[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Xen FuSa meeting tomorrow Tue 17 November


  • To: Artem Mygaiev <Artem_Mygaiev@xxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 17 Nov 2020 13:17:17 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IiTxpk67f6H0KQ0PzwG7YxgNQ+BxFSrwpyde05ygBaU=; b=KxuU6Y83KKa74MQS14Tuy1aD+0DUZcwksMJh/zD8TEUVLiVTB6GMsGV6xZ6qD1zG7/vbh5uIVqJEVNNLSkg7V0iogARbYolmhK7+tHkjl0cOAOSUzcFXVcgiN7Nx+K52LwgGrasMSFyVHhWMU1DsGmqO8Xap/RhE06ODLy/lpHlnQLw2gx65g1WfEPH9YmnPPo3B2rsC0igzAnztnja95f6ExpL47ToNStLHpDRlSfMGO92jbAudP7b26eCWvjYB4iCN01E0bN+G4a3mf+PjbUFAy68LT1QZyIH1Mv3jXj5W1DhaMS6JZ4SaZ8oyaAia48GHbSVcMCoFLTA7ZEJ2qQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eVFbv3w5TEhs5nfPDdeq9jXzC48dBrb42r0ooNGHrHu/quHpYP8hK2ae+6zGjUqOTNptIQRSMkQ4H07uce5kLSroXCldjID3XvXozlKqXrs1Ks+JHmP05/FG8YMtlWqqOagOjL+wyCRV7TZYt974uGqt9bywyKLZFb6XMvnlCf1X9/3L0pOib1ba566PeQX+or5CuiH6brhV+E3ap58kcYrgNTuAcbWrqMSt6sVt+6yyjiXXvwKmK2cnyWljkcrgpp/nZ+iR2BszJkE/S8i+Z7NumhZ/uJy3GQudhZ4J5dhS93vrPzxe0JHMgXfBTEnIS73g0ePL70uQBnVhAaQ+3A==
  • Authentication-results-original: epam.com; dkim=none (message not signed) header.d=none;epam.com; dmarc=none action=none header.from=arm.com;
  • Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>, "fusa-sig@xxxxxxxxxxxxxxxxxxxx" <fusa-sig@xxxxxxxxxxxxxxxxxxxx>, "stefanos@xxxxxxxxxx" <stefanos@xxxxxxxxxx>
  • Delivery-date: Tue, 17 Nov 2020 13:17:30 +0000
  • List-id: This is a discussion list for members of the Xen Project FuSa SIG <fusa-sig.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: epam.com; dkim=none (message not signed) header.d=none;epam.com; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHWvGrQl2ook3ruJ0WFQjO0UxM6S6nML5WAgAAfhQA=
  • Thread-topic: Xen FuSa meeting tomorrow Tue 17 November

Hi Artem,

Here after you will find the current status I got on your tickets.

> On 17 Nov 2020, at 11:24, Artem Mygaiev <Artem_Mygaiev@xxxxxxxx> wrote:
> 
> Hello all
> 
> Few notes on my AIs to discuss today:
> 
> - Sonar, unfortunately, support a very limited set of MISRA rules 
> (https://rules.sonarsource.com/c/tag/misra-c2012) so it is not suitable for 
> us. OTOH, cppcheck has a full set of MISRA-C-2012 143 rules supported via 
> public plugin (without publishing rules text, only giving an ID) 
> https://github.com/danmar/cppcheck/blob/main/addons/misra.py. I think this 
> should be a great starting point so will try it now.
> 
> - We have created a migrated armclang Xen branch on top of current staging, 
> but I cannot check it without license for Arm DS safety compiler, 
> unfortunately. Also I have re-checked Arm Safety Compiler issues after 
> migration to new support system (except one), here's the list:

I am working on that and will keep you informed.

> CAS-138402-Y0Y9C3 --- 00195992

This is not considered a bug but a feature request and for now this is 
considered.

> CAS-137352-T7F4V1 --- 00192196

This a known limitation and there is a workaround for it.

> CAS-138292-L5S0V0 --- cannot find it yet

There is a workaround for current compiler and this will be fixed in the new 
compiler scheduled to be released around H2 2021 

> CAS-137357-Z7W3B8 --- 00182044

This has been resolved in 6.6.4 version of the compiler.

