[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Listing the tools required for Xen development/testing on x86 and Arm by the community


  • To: Ayan Kumar Halder <ayankuma@xxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Fri, 2 Jun 2023 17:24:52 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=u3LajGo4297Okn1KZW3Rkwic+1OYWJqKC/Qozm2dkes=; b=SsYVGKv5Zfp7aU7qH42Va7eHPTw0qv3s+ta1S52X7kqUPCcxY4yAaSQjFenO5qwggrG39sU5XNyCdQNe9X+SLONfipO5yuGIKn6eWszKHfyvStVcizK94uZFXNDDisU9s9IUVIkxSeA11qB64sgdMxse5RMS5ABp89xL/hK6sowv2BO7x+bOm4WU1+mQwx1QBHRctIpCBjsKs8RaszRqRRmtvgxkJp+4GGDjIbzxkbNA+8AR1uCXPfdQcQ2ko/cuQG3e8jTvuEvWM4E31U1s7PS0K4nwuhIntT1rmQpgF4jKY23m0yd6OGHshhj5g5hT4x+w2Fp9l4jdO5nFVN9O5Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h39MhCGAGYMAGXpcWVOS55J2q1fmx1OG3gEYzPTmRmZTBGmlQlv133e2knTjB1XjCx3vgwV0Jf0xZTGN8tLQQjZWLkyPwKiLxCg7r+nVfPLTmEDTvrlT431VIULrVQ6FiQuBB5U0mv6/Xl/z2VwWz7rmd6FNV0X1nplLlHmLYT0eyMa130C4mLYTn84EYLLRAwAAsbHFG0JGIUyeqpz6jKy0MtyBrfrz1f0WoZfEAxcwaVsX7amktjQT2xy2ieVatzAW+Txgz34S7y3hU8ecn+OwwsAT1FrbThXutRYimM0bkJSbuLJBZ6q2nH79s0h1d6ZLUjnTCQYiHCsRNKOxgw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: "jbeulich@xxxxxxxx" <jbeulich@xxxxxxxx>, andrew.cooper3@xxxxxxxxxx, christopher.w.clark@xxxxxxxxx, nathan.studer@xxxxxxxxxxxxxxx, Stewart Hildebrand <stewart@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, "Volodymyr_Babchuk@xxxxxxxx" <Volodymyr_Babchuk@xxxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>, Doug Goldstein <cardoe@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, dfaggioli@xxxxxxxx, elena.ufimtseva@xxxxxxxxxx, anthony.perard@xxxxxxxxxx, george.dunlap@xxxxxxxxxx, rosbrookn@xxxxxxxxx, lukasz@xxxxxxxxxxx, dpsmith@xxxxxxxxxxxxxxxxxxxx, mateusz.mowka@xxxxxxxxx, kevin.tian@xxxxxxxxx, jun.nakajima@xxxxxxxxx, paul@xxxxxxx, Wei Liu <wl@xxxxxxx>, konrad.wilk@xxxxxxxxxx, ross.lagerwall@xxxxxxxxxx, samuel.thibault@xxxxxxxxxxxx, christian.lindig@xxxxxxxxxx, mengxu@xxxxxxxxxxxxx, tamas@xxxxxxxxxxxxx, aisaila@xxxxxxxxxxxxxxx, ppircalabu@xxxxxxxxxxxxxxx, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Stabellini, Stefano" <stefano.stabellini@xxxxxxx>, "Garhwal, Vikram" <vikram.garhwal@xxxxxxx>, Xenia.Ragiadakou@xxxxxxx, Stewart Hildebrand <stewart.hildebrand@xxxxxxx>
  • Delivery-date: Fri, 02 Jun 2023 15:25:31 +0000
  • Ironport-data: A9a23:qMDm4K3P8iFU+Ac4CvbD5cd3kn2cJEfYwER7XKvMYLTBsI5bpz0Oy zQWWjvVPK6CMzDwKI13atvjo0tU65OEm4ViTAFspC1hF35El5HIVI+TRqvS04F+DeWYFR46s J9OAjXkBJppJpMJjk71atANlVEliefTAOK6ULWeUsxIbVcMYD87jh5+kPIOjIdtgNyoayuAo tq3qMDEULOf82cc3lk8teTb8HuDgNyo4GlD5gJmP6gQ1LPjvyJ94Kw3dPnZw0TQGuG4LsbiL 87fwbew+H/u/htFIrtJRZ6iLyXm6paLVeS/oiI+t5qK23CulQRrukoPD9IOaF8/ttm8t4sZJ OOhF3CHYVxB0qXkwIzxWvTDes10FfUuFLTveRBTvSEPpqFvnrSFL/hGVSkL0YMkFulfEE5Et tUEERU0bhmZidru3J+rCftSv5F2RCXrFNt3VnBI6xj8VK5jbbWdBqLA6JlfwSs6gd1IEbDGf c0FZDFzbRPGJRpSJlMQD5F4l+Ct7pX9W2QA9BTJ+uxqsy6KlFcZPLvFabI5fvSQQspYhACAr 