[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v3 0/3] Introduce functional safety related documents


  • To: <sstabellini@xxxxxxxxxx>, <bertrand.marquis@xxxxxxx>, <michal.orzel@xxxxxxx>, <ayan.kumar.halder@xxxxxxx>, <artem_mygaiev@xxxxxxxx>, <julien@xxxxxxx>
  • From: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
  • Date: Tue, 6 Aug 2024 17:31:54 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0bb26WuaFZVbtVLb9SlV+3buAosHUSgsuXTVaggE8UA=; b=hcbFO3Ap5ZEUKvvAPK5R3f0ITL5E3ufjBL8oeaE67/WWfEA7A8GuiRmStr96Be40fxloHahgNZHcfkuSTLexjHVmN3ZNb7yMyAHm3TvRD8dmCW+W+mmS+IiUG3DpVg/L/L4m0EtZHUb9CAotVxFRdzVtEc4yxB2xNQ7Jn8mPfz6m93ijYGj2cDkV2MRxK6VZE2FGp5aHbkZ6CFVdGa65U65Q9xaBYtTkqZRrWYgjx2wQQZm6XThaudFzQ8xpbiHebIt+UHa/TYR0Rfolsy27clQI0jnE2ehFmeHv7YFzlLe5kvu+4n5vrBTY0iZcZzDdTtbcQIP797k3/WxhnDf5PQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=aBLB6b4mFhC5Mz+4dGlup34y0QoZVckgukzX9+lUxe9sfPNrA7IB6rf9jeFS8ok5wt16n0anw3SaBmtqwyyk0yx9/M9mhKbdw78IGq8ho67VxCuN0BtXp3wS8FCTeuLSMG7hPS7Daae9rVl2lONwCjZpwseYfVXU5/3V6tJhohG7OXPMzppvk5hT40B8A1LIABIVpAVXFL7yB5+kH2APTG5IVindY0uI5q5gnqZrdpXejSbFtWX2rXCw5dAj59oLcN6eASD9XYWWBhW1c+KeMRn6XbR7auU5W996m72bRlgZKY7DVhlXPHtaL3xw6dXnM4pTeOqtIKhH2vBryDKZ8g==
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 06 Aug 2024 16:32:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi,

In the Xen summit, we presented an update on Xen Functional Safety. For
details, please refer to 
https://youtu.be/eFRTHSGDMfQ?si=sYOdYfDI7qsgkcjE  ("Xen Functional
Safety - an Update - Ayan Kumar Halder & Michal Orzel, AMD")
 
We wish to start with upstreaming the requirements.

This patches illustrate how we are writing the requirements and provides
some examples.
The support level is experimental and it will be maintained on a best
effort basis.

Changes from v1 :-
1. Added "docs: fusa: reqs: Added a requirements writing style guide" in this
patch serie.

v2 :-
1. Reordered patches 2 and 3.
2. Changes mentioned in individual files.


Ayan Kumar Halder (3):
  docs: Introduce Fusa Requirement and define maintainers
  docs: fusa: reqs: Added a requirements writing style guide
  docs: fusa : reqs: Added a sample of requirements [DO_NOT_MERGE]

 MAINTAINERS                                   |   9 +
 docs/fusa/index.rst                           |   9 +
 docs/fusa/reqs/REQUIREMENTS-STYLE             |  34 +++
 .../reqs/design-reqs/arm64/emulated-uart.rst  | 240 ++++++++++++++++++
 .../reqs/design-reqs/arm64/generic-timer.rst  | 146 +++++++++++
 docs/fusa/reqs/design-reqs/xen-version.rst    | 207 +++++++++++++++
 docs/fusa/reqs/index.rst                      |   9 +
 docs/fusa/reqs/intro.rst                      |  86 +++++++
 docs/fusa/reqs/market-reqs/reqs.rst           |  77 ++++++
 docs/fusa/reqs/product-reqs/reqs.rst          |  64 +++++
 10 files changed, 881 insertions(+)
 create mode 100644 docs/fusa/index.rst
 create mode 100644 docs/fusa/reqs/REQUIREMENTS-STYLE
 create mode 100644 docs/fusa/reqs/design-reqs/arm64/emulated-uart.rst
 create mode 100644 docs/fusa/reqs/design-reqs/arm64/generic-timer.rst
 create mode 100644 docs/fusa/reqs/design-reqs/xen-version.rst
 create mode 100644 docs/fusa/reqs/index.rst
 create mode 100644 docs/fusa/reqs/intro.rst
 create mode 100644 docs/fusa/reqs/market-reqs/reqs.rst
 create mode 100644 docs/fusa/reqs/product-reqs/reqs.rst

-- 
2.25.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.