[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: ARM64 notes: Re: [PATCH] CI: Extend eclair-*-allcode to enable as much as possible


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 6 Jan 2026 07:37:50 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=citrix.com smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6Dwqc33X5Dlp7xZffu3FfBk8YWW4XA667tnXi8LDJnY=; b=pTnavakCzvR7qzJDIa39A1UPoPQ8mqMDie1s63V3qt6CtXQtMF+HktI9vivdOTmccyAXhzlpB3Sexjopz6qMNUH8D2fYCmDh+p9pzX30U8CZ1dISxZMgLZbQ81bQAp4bo8R+MvB5n/rTjOWAUv6yg0IJZpb5QRbAJtqTVustrZeKtN4sgwXeTIoS8sFFhufRXLkFboMKozJ0PDIas+h17Fu5FPPcVceoXAZXdJFmoHUS5OpKgUul78dJCNjkoiyXwLkMAcnBDMFWI4KMsOCu/0gZEpWVjezADgs6P9xc4NjUY+qjQ5dJbpyLKnD1Eg+dnwuD1h+18pOP1YC3TANH/g==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6Dwqc33X5Dlp7xZffu3FfBk8YWW4XA667tnXi8LDJnY=; b=M7o8DaZHAmRDGA5EAJZl8ObgwA8++qOPmBchYSXd7RjZbdNGCogZbaU3/Wt6s3/uWxx5wKzk5lPMHG36jn1WzPBXDR9ZDzwUSMhJnKHa1WybtT4d+wHMFJQend22948g6iiJzEgJGPe3nWfPr8FpTvm6kmGiwYOJZCuN2AqKFqLfgBMPUgHEhZiTk+q01kmxrRORb9/j0KXJcbecNR/b9cyO/9x7gw/hO/yQVZiJdUBfLY1IONgsvPqlsTlG77hGlYe0IW//CZreOGXC9ezuTjNKMCojH0NbXf7erDkYjAdLa/tAIyG8WjBbTVfP/U5rWlmsLz9Al4XFFAQ6CDEn+w==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=jmAHBBahRZ8OO+SRYTTItkLTdqqKdQS4fdSXVYZglsO/tY4mTGF3hmSmnJnAX5oGnLtkw5JhqMff+vX0gI/4D4G117z6PiWp94hQsvEplKBt9vWapntavuJXz5TK0NBI/7MF5+J0ZHBVC/UgK32e8yFiB82/pDMycxMnbon799xjB6wcEC4PEfuTrL2I889TxePb58VXB/E9ONuTWq7/PUT3cwl6DEbdHsmpnLhVPUoM9BN3h5aHB6wgs+WWgf1MXdhe42AC19UhC1Ux5f/3EYCY0AslQglKe0USC2XLICEWmLS6v2lRa8i/0oj6fGM0z/ywoIEuT4FUCf+hw0Gagg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EpoXJlaiwVIk6nhBVH2sQXQ3KQNBUhMYMhlrp30rYnahrHc3SG8m+dFOkhJX/CmEjqCMP5oWXy4N7pWKCwmj/3XqgO6/3IhmmoMYrUXahLG3lWJ+ppo6+gHpCHL0mocuX57+yb8HuTMiL+k27XaqYIepy64qbi3X6mBfigmyDyFrTbHiLjrKd1AxfVcDRLF3WN7t7LUq3LD1+GgLL1Q2roRrhc1BmDfRRHxwh3wBLCUmRseZuGxPbJpJdoXkT0DFWiDfDkKJ/lxXjO0yVI3nkbYgiN5pV1Speln7ACtT2V5wsdryjVWLKcJJk9M04lPLZ0thUPCY53tIHcVSTj2aaw==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "consulting @ bugseng . com" <consulting@xxxxxxxxxxx>, Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>
  • Delivery-date: Tue, 06 Jan 2026 07:39:06 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Thread-index: AQHcfj5G7fNp7PSkb0GiHPxZx0yorLVD4eGAgADfJYCAAAEpAA==
  • Thread-topic: ARM64 notes: Re: [PATCH] CI: Extend eclair-*-allcode to enable as much as possible


