[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 0/2] Final series to make Arm MISRA allcode green


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • From: "Orzel, Michal" <michal.orzel@xxxxxxx>
  • Date: Wed, 8 Apr 2026 13:01:06 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=citrix.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y9/oM4e5REMMaLpgogGrdx+1RpVuC9eOrJ43E8qEBiI=; b=ai8jL7YzhP8t/uS5zJ09kORAgV+xfBVhnmp6WtrK8R5j/D1VFNFxvGyYpTBMCGuVKkcskELkR4yxqvgqf/2IGqj1mCpSygvkr5WmpAX5mxqXZuuls4toetYagbT4qKOTlFMO7UZ/ygRLR3gKZD1hEAlw62YjdyC08fcwMoXLVwTASl8BeqRgJcja9Lt9CkC2PXGdqOzv8GbqyD3okRuInaDN7oD9Y12i0YfRmmj4AfghQLWUtvFwGbWoumrbiLTwsgERzF38lfu+MIj04qlU1F3+25OhnKzksgO/fWMSN8mSXSsrkWL6bvn07oxmedW87/aFkUBCZ31MgXeQubUKTw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UYly3IxmaPq8L3hw/d+Y0HcVX87rEq0tTfXQeO/zh5hKzH+NlQbMuZV/+MlMzYWqh7+9VWuGKhh1WGdalhKmc1GaDFK8sbhMXk+v+dFqwvjf4Imq4JSuoYZXl3yAfk9DizejwaeMqHSluRfzF6TZ06vD19dW3nnTgD+4xInEAZaaO8g/tpBvH1b/Salk4QyJw9p351eGNGLf7pNjKODbb5DZs73WKhesNB+AUI/v2JsGz2bA9Psbt3tE2gwlqSCoe8S/n9y8ksBuhROl1+TFmP+48eowTAD527lW7PsaWCjQk9vxwPPAvS+F7yvG7OEuJTAa0q17fKc+69RzQaejLw==
  • Authentication-results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=amd.com header.i="@amd.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, "Rahul Singh" <rahul.singh@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Wed, 08 Apr 2026 11:01:33 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 08/04/2026 12:42, Andrew Cooper wrote:
> On 08/04/2026 11:36 am, Orzel, Michal wrote:
>>
>> On 08/04/2026 12:21, Nicola Vetrini wrote:
>>> On 2026-04-08 11:51, Andrew Cooper wrote:
>>>> On 08/04/2026 10:46 am, Nicola Vetrini wrote:
>>>>> On 2026-04-08 11:22, Andrew Cooper wrote:
>>>>>> On 07/04/2026 11:34 am, Michal Orzel wrote:
>>>>>>> No more regressions for clean guidelines:
>>>>>>> https://gitlab.com/xen-project/people/morzel/xen/-/pipelines/2433943072
>>>>>>>
>>>>>>> Michal Orzel (2):
>>>>>>>   iommu/arm: smmu: Fix variable shadowing
>>>>>>>   iommu/arm: ipmmu-vmsa: Fix variable shadowing
>>>>>>>
>>>>>>>  xen/drivers/passthrough/arm/ipmmu-vmsa.c | 6 ++----
>>>>>>>  xen/drivers/passthrough/arm/smmu.c       | 7 +++----
>>>>>>>  2 files changed, 5 insertions(+), 8 deletions(-)
>>>>>> If all the violations are fixed, should this test be made blocking?
>>>>>>
>>>>>> ~Andrew
>>>>> Only if they are also clean on x86; otherwise an arm-specific list of
>>>>> clean rules should be made (probably better). @Michal what do you 
>>>>> prefer?
>>>>>
>>>> All I'm suggesting is this:
>>>>
>>>> xen.git/xen$ git diff
>>>> diff --git a/automation/gitlab-ci/analyze.yaml 
>>>> b/automation/gitlab-ci/analyze.yaml
>>>> index 4e9af9d60224..f01798c5dee6 100644
>>>> --- a/automation/gitlab-ci/analyze.yaml
>>>> +++ b/automation/gitlab-ci/analyze.yaml
>>>> @@ -149,7 +149,7 @@ eclair-ARM64-allcode:
>>>>        CONFIG_STACK_PROTECTOR=y
>>>>        CONFIG_UNSUPPORTED=y
>>>>        CONFIG_VM_EVENT=y
>>>> -  allow_failure: true
>>>> +  allow_failure: false
>>>>  
>>>>  eclair-ARM64-testing:
>>>>    extends: eclair-ARM64-allcode
>>>>
>>>>
>>>> so regressions become blocking.
>>>>
>>>> ~Andrew
>>> Ah, yes, indeed. I didn't look at the patches but given the diff it 
>>> makes sense
>> In general that's a good idea and something I had in mind. That said, we will
>> likely be expanding the list of enabled features there as soon as one 
>> arrives.
>> What should we do in that case? Make sure that before adding new =y option, 
>> the
>> allcode passes in our Xen fork?
> 
> New code could be clean as it goes in.  At this point, it's not
> interestingly different from "does it compile" as a prerequisite.
I can see there are some missing features like static memory/shared memory but
they are tested as part of AMD (it would still be good to have all listed in
allcode). Additionally, we could enable early printk with some dummy values to
cover early_printk.c

~Michal




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.