 30. Sep 2019, at 10:50, Jan Beulich wrote:
>
> On 28.09.2019 17:13, Pawel Wieczorkiewicz wrote:
>> --- a/xen/include/public/sysctl.h
>> +++ b/xen/include/public/sysctl.h
>> @@ -925,10 +925,11 @@ struct xen_sysctl_livepatch_get {
>> *
>>
snip
>> uint32_t pad;
> On 30. Sep 2019, at 13:05, Jan Beulich wrote:
>
> On 28.09.2019 17:12, Pawel Wieczorkiewicz wrote:
>> --- a/xen/include/public/sysctl.h
>> +++ b/xen/include/public/sysctl.h
>> @@ -35,7 +35,7 @@
>> #include "domctl.h"
>> #include "physdev.h"
>>
>> -#define XEN_SYSCTL_INTERFACE_VERSION 0x0
Hi Lars, Julien,
Thanks for the pointers, I will read them up and follow the recommendations
with my future contributions.
Sorry for the mess…
But, let me ask first before reading the wikis, how do you prefer submitting
series that contain patches belonging to 2 distinct repos (e.g. xen and
li
=summary
I hope that makes navigation and dealing with the swarm of patches a bit easier.
Best Regards,
Pawel Wieczorkiewicz
On 15. Aug 2019, at 17:29, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
On 15/08/2019 16:19, Wieczorkiewicz, Pawel wrote:
Hi Lars, Julien,
Hi,
Thanks f
On 16. Aug 2019, at 11:40, Ross Lagerwall
mailto:ross.lagerw...@citrix.com>> wrote:
On 8/8/19 1:35 PM, Pawel Wieczorkiewicz wrote:
…snip...
* The rela groups in the .fixup section vary in size. The beginning of each
* .fixup rela group is referenced by the .ex_table section. To find the
> On 16. Aug 2019, at 11:57, Ross Lagerwall wrote:
>
> On 8/8/19 1:39 PM, Pawel Wieczorkiewicz wrote:
>>
…snip...
>> #define inc_printf(fmt, ...) \
>> log_debug("%*s" fmt, recurselevel, "", ##__VA_ARGS__);
> This patch looks good. There is a comment at the top of
> should_include_str_s
On 16. Aug 2019, at 14:47, Wei Liu mailto:w...@xen.org>> wrote:
On Thu, Aug 15, 2019 at 09:44:00AM +, Pawel Wieczorkiewicz wrote:
Extend the list of xc() object methods with additional one to display
Xen's buildid. The implementation follows the libxl implementation
(e.g. max buildid size ass
> On 16. Aug 2019, at 14:44, Wei Liu wrote:
>
> On Thu, Aug 15, 2019 at 11:27:50AM +, Pawel Wieczorkiewicz wrote:
>> Extend the livepatch list operation to fetch also payloads' metadata.
>> This is achieved by extending the sysctl list interface with 2 extra
>> guest handles:
>> * metadata
> On 16. Aug 2019, at 14:37, Wei Liu wrote:
>
> On Thu, Aug 15, 2019 at 11:36:46AM +, Pawel Wieczorkiewicz wrote:
>> Extend the XC python bindings library to support also all common
>> livepatch operations and actions.
>>
>>
…snip...
>>
>> Signed-off-by: Pawel Wieczorkiewicz
>> Reviewe
On 16. Aug 2019, at 17:02, Ross Lagerwall
mailto:ross.lagerw...@citrix.com>> wrote:
On 8/8/19 1:51 PM, Pawel Wieczorkiewicz wrote:
The patched ELF object file contains all sections and symbols as
resulted from the compilation. However, certain symbols may not be
copied over to the resulting obje
> On 19. Aug 2019, at 22:40, Marek Marczykowski-Górecki
> wrote:
>
> On Thu, Aug 15, 2019 at 09:44:00AM +, Pawel Wieczorkiewicz wrote:
>> Extend the list of xc() object methods with additional one to display
>> Xen's buildid. The implementation follows the libxl implementation
>> (e.g. max
Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Ralf Herbrich
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879
PGPMIME Versions Identification
Description: PGP/MIME Versions Identific
On 19. Aug 2019, at 23:39, Marek Marczykowski-Górecki
mailto:marma...@invisiblethingslab.com>> wrote:
On Thu, Aug 15, 2019 at 11:36:46AM +, Pawel Wieczorkiewicz wrote:
Extend the XC python bindings library to support also all common
livepatch operations and actions.
