[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v2 0/3] Introduce functional safety related documents


  • To: <sstabellini@xxxxxxxxxx>, <bertrand.marquis@xxxxxxx>, <michal.orzel@xxxxxxx>, <ayan.kumar.halder@xxxxxxx>, <artem_mygaiev@xxxxxxxx>, <julien@xxxxxxx>
  • From: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
  • Date: Fri, 2 Aug 2024 10:46:11 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UHQpMccu1yV6wAzWmUCoAEh7UVBNVQqXn3aoswC3wJg=; b=npvEqwAHk89VarIOOWHOccUJU98yOHD3epaxwmTnfAezndajSemUWvVdR0DcyAA8KgqpvC7SdhphSDxcyjeMpTpY5+Q9HhMhJneU8iXXLT+X3aodTRQZu/m3EKJR4BOR9p9k5sn26y8G/P1OTnO1l5c4wvD5iR4hhF64y4qiA5C7TkuAUlPlyQ3QwaJKgb1HrtD00bOadymsHdXnWWp5q8rjTs8qB2pxDwrUJDQlxCnNfbV1G/HSlboFq5o03vyAIhM2wLWij6oU1rQKSod/MESJ7s4aiwk0tZliMzTK/YN8VMVnQqWyw1shJZZPteLKuuoKG9uvehtaM9TnvDivvA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FWxpjV88gapLYVANCSieKzHsC+sRccOcqczRdTK2RfTSrh8tKuCkNDpPIzoDgh0WFQ7xWDP2e+LQF6//p/i31N19q5MOuLOQgOV3SAkjSOIpaj7ZRWVGOib6QkYnGoO0K/frdXz5+p2QgD9e2AsWuh73JgGwpxzCMoQoMgqrdEL28oWwEMOy+rmPHpltwr1DD9vdjIOGVgjJwkqiIGtlq1on38Z2i6+RKHS7MW8RPNYnvcXLju63ORi1vgrYvyuRywiyibsyq+uQEHMJwCpP7ukjqLLKxebCAqtaemixWeTydt3vvk9nRgENf6+SP/7zzvoZQulb6UkJly02W5MtCw==
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Fri, 02 Aug 2024 09:46:35 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi,

In the Xen summit, we presented an update on Xen Functional Safety. For
details, please refer to 
https://youtu.be/eFRTHSGDMfQ?si=sYOdYfDI7qsgkcjE  ("Xen Functional
Safety - an Update - Ayan Kumar Halder & Michal Orzel, AMD")
 
We wish to start with upstreaming the requirements.

This patches illustrate how we are writing the requirements and provides
some examples.
The support level is experimental and it will be maintained on a best
effort basis.

Changes from v1 :-
1. Added "docs: fusa: reqs: Added a requirements writing style guide" in this
patch serie.

Ayan Kumar Halder (3):
  docs: Introduce Fusa Requirement and define maintainers
  docs: fusa : reqs: Added a sample of requirements [DO_NOT_MERGE]
  docs: fusa: reqs: Added a requirements writing style guide

 MAINTAINERS                                   |   9 +
 docs/fusa/reqs/README.md                      |  78 ++++++
 docs/fusa/reqs/REQUIREMENTS-STYLE             |  34 +++
 .../reqs/design-reqs/arm64/emulated-uart.rst  | 240 ++++++++++++++++++
 .../reqs/design-reqs/arm64/generic-timer.rst  | 146 +++++++++++
 docs/fusa/reqs/design-reqs/xen-version.rst    | 207 +++++++++++++++
 docs/fusa/reqs/market-reqs/reqs.rst           |  77 ++++++
 docs/fusa/reqs/product-reqs/reqs.rst          |  64 +++++
 8 files changed, 855 insertions(+)
 create mode 100644 docs/fusa/reqs/README.md
 create mode 100644 docs/fusa/reqs/REQUIREMENTS-STYLE
 create mode 100644 docs/fusa/reqs/design-reqs/arm64/emulated-uart.rst
 create mode 100644 docs/fusa/reqs/design-reqs/arm64/generic-timer.rst
 create mode 100644 docs/fusa/reqs/design-reqs/xen-version.rst
 create mode 100644 docs/fusa/reqs/market-reqs/reqs.rst
 create mode 100644 docs/fusa/reqs/product-reqs/reqs.rst

-- 
2.25.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.