Re: [Qemu-devel] [PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

This series seems to have some coding style problems. See output below for
more information:

Type: series
Message-id: 20180129174132.108925-1-brijesh.singh@xxxxxxx
Subject: [Qemu-devel] [PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)

=== TEST SCRIPT BEGIN ===
#!/bin/bash

BASE=base
n=1
total=$(git log --oneline $BASE.. | wc -l)
failed=0

git config --local diff.renamelimit 0
git config --local diff.renames True

commits="$(git log --format=%H --reverse $BASE..)"
for c in $commits; do
    echo "Checking PATCH $n/$total: $(git log -n 1 --format=%s $c)..."
    if ! git show $c --format=email | ./scripts/checkpatch.pl --mailback -; then
        failed=1
        echo
    fi
    n=$((n+1))
done

exit $failed
=== TEST SCRIPT END ===

Updating 3c8cf5a9c21ff8782164d1def7f44bd888713384
>From https://github.com/patchew-project/qemu
 t [tag update]            patchew/1517235657-22547-1-git-send-email-ghammer@xxxxxxxxxx -> patchew/1517235657-22547-1-git-send-email-ghammer@xxxxxxxxxx
 t [tag update]            patchew/20180123035349.24538-1-richard.henderson@xxxxxxxxxx -> patchew/20180123035349.24538-1-richard.henderson@xxxxxxxxxx
 * [new tag]               patchew/20180129174132.108925-1-brijesh.singh@xxxxxxx -> patchew/20180129174132.108925-1-brijesh.singh@xxxxxxx
Switched to a new branch 'test'
6efcae2888 sev: add migration blocker
16a9e00946 target/i386: clear C-bit when walking SEV guest page table
3b5e4a5a54 sev: add debug encrypt and decrypt commands
9034d072b3 hw: i386: set ram_debug_ops when memory encryption is enabled
9b48370842 sev: Finalize the SEV guest launch flow
5e126818a5 sev: emit the SEV_MEASUREMENT event
1c9a562916 qapi: add SEV_MEASUREMENT event
b322fca554 target/i386: encrypt bios rom
10da3ed830 sev: add command to encrypt guest memory region
cc979f7ffb sev: add command to create launch memory encryption context
9388e9fbf7 hmp: display memory encryption support in 'info kvm'
8875a9eff3 kvm: introduce memory encryption APIs
c530cf3a0f sev: register the guest memory range which may contain encrypted data
f486eda972 sev: add command to initialize the memory encryption context
cd64908627 accel: add Secure Encrypted Virtulization (SEV) object
08729ca7e4 docs: add AMD Secure Encrypted Virtualization (SEV)
e13044a465 kvm: update kvm.h to include memory encryption ioctls
113e16b66e machine: add -memory-encryption property
f839a7f5d1 target/i386: add memory encryption feature cpuid support
4e159e781f monitor/i386: use debug APIs when accessing guest memory
fbeb706e23 exec: add debug version of physical memory read and write API
11bc1372d7 exec: add ram_debug_ops support
1b02df629e memattrs: add debug attribute

=== OUTPUT BEGIN ===
Checking PATCH 1/23: memattrs: add debug attribute...
Checking PATCH 2/23: exec: add ram_debug_ops support...
WARNING: line over 80 characters
#208: FILE: include/exec/memory.h:640:
+ * memory_region_set_ram_debug_ops: Set debug access ops for a given memory region

total: 0 errors, 1 warnings, 173 lines checked

Your patch has style problems, please review.  If any of these errors
are false positives report them to the maintainer, see
CHECKPATCH in MAINTAINERS.
Checking PATCH 3/23: exec: add debug version of physical memory read and write API...
Checking PATCH 4/23: monitor/i386: use debug APIs when accessing guest memory...
WARNING: line over 80 characters
#356: FILE: target/i386/monitor.c:512:
+                        cpu_physical_memory_read_debug(pt_addr + l4 * 8, &pte, 8);

total: 0 errors, 1 warnings, 291 lines checked

Your patch has style problems, please review.  If any of these errors
are false positives report them to the maintainer, see
CHECKPATCH in MAINTAINERS.
Checking PATCH 5/23: target/i386: add memory encryption feature cpuid support...
Checking PATCH 6/23: machine: add -memory-encryption property...
Checking PATCH 7/23: kvm: update kvm.h to include memory encryption ioctls...
Checking PATCH 8/23: docs: add AMD Secure Encrypted Virtualization (SEV)...
Checking PATCH 9/23: accel: add Secure Encrypted Virtulization (SEV) object...
Checking PATCH 10/23: sev: add command to initialize the memory encryption context...
Checking PATCH 11/23: sev: register the guest memory range which may contain encrypted data...
Checking PATCH 12/23: kvm: introduce memory encryption APIs...
Checking PATCH 13/23: hmp: display memory encryption support in 'info kvm'...
Checking PATCH 14/23: sev: add command to create launch memory encryption context...
Checking PATCH 15/23: sev: add command to encrypt guest memory region...
ERROR: space prohibited between function name and open parenthesis '('
#86: FILE: accel/kvm/sev.c:474:
+    assert (handle);

total: 1 errors, 0 warnings, 86 lines checked

Your patch has style problems, please review.  If any of these errors
are false positives report them to the maintainer, see
CHECKPATCH in MAINTAINERS.

Checking PATCH 16/23: target/i386: encrypt bios rom...
Checking PATCH 17/23: qapi: add SEV_MEASUREMENT event...
Checking PATCH 18/23: sev: emit the SEV_MEASUREMENT event...
Checking PATCH 19/23: sev: Finalize the SEV guest launch flow...
Checking PATCH 20/23: hw: i386: set ram_debug_ops when memory encryption is enabled...
Checking PATCH 21/23: sev: add debug encrypt and decrypt commands...
Checking PATCH 22/23: target/i386: clear C-bit when walking SEV guest page table...
Checking PATCH 23/23: sev: add migration blocker...
=== OUTPUT END ===

Test command exited with code: 1


---
Email generated automatically by Patchew [http://patchew.org/].
Please send your feedback to patchew-devel@xxxxxxxxxxxxx




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux