[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 0/2] Final series to make Arm MISRA allcode green


  • To: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: "Orzel, Michal" <michal.orzel@xxxxxxx>
  • Date: Wed, 8 Apr 2026 12:36:47 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=bugseng.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nNCZYlDWBDu0COOSKEhXAsSATFn51a5xyrmKkW3ks3E=; b=nsuAVbeBkLLP9CXkLc0RxclqVC6xwrQVptcxLVCidaQdPtDabl9v6VcMo53iY/WKqA7Rcb6Cw9RpbkRgcyzdGF5tziDyMk+vBt39vkPeXXIR32L8DPxvqNNE6RFLO2Bku5+gzo06fatB7N2pL9gw4+EId0+74grjeGMA5oByaTjzaqk/wvfg75gGgCPJGt9NNHpK1vt+i7yd1V8olD32qRrmKIIT/rZBawItyQ0GACaJ/pUn32qAmd4QTCNF6qCG4nVTPtRH6Z6PKl5MhY1xo9FticiBinGHGckEXHwWctQUJ0qrmMaQstdMkSujQML30IFERKsMRvnWPUkjZ3Y74g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=swgpgUlG/Uc+psqIfiGtQukP/Gby+Ui9t6/X8Wabz26cF5TCKIcOXMpjD2525gb4bo6ftrE0RY8nz9TbUaVvpktdTMe5/+0/ycOe6d98D2JvQ616So+Pzmf7d+EZDT9xgWHgHp90ib9VaW8o8yH6SxIEOIcqkSVX7NG6IeDZBaQnXPVIuRwbrAQGPDaHK9/FKJiLolH53wNTd80e+dFQzPNKI8tkCWLeXQXazPUFoY0dPjE+dgwSiqGOnS/DeOoHkiFiRMIvqs1SxN9LuYhoEvvNnN65PuupdwkQc1T09V5X9GoCTUTVvhevMQEyfOuYWTuqwGOv8kSt/zcoPthWUg==
  • Authentication-results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=amd.com header.i="@amd.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Wed, 08 Apr 2026 10:40:15 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 08/04/2026 12:21, Nicola Vetrini wrote:
> On 2026-04-08 11:51, Andrew Cooper wrote:
>> On 08/04/2026 10:46 am, Nicola Vetrini wrote:
>>> On 2026-04-08 11:22, Andrew Cooper wrote:
>>>> On 07/04/2026 11:34 am, Michal Orzel wrote:
>>>>> No more regressions for clean guidelines:
>>>>> https://gitlab.com/xen-project/people/morzel/xen/-/pipelines/2433943072
>>>>>
>>>>> Michal Orzel (2):
>>>>>   iommu/arm: smmu: Fix variable shadowing
>>>>>   iommu/arm: ipmmu-vmsa: Fix variable shadowing
>>>>>
>>>>>  xen/drivers/passthrough/arm/ipmmu-vmsa.c | 6 ++----
>>>>>  xen/drivers/passthrough/arm/smmu.c       | 7 +++----
>>>>>  2 files changed, 5 insertions(+), 8 deletions(-)
>>>>
>>>> If all the violations are fixed, should this test be made blocking?
>>>>
>>>> ~Andrew
>>>
>>> Only if they are also clean on x86; otherwise an arm-specific list of
>>> clean rules should be made (probably better). @Michal what do you 
>>> prefer?
>>>
>>
>> All I'm suggesting is this:
>>
>> xen.git/xen$ git diff
>> diff --git a/automation/gitlab-ci/analyze.yaml 
>> b/automation/gitlab-ci/analyze.yaml
>> index 4e9af9d60224..f01798c5dee6 100644
>> --- a/automation/gitlab-ci/analyze.yaml
>> +++ b/automation/gitlab-ci/analyze.yaml
>> @@ -149,7 +149,7 @@ eclair-ARM64-allcode:
>>        CONFIG_STACK_PROTECTOR=y
>>        CONFIG_UNSUPPORTED=y
>>        CONFIG_VM_EVENT=y
>> -  allow_failure: true
>> +  allow_failure: false
>>  
>>  eclair-ARM64-testing:
>>    extends: eclair-ARM64-allcode
>>
>>
>> so regressions become blocking.
>>
>> ~Andrew
> 
> Ah, yes, indeed. I didn't look at the patches but given the diff it 
> makes sense
In general that's a good idea and something I had in mind. That said, we will
likely be expanding the list of enabled features there as soon as one arrives.
What should we do in that case? Make sure that before adding new =y option, the
allcode passes in our Xen fork?

~Michal




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.