[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 00/21] x86: Trenchboot Secure Launch DRTM (Xen)


  • To: Sergii Dmytruk <sergii.dmytruk@xxxxxxxxx>
  • From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • Date: Thu, 24 Apr 2025 12:54:41 +0200
  • Arc-authentication-results: i=1; bugseng.com; arc=none smtp.remote-ip=46.228.253.214
  • Arc-message-signature: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; c=relaxed/relaxed; t=1745492084; h=DKIM-Signature:Content-Type:Message-ID:Date:MIME-Version:User-Agent: Subject:To:Cc:References:Content-Language:From:In-Reply-To; bh=t2Gm+ltAWfwLzEbJlBs5awWqViQ3UtkjF9FZdQPJZfs=; b=gX/VNGGal3kgG7w5KmWNMZrPU0N8CXzxACtk5Ift58j7svL4ADpwHnjDcY/uWTezBM3e RKRe/eKBVFjGZzRCxVJUOsPq6fH78BNvApXENY2zfK2kHp8Nvex9xk5MpJsM4ImDIBB+B prjoTpJNTTr2bbBGBGHc8+k4k6X3v3GjY5fsxY1RnsQoyvtXTTGgJi9qTmD8aQefuN8s8 88GENiQ0hP/Z/tBeP4lvFJ2dU9t5KeLr82o+8asUia5ap8aiyrF/bW2G6tUD090/iTCN5 uXNoyRtfr+3VkOeJclt1oiZh53fWxJ5hvKHKqJBXmHASJrm1QxUe7pn9QLF9mMDBSYv2r eWcrsyqCIVF2hlvDXpUuQmbNnZHdF0kujDRvKIcHKQSqUrhX0oqA9iNboZajvMIRyOVgG fWjwWIvR94r6Va/3hcunuCC8hReMdvUI9auMO07fM5jisRQjfJ8fUEZ/KYmswKCEGs5C+ e9kTpN+5b+iEe2S3bJNCyydVVrEkPcvWLW075HXpbGa6hzGhmlaRfarGCFF/kPPL2wJ2z 3zMKbzzrjnwmWCT+Y/fPk+LOBvBJWowyU46mUei3Dv8IMeQT3JmBWg/ldCxUUKwSRHtQ3 6yx3Zn0d+3T0OjgiRnmK5UteHGz23lzXIam9YoynEuXuNT1N0UZDhRTfr/ZXdSs=
  • Arc-seal: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; cv=none; t=1745492084; b=dJwFc/Y3JOiOK4/H9cJZFQx5qVOXM4GAa+8Rm3cfB2QbmitPjI+dirqzlCdHfA49/NKT 1lTGShKPTU6gE3UCzAdRGsqtFqkJF26IcPjWYX+fcBXgic5IQ5+UXj9kuCV82LCVy9rRl 6hMqePEbEWy+UwIk5DNatkV+U3dtEWT5AI2wOPbGeKuoi5CkC7lihuh9eqLjma94I1ZL7 FyFY9mQ5dQoaBaH8HfC2hm07LK3XIP0tIUfuwZYINCzY+oF9jq0YPSBjQV4GOMz86ZFsp 9cDum1hHNQU3FagVRYp0Yx9gqayiQcEL4JAqu2AqwXJ2a81GDE8VbYmX4V8H2hEQMPxBk ijJJUdMDkRachy2VvuW+wbUfFe33GR7ZFJRebQx+LFi8ypnD4A8cjKS7fTckCMGWwxuYP oqBHKVdvB3jre7tBoK2N2zUCkG1PLy9ipYkJ1/5IzLQwWNArEm+rZhOAUYH+G1/qALIPm SLv03xGxmhN6q4UwEP8wIbBYhII+TidzKDuPmows72Xzc+kAdtTuFhBAq+BFGpLthhEMb 5lsT1zSt8rAqWJhf16f5p05HQcxCFAszBmMGNDKPOMU/fB7LolK0rZfc0BXSqxXzChHZ4 K+uojrUpEIw50AdcV5OnhzT0IxP1v08sAH2dQZ9HWiCOJhSFnrKHubOSe6mVgVg=
  • Authentication-results: bugseng.com; arc=none smtp.remote-ip=46.228.253.214
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Lukasz Hawrylko <lukasz@xxxxxxxxxxx>, "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, Mateusz Mówka <mateusz.mowka@xxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, trenchboot-devel@xxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 24 Apr 2025 10:54:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 4/23/25 23:53, Sergii Dmytruk wrote:
On Wed, Apr 23, 2025 at 10:11:35PM +0200, Nicola Vetrini wrote:
On 2025-04-23 20:45, Sergii Dmytruk wrote:
On Wed, Apr 23, 2025 at 02:38:37PM +0100, Andrew Cooper wrote:
On 22/04/2025 6:14 pm, Andrew Cooper wrote:
I've stripped out the sha2 patch and fixed up to use the existing sha2,
then kicked off some CI testing:

https://gitlab.com/xen-project/hardware/xen-staging/-/pipelines/1780285393
https://cirrus-ci.com/build/5452335868018688

When the dust has settled, I'll talk you through the failures.
And here we go.  Interestingly, the FreeBSD testing was entirely
happy,
and that is the rare way around.

For Gitlab, there are several areas.

First, for MISRA.  In the job logs, you want the "Browse current
reports:" link which will give you full details, but it's all pretty
simple stuff.
Thanks, but that link gives me a list of 5096 failures all over the code
base.  Is there any way to see a diff against master?

Hi,

yes, you can define selections of violations introduced on previously clean
guidelines by clicking on the "ECLAIR" button on the upper right. See [1]
which is the result of defining the "clean_added" selection shown in the
attached screenshot. If you have other questions please let me know.
Hi,

not sure why, but using "added" left 4861 violations.  Picking `_NO_TAG`
instead seemingly left only new violations.  Maybe that's something
specific to this particular run.  Either way, I can go through the list
now and know how to adjust it.  Thank you for the instructions.

I'm not sure I fully understand this. This is what I see on x86: the ones still shown are those rules where the CI is blocking and new issues have been introduced by that pipeline run (of course a different pipeline may yield different results). Only new violations are blocking, so that is why I filtered out the rest in this case.

Thanks,

 Nicola

Thanks,
  Nicola

[1] 
https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/hardware/xen-staging/ECLAIR_normal/andrew/tb-v1.1/ARM64/9791028027/PROJECT.ecd;/by_service.html#service&kind{"select":true,"selection":{"hiddenAreaKinds":[],"hiddenSubareaKinds":[],"show":true,"selector":{"enabled":true,"negated":false,"kind":1,"children":[{"enabled":true,"negated":false,"kind":0,"domain":"clean","inputs":[{"enabled":true,"text":"added"}]}]}}}

Attachment: Screenshot from 2025-04-24 12-52-40.png
Description: PNG image

Attachment: Screenshot from 2025-04-24 12-53-17.png
Description: PNG image


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.