From: Dario Faggioli <dario.faggioli@citrix.com>
To: Julien Grall <julien.grall@arm.com>,
Stefano Stabellini <sstabellini@kernel.org>,
"Edgar E. Iglesias" <edgar.iglesias@gmail.com>,
Artem Mygaiev <artem_mygaiev@epam.com>,
Andrii Anisov <andrii.anisov@gmail.com>,
Alex_Agizim@epam.com, stewart.hildebrand@dornerworks.com,
"Edgar E. Iglesias" <edgar.iglesias@xilinx.com>,
Meng Xu <mengxu@seas.upenn.edu>,
Dirk Behme <dirk.behme@de.bosch.com>,
anastassios.nanos@onapp.com
Cc: Lars Kurth <lars.kurth@citrix.com>, Xen Devel <xen-devel@lists.xen.org>
Subject: Re: Xen ARM community call - meeting minutes and date for the next one
Date: Wed, 7 Dec 2016 19:38:46 +0100 [thread overview]
Message-ID: <1481135926.3445.146.camel@citrix.com> (raw)
In-Reply-To: <f3dfc7c3-0b0a-3c3b-c988-6fe04d59dce5@arm.com>
[-- Attachment #1.1: Type: text/plain, Size: 3949 bytes --]
On Tue, 2016-12-06 at 13:48 +0000, Julien Grall wrote:
> === big.LITTLE ===
>
> Anastassios: interested in knowing the status of big.LITTLE
> support in Xen
> Dario: went through the thread on the ML. The consensus
> seems to be
> based on vcpu pin/affinity.
> Anastassios: There are issue the way xen handles boot code. Wrong
> errata
> for cpus.
> Julien: Core could have different errata and features. Errata
> already
> works today.
> We need a summary of the discussion.
>
> Dario stepped in to write a summary.
>
> Anastassios: What is the best board to work big.LITTLE with Xen?
>
> ?: Renesas
>
> ACTION: Dario to write a summary of the big.LITTLE discussions.
>
Here it is. I took the chance and wrote it as a design / feature
document, but it still has some TODO, for things that were either not
clear or not fully agreed upon in the thread.
[DOC RFC] Heterogeneous Multi Processing Support in Xen
<1481135379.3445.142.camel@citrix.com>
(I wanted to post a link to the message in the archives, but I'm not
seeing it there yet... oh, well.)
Hope this helps. :-)
Regards,
Dario
> === Secure Call Monitor (SMC) from guests ===
>
> Andrii/Artem: EPAM is working on allowing a guest to make call to
> TEE (e.g
> OPTEE). They are working in collaboration with Linaro
> to
> make OPTEE virtualization aware. A design document
> has been
> posted on the ML (see [3]).
> Edgar: interested on this. Trusted world need to be accessed
> to
> manage FPGA and for power management
>
> === Running unmodified baremetal software in a guest ===
>
> Edgar: Xilinx is working on running unmodified baremetal
> software
> in a guest. Piece of work required:
> - Mapping memory area with different memory
> attribut
> to domU
> - Replicate host memory map
> - Exposing a vUART to guest (see [4] for the
> discussion)
> Steward: vUART is very important, especially for baremetal
> guests
> Stefano: it would need to be loggable
> Julien: we would have the same issue in the future to be
> compliant
> with the VM Spec (see [5]).
>
> === Areas of concern ===
>
> Bosch: problem with xen-swiotlb. It does not work properly on renesas
> board.
> Stefano: please report the error on the ML
>
> ACTION: Bosch to send a bug report regarding xen-swiotlb
>
> Edgar: IOMMU could not be used by the guest (Stage-1). This would be
> useful
> to implement driver in userspace.
> Julien: When will it be required?
> Edgar: It is a trend
>
> Julien: Should we organized another Community Call? When?