> CAS-137359-V7G6W6 --- 00118170

This is a limitation of the fromelf tool and is considered a feature request. 
It has not been considered yet.

BR
Bertrand

> 
> BR,
> -- Artem
> 
> -----Original Message-----
> From: Fusa-sig <fusa-sig-bounces@xxxxxxxxxxxxxxxxxxxx> On Behalf Of Stefano 
> Stabellini
> Sent: Tuesday, 17 November, 2020 00:49
> To: Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>
> Cc: fusa-sig@xxxxxxxxxxxxxxxxxxxx; stefanos@xxxxxxxxxx
> Subject: Xen FuSa meeting tomorrow Tue 17 November
> 
> Hi all,
> 
> I would like to remind you that tomorrow it is time for our Xen FuSa SIG 
> meeting. There are a number of outstanding actions, see below. Also, David 
> Ward kindly volunteered to present on the subject of the MISRA Compliance 
> 2020 document, which is extremely relevant as it provides a framework to 
> manage deviations.
> 
> Cheers,
> 
> Stefano
> 
> 
> 
> On Tue, 3 Nov 2020, Stefano Stabellini wrote:
>> Hi all,
>> 
>> These are the minutes of today's FuSa meeting.  Look for "ACTION" in 
>> the test to find the ACTION items.
>> 
>> Cheers,
>> 
>> Stefano
>> 
>> 
>> 
>> # Build Xen with ARMClang
>> 
>> Bertrand: ARM will internally build Xen with ARMClang to validate 
>> ARMClang against Xen. It is going to start in the next couple of months.
>> 
>> Artem: I have opened a bunch of issues against ARMClang. What is the 
>> status?
>> 
>> Bertrand: will check
>> 
>> ACTION(Bertrand): ARM to let us know when issues are going to be fixed 
>> and in which version of the compiler.
>> 
>> ACTION(Artem): send the ARMClang series for Xen again rebased on 
>> staging
>> 
>> 
>> # Resiltech presentation on MISRAC
>> 
>> First identify set of rules we have to comply to MISRAC. A subset of 
>> MISRAC, but which one?  Some rules are mandatory, some others are 
>> advisory?
>> 
>> Who is responsible for deciding which rules are mandatory (R1)? It is 
>> important to have the safety experts involved.
>> 
>> Once we identify the R1 rules, let's use static analysis to check for 
>> violations. For instance SonarCloud.
>> 
>> We need to device who is responsible for fixing the violations, and 
>> what happens when developers say that the solution is worse than the 
>> original code.  There is a need for a final pass by a safety expert 
>> after the developer's analysis. In case the safety expert team 
>> identifies that the justification cannot be accepted the code has to be 
>> fixed.
>> 
>> 
>> We need a tool able to process justifications for MISRAC violations 
>> inline with the code. It is important to maintain MISRAC violation 
>> justifications in sync with the code. Is there a tool that can do that 
>> today?
>> 
>> If the tool doesn't support it, we could add scripting to it, so that 
>> we could extract the justifications from the comments and populate the 
>> tool's database ourselves.
>> 
>> 
>> ACTION(Artem): work with Sonar and see how it handles justifications
>> ACTION(Francesco): do an analysis on the tools and justification 
>> handling
>> 
>> 
>> ACTION(Stefano): MISRAC justifiaction as incode comments, is it viable
>>                 from a community perspective? Start the discussion.
>> ACTION(Stefano): Diagram to describe the new contributor process
>>                 workflow
>> 
>> 
>> MISRAC document to provide a framework to manage deviations 
>> https://urldefense.com/v3/__https://www.misra.org.uk/forum/viewtopic.p
>> hp?f=241&t=1842__;!!GF_29dbcQIUBPA!lHt1TEb2koDpfOmJwNiV5B-0OQc3sCB429nx6W4sPDUdbXiz2C5WGp3Wh-tSKeddKg$
>>  [misra[.]org[.]uk] ACTION(David Ward): do a presentation on the topic 
>> during the next
>>                    FuSa meeting.




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.