[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: ARM64 notes: Re: [PATCH] CI: Extend eclair-*-allcode to enable as much as possible


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 6 Jan 2026 07:33:41 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=citrix.com smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MRSbXfzzqUvu/4SAewuKbw/DWnOhJZsViMucTaOIFno=; b=UEeOMPZgq6KdXrBsfSRFj8qQK+Vkk08OVaXmy9rMvcCxTMHlczIqnrqtVfGTxDlW/XD1r2CenixldMLdvi/wGMFdZAUTOJzqUnwuGkZT9AZ1mqumaufFJ+faBW9JWo9/quWLVMvCKylukfmMh8P9HFHa/NPiODddBxttJgu2dAfzrFV14HVrkT6DuobaEOyUHCLmlG0079Ick50qx/6BXfhgq/ubrSbw0BavqG9uDgPH+z3wfYtq1l4Niwo5rx/5ZsyRzTJivOojiqaHiubzloNXIQ+d29HnmwmjvZYPM5cCC8XCdNePTfjCNuoBhbOJk4JpOV9BzIg/wqJtVeeuyg==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MRSbXfzzqUvu/4SAewuKbw/DWnOhJZsViMucTaOIFno=; b=rvLMZCGVHJuwtJXDn3ekqVDsttYIaDJshfrKORRfYgDkObwO+lm0afAyRw5+jx5TW8JETioS9IrHngyf4TzHjmrPM5uN7FWyymRZTzg9fS2ydj1Y1oZnd22r9+Bq2HXywYlA34vnT2uA2YlbYiN2ZaiekABfX9JQI3ADXlDyBUcLki6SqJlHCQX+01FK6svFUioy5k+v+h7b7vO/MXl0GkxMKkH9URrC3K/T/IEpmaqE2EqbJr/CFAjg06hTe/UgV5sT/8Kkh8HtDIthmCcDP5zH9ATFAohaMerDpI/qnPKxaKxhwRQx+roBoblpGgE/WrzH6inH4BlJNZdipzm2Vg==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=M4ldH6Ir/tZkp/7UNQD7JCsDJqbldxrySSwaUyqPr40fFcufKWmt4YpnAQQvQskBqPyFLuRIuH+/Jp1SSRZLEbOJ3ZBVuBwhb05wT+4bU5P8SFnjG5pUHfC+Z9aPabUhdbN36LIH55e7JIzobiRSky7OdpUwZcnBT5hS256h8sInqBY8bsyF/ajxVh7uR8ZI65j55UjJLa/7n3uWQrAqU5hyczLc+eZ5ywNatARlX/vJlU+6L9brlnF+zQv+60PrfIAtmOIJgnEI5ml4p2vy9J/FQ7VEKYAZM3UIG9AF4DXK+0rBDcvhtEmj6+jic7qcONCJBVw3nFmtMbmkStahiA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dg5eolmfG7RTjZ1gW5ysfJ3ukRZjSP+/RsCRgBXtGv0WRFr8sZLPwplWuXBV4pmqGAvMA+YWlJxkklUfftBzd6sw5ov9qT1SNFQOxrmTaVYQu+AQhdUfIbQh7q4O1AYaYgktvtiBTjtm4Ra5tR4WEwWMPiH7K5Dbl1hfq8tb3MUwJZbLR6qmP+OtuqWoiGvq407cDagdybI+1zEN5Nsh+1C4+atCzu2RQaPOpsxQkrnjRzCdTzcShkr0Ygsg+xE26C3cIQxMqs3Sri9Z5MWpO9n7l8GMkbb2eDA8rjcqoWXyTZn9U46rvvdZ9NNhP4feCv6h1fMFxHhBYe1G3k9rAQ==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "consulting @ bugseng . com" <consulting@xxxxxxxxxxx>, Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>
  • Delivery-date: Tue, 06 Jan 2026 07:35:09 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Thread-index: AQHcfj5G7fNp7PSkb0GiHPxZx0yorLVD4eGAgADfJYA=
  • Thread-topic: ARM64 notes: Re: [PATCH] CI: Extend eclair-*-allcode to enable as much as possible

