[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/2] Introduce functional safety related documents


  • To: <sstabellini@xxxxxxxxxx>, <bertrand.marquis@xxxxxxx>, <michal.orzel@xxxxxxx>, <ayan.kumar.halder@xxxxxxx>, <artem_mygaiev@xxxxxxxx>, <julien@xxxxxxx>
  • From: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
  • Date: Wed, 31 Jul 2024 17:36:12 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=j+ffrGBbLcJc5IQXajyY7EObPHfcG5RNWDF6/K1mPvA=; b=JwbRGLJxTpOIFSZX6VzPd0XFgE33Vv+sQ5q3K0Bcn5VUW45toO/Lm9KG2FgN+dJNrwlHW7E8JhtV+KUFryblovEHJtFVUkL17I1cxzncuE5YFgeGguhlSts1oc5gkzr16ZFoeN4Ah0D/msMmCS8ePmllo8qJdf6xQLli/D4rK4C0VVHcrmGH7rsBX+oCSmM/TeZsAIEgt+Uj6kkjrDjxUDhXvI6/OxAIWRA05/h120o6esLpYwGMR23IYVW8mbCP6vZpSUeOP2mesOZtFzEDoQSbB+ekDXMOmF59HKCRyvZSF//4N5aGmPK8PZTswsEvi+hUQc139h/CMIrxSRRXAw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=sCtj+J6IUh7krBJtSCQ4LNE50Bmk3wEAiJw0fyVSYH+bG24beJu4K9Up5qAoe/10IgDfV2wM/H+L9hj0IYH0wPb3nOf/s7N6ktIL0puGwiMnPTL9Vx38872NvzCGb6cm25o+64QgpN2KmSrpWCANqy+ue8OTEcYk1hf2ZGIkiO084mIfV0eclVbmu9JXGnYhxE3z+mZb5QlgxymfPAlCWFPjsHEogOmXYhS0mFiiQrUTTYFbjLTwSDpfROuPuXB41OXIq2v05/BPOsk7j3MKPNGwERPZWxkKe5N3TcBGkJbNi+ms7aUy1wzKNLFS5d7ZowLHnDA6gFwlwvLBZXvGpA==
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 31 Jul 2024 16:36:44 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi,

In the Xen summit, we presented an update on Xen Functional Safety. For
details, please refer to 
https://youtu.be/eFRTHSGDMfQ?si=sYOdYfDI7qsgkcjE  ("Xen Functional
Safety - an Update - Ayan Kumar Halder & Michal Orzel, AMD")
 
We wish to start with upstreaming the requirements.

This patches illustrate how we are writing the requirements and provides
some examples.
The support level is experimental and it will be maintained on a best
effort basis.

Ayan Kumar Halder (2):
  docs: Introduce Fusa Requirement and define maintainers
  docs: fusa : reqs: Added a sample of requirements [DO_NOT_MERGE]

 MAINTAINERS                                   |   9 +
 docs/fusa/reqs/README.md                      |  75 ++++++
 .../reqs/design_reqs/arm64/emulated_uart.rst  | 240 ++++++++++++++++++
 .../reqs/design_reqs/arm64/generic_timer.rst  | 146 +++++++++++
 docs/fusa/reqs/design_reqs/xen_version.rst    | 207 +++++++++++++++
 docs/fusa/reqs/market_reqs/reqs.rst           |  77 ++++++
 docs/fusa/reqs/product_reqs/reqs.rst          |  64 +++++
 7 files changed, 818 insertions(+)
 create mode 100644 docs/fusa/reqs/README.md
 create mode 100644 docs/fusa/reqs/design_reqs/arm64/emulated_uart.rst
 create mode 100644 docs/fusa/reqs/design_reqs/arm64/generic_timer.rst
 create mode 100644 docs/fusa/reqs/design_reqs/xen_version.rst
 create mode 100644 docs/fusa/reqs/market_reqs/reqs.rst
 create mode 100644 docs/fusa/reqs/product_reqs/reqs.rst

-- 
2.25.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.