3/u9GXlGBAKcteYzFJp91r137aQzH+qANh6+LuQ7KM6oHaU2mAvSwwNXGW8p9C5iE2MYocKQ 6AT0m90xUQoz2SiX9D7XAC9qVaNuxJaUN1Ve8U55R+MzOzI4g+fLmkCUjNFLtchsaceRyEsk FmAnNrrBDlmmLyTVX+ZsLyTqFuaISEIKUcSaClCShEKi/H8pKkjgxSJScxseIa2idvvED223 DGOrwA5nbwYicNN3KK+lXjcijexq5yPUg407AzKWn6N4wViIYq0YIru7kLUhd5FJZqUU0KT+ n0DhMuXxOEIEZyJ0ieKRY0lGbyv6OaYGDbdmhhyB5Qn8XKg92PLVYlR+zh/IE5BOMcYdTLnb UnftBkX75hWVFOyda5taIu1As435aLhCdjoWP3SYtdUJJN2cWev7CxoIEKdwW3puEwtir0kf 4eWd962CnQXArghyyC5L88Y0LQrzyR4wnnBSJTTxhGrl7GZYRa9UqsIPlKIaaYi8KqOrQHR8 tBeH8KPx1NUV+iWSjfW8pQaKBYFJGI7Gpnyg8VSeqiIJQ8OMH0oDvbK6a8if4FjkLVYkqHD+ XTVcn9Vzlv2w0fOJgSDZnlgb67HVJNz63k8OEQEMU6z3nk/Ya6m9KoFa4YsZr4j6fBiyvhvC fICfq2oGPNUQC7A/DcbRZb4pY1mMh+sgGqmPSCofTw+dJ5IXBHS95nveQ6H3CIOFCusqcwmo 7C6kBydSp4KXQdKA8PfafbpxFS01VAbkf5yVk2OOcVOdEj22IRtMSr8lOAwOcIXbx7Ew1Oyz BqbHh4CucHWv4IqttXK7YiftJugGeZ6GktcHkHY4KywOC2c+XCsqadCTeKJcDb1RG7yvqK4a o19y+z/OeYVtFZDrJBtF7Vsi7o6j/PFqqVG1A1iEDPuZk6yF7J7CnCc2I9Esagl7qVQuRayH FmO/NZaEbyTPYXuF1t5DCooaP6Sk84dnDb65O4wZk794Udf97OdXUJfFxKFkiBaIf1+N4ZN6 eUuoskN8CSklwEndN2Bi0h8+2qFIXMBVKEmnooHG4KtgQ0uonlPZZHaA2nr7pCKd85BLEACJ SWdj67Pwb9bwyLqTX03EnTc2PtHsr4HshtK0VwqKkyAn5zOgfpf9AZN/Cs+VBgTzhRD3+95I GFtO2V8IKnI9DBt7PWvREipEgBFQRGcpEr4zgJRkHWDFhHzEGvQMGc6JOCBulgD9H5RdSRa+ 7fez3v5VTHtf4f62S5atVNZlsEPhOdZrmXq8P1L1ezcd3XmSVIJWpOTWFc=
  • Ironport-hdrordr: A9a23:Rmq1k6DklaeZiDPlHelW55DYdb4zR+YMi2TDt3oddfWaSKylfq GV7ZAmPHrP4gr5N0tOpTntAse9qBDnhPtICOsqTNSftWDd0QPFEGgL1+DfKlbbak/DH4BmtJ uJc8JFeaDN5VoRt7eH3OFveexQv+Vu88qT9JnjJ28Gd3AMV0n5hT0JcTpyFCdNNW97LKt8Lr WwzOxdqQGtfHwGB/7LfEXsD4D41qT2fIuNW29/OyIa
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Fri, Jun 02, 2023 at 02:46:03PM +0100, Ayan Kumar Halder wrote:
> Hi Roger,
> 
> On 02/06/2023 12:43, Roger Pau Monné wrote:
> > On Fri, Jun 02, 2023 at 09:48:48AM +0100, Ayan Kumar Halder wrote:
> > > Hi Xen developers,
> > > 
> > > We are trying to better document xen project development processes and
> > > related tools. At present, we are targeting **x86 and Arm** only.
> > > 
> > > These tools range from bug/change request tracking means, compilers, 
> > > infra,
> > > editors, code-review tools, etc which is connected in some way to the Xen
> > > development and is being currently used by xen-devel community.
> > What is the end goal of this?
> 
> We are trying to do an initial assesment of the requirements for Xen
> functional safety.
> 
> As a first step, I am trying to make a list tools which are in someways
> related to Xen development/testing/deployment.
> 
> > 
> > I'm kind of unsure why do you care about which editor I use to
> > generate my code, that's up to the developer.
> 
> I agree that editor, email-clients are something that are an individual
> developer's choice.
> 
> However as it is related to Xen development, we want to atleast put down
> some of the commonly used tools.
> 
> At a later state when (and if) we go through the list with a safety
> assessor, we might prune some of these items.