Hi Andrew,

> On 5 Jan 2026, at 19:14, Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
> 
> On 05/01/2026 12:24 pm, Andrew Cooper wrote:
>> eclair-x86_64-testing:
>> @@ -104,6 +122,33 @@ eclair-ARM64-allcode:
>>     LOGFILE: "eclair-ARM64.log"
>>     VARIANT: "ARM64"
>>     RULESET: "monitored"
>> +    EXTRA_XEN_CONFIG: |
>> +      CONFIG_ACPI=y
>> +      CONFIG_ARGO=y
>> +      CONFIG_ARM64_SVE=y
>> +      CONFIG_ARM_SMMU_V3=y
>> +      CONFIG_BOOT_TIME_CPUPOOLS=y
>> +      CONFIG_DEBUG_LOCK_PROFILE=y
>> +      CONFIG_DEBUG_TRACE=y
>> +      CONFIG_DEVICE_TREE_DEBUG=y
>> +      CONFIG_EFI_SET_VIRTUAL_ADDRESS_MAP=y
>> +      CONFIG_EXPERT=y
>> +      CONFIG_FFA=y
>> +      CONFIG_FFA_VM_TO_VM=y
>> +      CONFIG_GICV3_ESPI=y
>> +      CONFIG_HAS_ITS=y
>> +      CONFIG_IOREQ_SERVER=y
>> +      CONFIG_IPMMU_VMSA=y
>> +      CONFIG_LIVEPATCH=y
>> +      CONFIG_LLC_COLORING=y
>> +      CONFIG_OPTEE=y
>> +      CONFIG_OVERLAY_DTB=y
>> +      CONFIG_PCI_PASSTHROUGH=y
>> +      CONFIG_PERF_ARRAYS=y
>> +      CONFIG_PERF_COUNTERS=y
>> +      CONFIG_STACK_PROTECTOR=y
>> +      CONFIG_UNSUPPORTED=y
>> +      CONFIG_VM_EVENT=y
>>   allow_failure: true
> 
> https://gitlab.com/xen-project/hardware/xen-staging/-/jobs/12604499722
> shows 122 failures in otherwise-clean guidelines.  Some observations:
> 
> llc-colouring.c uses binary literals.  These are safe to use now since
> 4.21 with the updated toolchain baseline, but the Eclair config wants
> updating to allow this language extension.
> 
> ipmmu-vmsa.c has a git:// url inside a block comment, which is
> considered to be a Rule 3.1 violation.  In principle this ought to fix it:
> 
> diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl 
> b/automation/eclair_analysis/ECLAIR/deviations.ecl
> index 7dee4a488d45..8f5fc6c93bc5 100644
> --- a/automation/eclair_analysis/ECLAIR/deviations.ecl
> +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl
> @@ -60,7 +60,7 @@ removed by the compiler, the resulting slowdown is 
> negligible."
>  
>  -doc_begin="Comments starting with '/*' and containing hyperlinks are safe as
>  they are not instances of commented-out code."
> --config=MC3A2.R3.1,reports+={safe, "first_area(text(^.*https?://.*$))"}
> +-config=MC3A2.R3.1,reports+={safe, "first_area(text(^.*(https?|git)://.*$))"}
>  -doc_end
>  
>  #
> 
> 
> but I've not tried it yet.
> 
> There's a R8.4 violation against __stack_chk_guard.  I think this wants
> deviating locally, because it's a fairly magic construct.
> 
> Other than that, there's a smattering of violations.  Some will be fixed
> by some work I've got pending for the x86 side of things, but most are
> specific to arch/arm/.
> 

They are quite a lot of violations coming from ffa.
I have a pending serie on FF-A waiting to be reviewed/committed.
I can push something to fix the findings after it, if that is ok for you ?

I will retrigger the CI from the branch corresponding to my serie and work
from there.

In any case, very good thing to activate all those and check with the CI, 
thanks a lot :-)

Cheers
Bertrand

> ~Andrew




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.