> On 6 Jan 2026, at 08:33, Bertrand Marquis <Bertrand.Marquis@xxxxxxx> wrote:
> 
> Hi Andrew,
> 
>> On 5 Jan 2026, at 19:14, Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
>> 
>> On 05/01/2026 12:24 pm, Andrew Cooper wrote:
>>> eclair-x86_64-testing:
>>> @@ -104,6 +122,33 @@ eclair-ARM64-allcode:
>>>    LOGFILE: "eclair-ARM64.log"
>>>    VARIANT: "ARM64"
>>>    RULESET: "monitored"
>>> +    EXTRA_XEN_CONFIG: |
>>> +      CONFIG_ACPI=y
>>> +      CONFIG_ARGO=y
>>> +      CONFIG_ARM64_SVE=y
>>> +      CONFIG_ARM_SMMU_V3=y
>>> +      CONFIG_BOOT_TIME_CPUPOOLS=y
>>> +      CONFIG_DEBUG_LOCK_PROFILE=y
>>> +      CONFIG_DEBUG_TRACE=y
>>> +      CONFIG_DEVICE_TREE_DEBUG=y
>>> +      CONFIG_EFI_SET_VIRTUAL_ADDRESS_MAP=y
>>> +      CONFIG_EXPERT=y
>>> +      CONFIG_FFA=y
>>> +      CONFIG_FFA_VM_TO_VM=y
>>> +      CONFIG_GICV3_ESPI=y
>>> +      CONFIG_HAS_ITS=y
>>> +      CONFIG_IOREQ_SERVER=y
>>> +      CONFIG_IPMMU_VMSA=y
>>> +      CONFIG_LIVEPATCH=y
>>> +      CONFIG_LLC_COLORING=y
>>> +      CONFIG_OPTEE=y
>>> +      CONFIG_OVERLAY_DTB=y
>>> +      CONFIG_PCI_PASSTHROUGH=y
>>> +      CONFIG_PERF_ARRAYS=y
>>> +      CONFIG_PERF_COUNTERS=y
>>> +      CONFIG_STACK_PROTECTOR=y
>>> +      CONFIG_UNSUPPORTED=y
>>> +      CONFIG_VM_EVENT=y
>>>  allow_failure: true
>> 
>> https://gitlab.com/xen-project/hardware/xen-staging/-/jobs/12604499722
>> shows 122 failures in otherwise-clean guidelines.  Some observations:
>> 
>> llc-colouring.c uses binary literals.  These are safe to use now since
>> 4.21 with the updated toolchain baseline, but the Eclair config wants
>> updating to allow this language extension.
>> 
>> ipmmu-vmsa.c has a git:// url inside a block comment, which is
>> considered to be a Rule 3.1 violation.  In principle this ought to fix it:
>> 
>> diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl 
>> b/automation/eclair_analysis/ECLAIR/deviations.ecl
>> index 7dee4a488d45..8f5fc6c93bc5 100644
>> --- a/automation/eclair_analysis/ECLAIR/deviations.ecl
>> +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl
>> @@ -60,7 +60,7 @@ removed by the compiler, the resulting slowdown is 
>> negligible."
>> 
>> -doc_begin="Comments starting with '/*' and containing hyperlinks are safe as
>> they are not instances of commented-out code."
>> --config=MC3A2.R3.1,reports+={safe, "first_area(text(^.*https?://.*$))"}
>> +-config=MC3A2.R3.1,reports+={safe, 
>> "first_area(text(^.*(https?|git)://.*$))"}
>> -doc_end
>> 
>> #
>> 
>> 
>> but I've not tried it yet.
>> 
>> There's a R8.4 violation against __stack_chk_guard.  I think this wants
>> deviating locally, because it's a fairly magic construct.
>> 
>> Other than that, there's a smattering of violations.  Some will be fixed
>> by some work I've got pending for the x86 side of things, but most are
>> specific to arch/arm/.
>> 
> 
> They are quite a lot of violations coming from ffa.
> I have a pending serie on FF-A waiting to be reviewed/committed.
> I can push something to fix the findings after it, if that is ok for you ?
> 
> I will retrigger the CI from the branch corresponding to my serie and work
> from there.
> 
> In any case, very good thing to activate all those and check with the CI, 
> thanks a lot :-)

There are also a bunch of optee ones that i can handle in a patch.

Cheers
Bertrand

> 
> Cheers
> Bertrand
> 
>> ~Andrew





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.