…snip...
+
+static PyObj
> On 20. Aug 2019, at 15:35, Julien Grall wrote:
>
> Hi,
>
> Something looks fishy in the threading:
>
> - The patch #1 is answered in reply-to the patch #1 of version 1.
> - This patch (#2) is answered in reply-to the patch #2 of version 1.
> - The patch #3 is labeled as v3 an in reply-to
> On 20. Aug 2019, at 16:28, Julien Grall wrote:
>
> Hi,
>
>>>
…snip...
>> Yeah, since I got feedback and reviews on various patches that I have
>> already submitted the way I did,
>> I simply continue with what I have until all comments are addressed (I do
>> not want to lose anything).
>
On 21. Aug 2019, at 20:10, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
On 8/14/19 4:38 AM, Pawel Wieczorkiewicz wrote:
By default, in the quiescing zone, a hotpatch payload is applied with
apply_payload() and reverted with revert_payload() functions. Both of
the functions receiv
On 21. Aug 2019, at 20:09, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
On 8/14/19 4:38 AM, Pawel Wieczorkiewicz wrote:
With version 2 of a payload structure additional field is supported
to track whether given function has been applied or reverted.
There also comes additional 8-
> On 21. Aug 2019, at 20:12, Konrad Rzeszutek Wilk
> wrote:
>
> On 8/14/19 4:39 AM, Pawel Wieczorkiewicz wrote:
>> #ifdef __XEN__
>> +typedef enum livepatch_func_state {
>> +LIVEPATCH_FUNC_NOT_APPLIED = 0,
>> +LIVEPATCH_FUNC_APPLIED = 1
>> +} livepatch_func_state_t;
>> +
>> struct live
> On 21. Aug 2019, at 20:28, Konrad Rzeszutek Wilk
> wrote:
>
> On 8/21/19 4:19 AM, Pawel Wieczorkiewicz wrote:
>> struct livepatch_func {
>> const char *name; /* Name of function to be patched. */
>> void *new_addr;
>> @@ -834,6 +839,10 @@ struct livepatch_func {
>> uint3
> On 21. Aug 2019, at 20:30, Konrad Rzeszutek Wilk
> wrote:
>
> On 8/21/19 4:19 AM, Pawel Wieczorkiewicz wrote:
>> typedef enum livepatch_func_state {
>> LIVEPATCH_FUNC_NOT_APPLIED = 0,
>> LIVEPATCH_FUNC_APPLIED = 1
>> @@ -838,11 +850,12 @@ struct livepatch_func {
>> uint32_t ne
On 21. Aug 2019, at 20:31, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
On 8/21/19 4:19 AM, Pawel Wieczorkiewicz wrote:
By default, in the quiescing zone, a hotpatch payload is applied with
apply_payload() and reverted with revert_payload() functions. Both of
the functions receiv
> On 21. Aug 2019, at 20:49, Konrad Rzeszutek Wilk
> wrote:
>
>
>> +# Using xen-syms built in the previous step by build_full().
>> +SPECIAL_VARS=$(readelf -wi "$OUTPUT/xen-syms" |
>
> What version of readelf supports this? Asking as in the past there were some
> options with binutil
On 21. Aug 2019, at 23:34, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi Pawel,
Hi Julien,
On 8/21/19 9:19 AM, Pawel Wieczorkiewicz wrote:
Livepatch only tracks an entire payload applied/reverted state. But,
with an option to supply the apply_payload() and/or revert_payload()
functions
On 22. Aug 2019, at 12:07, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi,
On 22/08/2019 08:44, Wieczorkiewicz, Pawel wrote:
…snip...