> Artem: Once per month is a good start
>
> All: Agreed on a call before Christmas
>
> [1] https://lists.xenproject.org/archives/html/xen-devel/2016-10/msg0
> 1966.html
> [2] https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg0
> 1802.html
> [3] https://lists.xenproject.org/archives/html/xen-devel/2016-11/msg0
> 2220.html
> [4] https://lists.xenproject.org/archives/html/xen-devel/2016-11/msg0
> 0846.html
> [5] http://people.linaro.org/~christoffer.dall/VMSystemSpecificationF
> orARM-v2.0.pdf
>
--
<<This happens because I choose it to happen!>> (Raistlin Majere)
-----------------------------------------------------------------
Dario Faggioli, Ph.D, http://about.me/dario.faggioli
Senior Software Engineer, Citrix Systems R&D Ltd., Cambridge (UK)
[-- Attachment #1.2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
[-- Attachment #2: Type: text/plain, Size: 127 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2016-12-07 18:38 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-12-06 13:48 Xen ARM community call - meeting minutes and date for the next one Julien Grall
2016-12-06 19:02 ` Stefano Stabellini
2016-12-09 14:12 ` Edgar E. Iglesias
2016-12-07 18:38 ` Dario Faggioli [this message]
2016-12-07 19:15 ` Dario Faggioli
2016-12-13 19:00 ` Julien Grall
2016-12-14 14:59 ` Dario Faggioli
2016-12-14 21:18 ` Edgar E. Iglesias
2016-12-15 13:38 ` Julien Grall
2016-12-20 17:45 ` Andrii Anisov
2016-12-20 18:00 ` Andrii Anisov
2016-12-20 18:01 ` Julien Grall
2016-12-21 8:12 ` Dirk Behme
2016-12-21 9:00 ` Andrii Anisov
[not found] ` <2a5febf2-31c2-9002-55c9-b39e809f01f0@de.bosch.com>
2017-01-12 15:39 ` Pooya.Keshavarzi
2017-01-12 18:50 ` Stefano Stabellini
2017-01-13 15:05 ` Pooya.Keshavarzi
2017-01-13 18:39 ` Stefano Stabellini
2017-01-19 14:59 ` Pooya Keshavarzi
2017-01-19 18:30 ` Stefano Stabellini
2017-01-13 10:47 ` Andrii Anisov
2017-01-13 15:24 ` Pooya.Keshavarzi
2016-12-20 18:36 ` Konrad Rzeszutek Wilk
-- strict thread matches above, loose matches on Subject: below --
2017-03-28 15:23 Julien Grall
2017-03-28 16:40 ` Stefano Stabellini
2017-03-29 8:47 ` Artem Mygaiev
2017-03-29 10:06 ` Edgar E. Iglesias
2017-03-29 21:48 ` Julien Grall
2017-03-29 21:53 ` Stefano Stabellini
2017-03-30 15:41 ` Volodymyr Babchuk
2017-03-30 18:52 ` Stefano Stabellini
2017-03-30 19:19 ` Volodymyr Babchuk
2017-03-30 19:57 ` Julien Grall
2017-03-30 20:17 ` Volodymyr Babchuk
2017-03-31 10:08 ` Julien Grall
2017-03-30 19:58 ` Julien Grall
2017-04-04 11:25 ` Julien Grall
2017-03-30 20:24 Artem Mygaiev
2017-04-20 16:44 Julien Grall
2017-04-20 22:32 ` Stefano Stabellini
2017-05-02 18:00 ` Julien Grall
2017-05-03 16:50 ` Volodymyr Babchuk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1481135926.3445.146.camel@citrix.com \
--to=dario.faggioli@citrix.com \
--cc=Alex_Agizim@epam.com \
--cc=anastassios.nanos@onapp.com \
--cc=andrii.anisov@gmail.com \
--cc=artem_mygaiev@epam.com \
--cc=dirk.behme@de.bosch.com \
--cc=edgar.iglesias@gmail.com \
--cc=edgar.iglesias@xilinx.com \
--cc=julien.grall@arm.com \
--cc=lars.kurth@citrix.com \
--cc=mengxu@seas.upenn.edu \
--cc=sstabellini@kernel.org \
--cc=stewart.hildebrand@dornerworks.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.