[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Minutes of the Xen FuSa Meeting Sep 22


  • To: <fusa-sig@xxxxxxxxxxxxxxxxxxxx>
  • From: Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>
  • Date: Wed, 22 Sep 2021 09:22:15 -0700
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com; dkim=none (message not signed); arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/8c5+vz3PUGh+cVTbIZqT1kACf+zvy4rvOd5i3ZNjbk=; b=XbruukGR7pMb58ZhXiz1mV7f5bnBxbd/TuW0h45hvZE6Cu7XRy9HV4L6ScPIZ5YDx4LScKNJUOnn0p2bjWiCD92srKaeA8TwUtz0dXaiYw9HCIzS9JcMO3YEYv5bgFGYPvCQX3b2l/DLSkTgtpXjd9Vs4GaBEzDS/so6uTYw1hB6AFTZkwP1uFkYM+6wgHpIv3cXHud84TLwMA9XX2SvNzQBcQVOYOthNn1qZhypK3cVXW8MwBfOnm4rl7jQlniLtahUJVipUWPPXbUBAdIsDjVDzI2Lr8DW0Q8beDXlNXRZbUY6dsdcbANbvhJr4DBQV/H+vcJPFIY09yuTNfdRsg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c5di+8be3CRYdhAGaGq2huQ97DSgD+XqDpwIdbrLhd8RGnFPYeRnQlJd6yPd4wW6vSSc/gPKbZ9KSQXi+++eSz0cmGFBZmYnT8fqgBJENaN2YuT3TiXro+RRJtF21isupHHkBCjc81oGgOc7R2nAKT8OtdjejJ9rJOeggk0vHEun1cMJ6rZKNBl5qmBAbMErrYpevfLU12Gm6QS4civEFFvW6ulkOKvu3pl8hkCbyPECczFyGbuyitqXLjMzYQCyUOpMj4wjBZW8qI+0rS10tDU3nEHlpXBOIau1D4UYhS4NyxkcvP40H469OI1vJJvDfg44SVuXLfv4GiTBk/M1iA==
  • Cc: <stefanos@xxxxxxxxxx>
  • Delivery-date: Wed, 22 Sep 2021 16:22:22 +0000
  • List-id: This is a discussion list for members of the Xen Project FuSa SIG <fusa-sig.lists.xenproject.org>

Hi all,

These are the minutes from today's Xen FuSa meeting.


Bertrand made progress in his investigation on whether Coverity results
can be shared with the community. He should be able to have answers
soon.


We discussed how to best approach MISRA-C violations. The main idea is
to start by using cppcheck as it is open source and freely available to
everybody. Bertrand took the action of adding a "make cppcheck" target
for xen similar to "make cloc" to make it easier for contributors and
maintainers to use cppcheck to check for Xen violations.


We went through the list of Mandatory rules that we selected for Xen.
Among them, only two have violations: 13.6 and 21.18. As 13.6 is checked
by cppcheck we identified it as the first rule to address. All other
Mandatory rules already have no violations.

The second rule we identified is a Required rule: 1.3.

Artem and Stefano took the action of looking into 1.3 and 13.6. Artem,
any preference on which one you'd like to address between the two?


Cheers,

Stefano



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.