Is this going to break livepatch on Arm? If so, do you have any plan to fix it?
No, I do not think it is. But, I am unable to test on Arm (No
On 22. Aug 2019, at 12:29, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi Pawel,
Hi Julien,
Thank for looking at this!
On 21/08/2019 09:19, Pawel Wieczorkiewicz wrote:
Livepatch only tracks an entire payload applied/reverted state. But,
with an option to supply the apply_payload() and
On 22. Aug 2019, at 12:31, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi Pawel,
On 21/08/2019 09:19, Pawel Wieczorkiewicz wrote:
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index b55ad6d050..e18322350d 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include
On 22. Aug 2019, at 12:43, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi,
On 22/08/2019 11:20, Wieczorkiewicz, Pawel wrote:
..snip..
Cross-compiler are nowadays widely available. So build testing your changes in
common code would be the minimum.
I wish it was that
On 22. Aug 2019, at 17:30, Julien Grall
mailto:julien.gr...@arm.com>> wrote:
Hi Pawel,
On 22/08/2019 12:02, Wieczorkiewicz, Pawel wrote:
On 22. Aug 2019, at 12:29, Julien Grall
mailto:julien.gr...@arm.com>
<mailto:julien.gr...@arm.com>> wrote:
On 21/08/2019 09:19, Pawel Wi
On 27. Aug 2019, at 18:58, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
On August 27, 2019 4:46:17 AM EDT, Pawel Wieczorkiewicz
mailto:wipa...@amazon.de>> wrote:
By default, in the quiescing zone, a hotpatch payload is applied with
apply_payload() and reverted with revert_paylo
On 29. Aug 2019, at 16:34, Konrad Rzeszutek Wilk
mailto:kon...@darnok.org>> wrote:
…snip...
+
+struct livepatch_func __section(".livepatch.funcs") livepatch_exceptions = {
+.version = LIVEPATCH_PAYLOAD_VERSION,
+.name = livepatch_exceptions_str,
+.new_addr = xen_hello_world,
+
On 29. Aug 2019, at 17:58, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
+CODE_GET_EXPECT=$(shell objdump -d --insn-width=1 $(1) | grep -A6 -E
'<'$(2)'>:' | tail -n +2 | awk 'BEGIN {printf "{"} {printf "0x%s,", $$2}' | sed
's/,$$/}/g')
Ony my Hikey 960 when I compile using an
On 29. Aug 2019, at 19:49, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com>> wrote:
On Thu, Aug 29, 2019 at 04:16:13PM +, Wieczorkiewicz, Pawel wrote:
On 29. Aug 2019, at 17:58, Konrad Rzeszutek Wilk
mailto:konrad.w...@oracle.com><mailto:konrad.w...@oracle.com>>
On 3. Apr 2019, at 10:10, Jan Beulich
mailto:jbeul...@suse.com>> wrote:
On 03.04.19 at 09:56, mailto:wipa...@amazon.de>> wrote:
The symbols tool is outdated and has a bug in it leading to crashes.
The tool is derived from linux kernel where this bug has been already
fixed.
Thanks for noticing
> On 29. Apr 2019, at 16:37, Ross Lagerwall wrote:
>
> On 4/25/19 5:51 AM, Konrad Rzeszutek Wilk wrote:
>> On Tue, Apr 16, 2019 at 12:22:39PM +, Pawel Wieczorkiewicz wrote:
>>> When there is no changed function in the generated payload, do not
>>> create an empty .livepatch.funcs section. Hy
> On 29. Apr 2019, at 14:40, Ross Lagerwall wrote:
>
> On 4/8/19 9:32 AM, Pawel Wieczorkiewicz wrote:
>> In some build systems symlinks might be used for patch file names
>> to point from target directories to actual patches. Following those
>> symlinks breaks naming convention as the resulting
> On 29. Apr 2019, at 16:21, Ross Lagerwall wrote:
>
> On 4/29/19 3:10 PM, Ross Lagerwall wrote:
>> On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote:
>>> Hard-coding the special section group sizes is unreliable. Instead,
>>> determine them dynamically by finding the related struct definitions
>>>
> On 29. Apr 2019, at 15:53, Ross Lagerwall wrote:
>
> On 4/8/19 9:32 AM, Pawel Wieczorkiewicz wrote:
>> Up to now the livepatch-build ignores newly created object files.