I have very little idea about what's required for a safety assessor,
sorry.

Will this have an impact on what tools are allowed to be used when
working with certain parts of Xen? (the safety certifiable parts I
would assume)

> > 
> > > I appreciate if you can let me know anything I missed or mistaken and the
> > > version currently being used (for some of the tools).
> > > 
> > > 
> > > 1. Code management portal - xenbits (https://xenbits.xenproject.org), 
> > > gitlab
> > > (https://gitlab.com/xen-project/xen)
> > > 
> > > 2. Project description - wiki.xenproject.org
> > > 
> > > 3. Project management - gitlab
> > > 
> > > 4. Code review - text based email clients (mutt, thunderbird), git-email, 
> > > b4
> > > 
> > > 5. Text Editors such as vim, emacs
> > > 
> > > 6. Code review history - xen-devel mail archives
> > > 
> > > 7. Code revision management - git
> > > 
> > > 8. Xen coding language - C89, C99, Kconfig
> > assembly (gas), python, perl, shell, Makefile, bison, flex, ocaml,
> > go...
> > 
> > Likely more that I've missed.
> Ack
> > 
> > > 9. Testing tools for Arm64 in gitlab CI
> > > 
> > > compiler - gcc-9.3.0 (Alpine 3.12)) (most commonly used version)
> > > 
> > > binutils - GNU Binutils for Debian) 2.38.9
> > > 
> > > emulator/hw - qemu-system-aarch64-6.0.0, qemuarm64 6.2.0 (From yocto, poky
> > > disto - 4.0.5), zcu102 (**need the uboot, TF-A versions **)
> > > 
> > > dom0/domU kernel - kernel-5.19.0
> > > 
> > > rootfs - alpine-3.12-arm64-rootfs
> > > 
> > > firmware - U-Boot 2022.10
> > > 
> > > 10. Testing tools for Arm in gitlab CI
> > > 
> > > compiler - arm-poky-linux-gnueabi-gcc (GCC) 11.3.0, 
> > > arm-linux-gnueabihf-gcc
> > > (Debian 12.2.0-14) 12.2.0 (most commonly used versions)
> > > 
> > > emulator/hw - qemu-system-arm 6.2.0 (From yocto, poky disto - 4.0.5)
> > > 
> > > dom0/domU kernel - kernel-5.15.72 (from Yocto), Kernel-5.10.0-22 (from
> > > Debian)
> > > 
> > > rootfs - alpine-minirootfs-3.15.1-armhf.tar.gz
> > > 
> > > firmware - U-Boot 2022.10
> > > 
> > > 11. Testing tools for x86
> > > 
> > > compiler - gcc-9.3.0 (Alpine Linux 9.3.0), gcc (Debian 12.2.0-14) 12.2.0,
> > > clang (from Debian) (most commonly used version)
> > > 
> > > binutils - GNU ld (GNU Binutils for Debian) 2.40)
> > > 
> > > emulator/hardware - Qubes HW (**need details regarding machine, firmware,
> > > etc**) , qemu 6.2.0 (From yocto, poky distro - 4.0.5)
> > > 
> > > dom0/domU kernel - kernel 6.1.19
> > > 
> > > rootfs - alpine-3.12-rootfs
> > > 
> > > firmware - BIOS Dasharo (coreboot+UEFI) v1.1.1 02/22/2023 , EFI v2.70 by 
> > > EDK
> > > II , SMBIOS 3.3.0 , SeaBIOS (version rel-1.16.2-0-gea1b7a0-Xen), GRUB
> > > 2.06~rc1
> > I do use an LLVM based toolstack, so that's usually latest LLVM import
> > on FreeBSD.  We do also test this on the cirrus-ci, see:
> > 
> > https://github.com/royger/xen/runs/5334480206
> 
> Thanks, this is interesting info.
> 
> For the moment, I am ignoring the downstream forks of Xen.

That's not a fork of Xen, just plain Xen hosted on my personal github
repo.

> I am only considering the tools used by the upstream Xen and the associated
> CI/CD.

Gitlab CI does test with LLVM toolchain also.

osstest does test FreeBSD guests, but no FreeBSD dom0.

> > 
> > I_n any case I think the scope to some of the questions is unknown,
> > it's not feasible to expect to list every possible combination of
> > Linux versions vs Xen version vs whatever guests versions a given
> > developer might be running.
> 
> I agree . That is the reason I am picking up the compiler, linux, binutils,
> firmware, etc versions from our gitlab CI.
> 
> It also acts as a proof that we are testing Xen against a known set of
> compiler, linux versions, etc.

OK, so the question is not what every developers uses, but you trying
to narrow down the scope to a specific environment?

Maybe what you want to do is create a specific container in the Gitlab
CI that has the specific tools versions you care about from a safety
certify angle.

Regards, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.