>> When patch applies new .c file and augments its Makefile to build it
>> the resulting object file is not taken into accoun
> On 29. Apr 2019, at 17:14, Ross Lagerwall wrote:
>
> On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote:
>> This function checks if given section has an included corresponding
>> RELA section and/or any of the symbols table symbols references the
>> section. Section associated symbols are ignored
> On 29. Apr 2019, at 17:25, Ross Lagerwall wrote:
>
> On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote:
>> This function determines, based on the given section name, if the
>> sections belongs to the special sections category.
>> It treats a name from the special_sections array as a prefix. Any
>
On 29. Apr 2019, at 17:47, Ross Lagerwall
mailto:ross.lagerw...@citrix.com>> wrote:
On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote:
Handle .livepatch.hooks* and .altinstr_replacement sections as the
special sections with assigned group_size resolution function.
By default each .livepatch.hooks*
> On 29. Apr 2019, at 18:11, Ross Lagerwall wrote:
>
> On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote:
>> Starting with the "2af6f1aa6233 Fix patch creation with GCC 6.1+" commit
>> all .rodata sections are included by default (regardless of whether they
>> are needed or not).
>> During stacked
> On 18. Nov 2019, at 17:42, Sergey Dyasli wrote:
>
> Hello,
>
> Trying to build a simple version of XSA-304 Live-Patch for 4.13 gives
> the following error during LP upload:
>
>(XEN) livepatch: lp: Unknown symbol: .LC7
>
> Bisecting identified the first bad commit as:
>
>commit 854
> On 18. Nov 2019, at 18:09, Sergey Dyasli wrote:
>
> On 18/11/2019 16:47, Wieczorkiewicz, Pawel wrote:
>>
>>
>>> On 18. Nov 2019, at 17:42, Sergey Dyasli wrote:
>>>
>>> Hello,
>>>
>>> Trying to build a simple version of X
> On 18. Nov 2019, at 18:41, Sergey Dyasli wrote:
>
> On 18/11/2019 17:28, Wieczorkiewicz, Pawel wrote:
>>
>> Could you build the lp with debug (-d) and provide me with the
>> create-diff-object.log file?
>>
>
> I've attached the log. Btw, I th
> On 20. Nov 2019, at 03:25, Konrad Rzeszutek Wilk
> wrote:
>
> On Thu, Nov 14, 2019 at 01:06:41PM +, Pawel Wieczorkiewicz wrote:
>> This series introduces new features to the livepatch functionality as
>> briefly discussed during Xen Developer Summit 2019: [a] and [b].
>> It also provides
> On 25. Nov 2019, at 15:38, Ross Lagerwall wrote:
>
> On 9/16/19 12:30 PM, Pawel Wieczorkiewicz wrote:
>> In the process of creating a final hotpatch module file make sure to
>> strip all transient symbols that have not been caught and removed by
>> create-diff-object processing. For now these
> On 20. Nov 2019, at 12:42, Sergey Dyasli wrote:
>
> On 19/11/2019 17:21, Wieczorkiewicz, Pawel wrote:
>>
>>
>>> On 18. Nov 2019, at 18:41, Sergey Dyasli wrote:
>>>
>>> On 18/11/2019 17:28, Wieczorkiewicz, Pawel wrote:
>>>>
>
..
Can you please try to build the livepatch module with additional option
'—prelink' and give it a try ?
> On 26. Nov 2019, at 18:51, Wieczorkiewicz, Pawel wrote:
>
>
>
>> On 20. Nov 2019, at 12:42, Sergey Dyasli wrote:
>>
>> On 19/11/2019 17:21, Wieczo
> On 27. Nov 2019, at 12:16, Sergey Dyasli wrote:
>
> On 26/11/2019 18:37, Wieczorkiewicz, Pawel wrote:
>> It looks like gcc plays the usual dirty tricks with local variables renaming:
>>
>> - xen-syms
>> 7529: 82d0805fed50 8 OBJECT LOCAL DEFAULT 4
> On 27. Nov 2019, at 16:56, Sergey Dyasli wrote:
>
> On 27/11/2019 15:22, Wieczorkiewicz, Pawel wrote:
>>
>>
>>> On 27. Nov 2019, at 12:16, Sergey Dyasli wrote:
>>>
>>> On 26/11/2019 18:37, Wieczorkiewicz, Pawel wrote:
>>>&g
> On 30. Sep 2019, at 17:13, Ross Lagerwall wrote:
>
> On 9/28/19 4:13 PM, Pawel Wieczorkiewicz wrote:
>> Extend the XC python bindings library to support also all common
snip
>>
>> +
>> +fd = open(filename, O_RDONLY);
>> +if ( fd < 0 )
>> +goto error;
>> +
>> +if ( fstat(f
> On 1. Oct 2019, at 17:37, Andrew Cooper wrote:
>
> On 01/10/2019 15:32, Jan Beulich wrote:
>> On 01.10.2019 14:51, Andrew Cooper wrote:
>>> On 01/10/2019 13:21, Jan Beulich wrote:
On 30.09.2019 20:24, Andrew Cooper wrote:
> The code generation for barrier_nospec_true() is not correct
> On 2. Oct 2019, at 23:02, Andrew Cooper wrote:
>
> On 02/10/2019 10:50, Wieczorkiewicz, Pawel wrote:
>>>>>> I've taken, as a simple example,
>>>>>> p2m_mem_access_sanity_check(), and this looks to be the way gcc9 has
>>>>>>
> On 18. Oct 2019, at 17:34, Ross Lagerwall wrote:
>
> On 10/18/19 3:25 PM, Konrad Rzeszutek Wilk wrote:
>> On Sat, Sep 28, 2019 at 03:12:53PM +, Pawel Wieczorkiewicz wrote:
>>> This series introduces new features to the livepatch functionality as
>>> briefly discussed during Xen Developer
> On 16. Apr 2020, at 12:18, Andrew Cooper wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> On 16/04/2020 10:41, Pawel Wieczorkiewicz wrote:
>> The
> On 16. Apr 2020, at 12:32, Andrew Cooper wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> On 16/04/2020 10:41, Pawel Wieczorkiewicz wrote:
>> From:
> On 16. Apr 2020, at 12:36, Andrew Cooper wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> On 16/04/2020 10:41, Pawel Wieczorkiewicz wrote:
>> @@ -2
> On 20. Apr 2020, at 21:26, Andrew Cooper wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> On 16/04/2020 12:36,
On 5. Jan 2020, at 12:36, Andrew Cooper
mailto:andrew.coop...@citrix.com>> wrote:
On 26/11/2019 10:07, Pawel Wieczorkiewicz wrote:
@@ -1274,6 +1297,9 @@ static void livepatch_do_action(void)
else
break;
@@ -1309,6 +1338,9 @@ static void livepatch_do_action(void)
els
> On 13. Jan 2020, at 23:12, Julien Grall wrote:
>
> pandoc is currently failing to generate the pdf with the following
> error:
> ! Undefined control sequence.
> l.1048 metadata string format is: key=value\0
>
> In this case, we want to print \0 so we need to backslash-escape the
> first ch
> On 4. Jun 2020, at 16:12, Andrew Cooper wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> xenconsoled doesn't automatically convert \n into \r\n, wh
> On 11. Jun 2020, at 15:48, George Dunlap wrote:
>
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
>
> On Tue, Nov 26, 2019 at 10:14 AM Pawel Wieczorkiewicz
> On 9. Jul 2020, at 20:46, Julien Grall wrote:
>
>
> From: Julien Grall
>
> XenStore response can be bigger than the response ring. In this case,
> it is possible to have the ring full (e.g cons = 19 and prod = 1043).
>
> However, XTF will consider that there is no data and therefore wait
76 matches
Mail list logo