Hi Lars,
I think I have sent the minutes of design session to you. I attached the email in case you can’t found.
Thanks,
Luwei Kang
From: Lars Kurth [mailto:lars.kurth@xxxxxxxxxx]
Sent: Thursday, July 12, 2018 9:23 PM
To: Ji, John <john.ji@xxxxxxxxx>; xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
Cc: committers@xxxxxxxxxxxxxx; Tamas K Lengyel <tamas.k.lengyel@xxxxxxxxx>; intel-xen <intel-xen@xxxxxxxxx>; daniel.kiper@xxxxxxxxxx; Roger Pau Monne <roger.pau@xxxxxxxxxx>; Christopher Clark <christopher.w.clark@xxxxxxxxx>; Rich Persaud <persaur@xxxxxxxxx>;
Brian Woods <brian.woods@xxxxxxx>; Stefano Stabellini <sstabellini@xxxxxxxxxx>; Julien Grall <julien.grall@xxxxxxx>; Juergen Gross <jgross@xxxxxxxx>
Subject: Re: x86 Community Call - Wed July 11, 14:00 - 15:00 UTC - Minutes
John,
Thank you. I have notes and slides for SGX, which are already published and Intel Processor Trace (just the slides – already published, but I am not sure whether these already were updated to reflect the design discussion)
and EPT-Based Sub-Page Protection (just the slides – already published)
Lars
From:
"Ji, John" <john.ji@xxxxxxxxx>
Date: Thursday, 12 July 2018 at 13:33
To: Lars Kurth <lars.kurth@xxxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
Cc: "committers@xxxxxxxxxxxxxx" <committers@xxxxxxxxxxxxxx>, Tamas K Lengyel <tamas.k.lengyel@xxxxxxxxx>, intel-xen
<intel-xen@xxxxxxxxx>, "daniel.kiper@xxxxxxxxxx" <daniel.kiper@xxxxxxxxxx>, Roger Monne <roger.pau@xxxxxxxxxx>,
Christopher Clark <christopher.w.clark@xxxxxxxxx>, Rich Persaud <persaur@xxxxxxxxx>, Brian Woods <brian.woods@xxxxxxx>, Stefano
Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien.grall@xxxxxxx>, Juergen Gross <jgross@xxxxxxxx>
Subject: RE: x86 Community Call - Wed July 11, 14:00 - 15:00 UTC - Minutes
I will Yu and Yi to send out discussion notes.
>>### Add vNVDIMM support to HVM domains
>>Stakeholders: Zhang Yi, Intel, Zhang Yu, Intel, George Dunlap, Citrix ``` _As far as I understand a simple and clean way to implement this has been found,
but the design session notes are still missing_
>>_We spent almost two days on NVDIMM related discussions: we have something that should be fairly simple and easy to implement. Dan Williams is happy to take changes into upstream as long as they are sensible._
Also attached minutes as PDF and Markdown
# Agenda and Minutes: x86 Community Call July 2018
_No new items were added to the agenda._ _Minutes are added in blue (in the PDF only)_
Christopher Clark, OpenXT
Janakarajan Natarajan, AMD
## Release Cadence for Xen 4.12
edit) we have to make a decision whether
* Move to 9 months, until we fixed the underlying issues as outlined in the thread and
write-up: the problem is that unless we get some sort of commitment to address the issues, just changing the release cadence will not make a difference
* Skip a release as a one-off: Set ourselves some goals that must be achieved in this cycle around testing - this will need some commitment from vendors
I was planning to allocate up to 30 minutes to this discussion
Juergen: raises the point that keeping the release cadence at 6 months is very unfair on Jan who has raised many times that the workload resulting from having to maintain so many release branches would be too high. After
running 6 monthly releases for some time, this has in fact come true, when at the time Jan’s concerns were dismissed. The overhead breaks down into backporting fixes, backporting security fixes and dealing with the release mechanics.
Jan: raised the point that hardly anyone responds to calls for back-ports and if so, only send change-sets and lat Jan do the backporting. Jan also says he suspects that people may not respond to backport requests, because
that would require them to backport the patches.
George: points out that unless he remembers at the time he writes or reviews a patch, whether it is back-port worthy.
George and Andrew raised the idea that we could maintain a list of pending backports and assign backport tasks to people.
Jan: maintaining releases as a single person is the most efficient way of doing it. A single person doing all trees is most efficient, but then we need to restrict the number of trees. And
2 releases per year are too many.
Andrew: suggests that an even/odd releases model with different support cycles would solve this. By doing this, we would retain the discipline of doing releases.
Juergen: this would however impose the release overhead
Andrew: agrees that we need to reduce our release overhead regardless, but this issue is orthogonal from the release cadence.
**Staying at 6 months we would either have to find someone who would like to carry the maintenance load, or move to a longer cadence. Also we need to make it clear that reducing the release overhead is independent from
release cadence and process. We should be doing this irrespective depending on the cadence.**
Juergen: We could l **ook at 8 months (instead of 9)it is better from a scheduling perspective (working around public holidays).** With an 8 month release cycle, the release occurs at only 3 different dates during
the calendar year, rather than the 4 dates with a 9 month cycle. This makes planning easier for selecting dates that avoid public holidays. 8 months is also closer to the 6 month cycle for those preferring shorter cadence. An 8 month cycle would not increase
the number of concurrently supported branches when compared with a 9 month cycle.
**ACTION: George will put together a survey for the committers outlining the issue and trade-offs and then go from there**
## Project Management stuff to keep the Momentum going
We have made significant progress on design related questions at the developer summit.
Although not all the notes for these have been published (SGX and NVDIMM are missing, the former are on my plate). The series, which have been discussed at the summit and where I believe that good progress has been made
were.
In other words, we should expect new versions of these series
### Add vNVDIMM support to HVM domains
Stakeholders: Zhang Yi, Intel, Zhang Yu, Intel, George Dunlap, Citrix ``` _As far as I understand a simple and clean way to implement this has been found, but the design session notes are still missing_
_We spent almost two days on NVDIMM related discussions: we have something that should be fairly simple and easy to implement. Dan Williams is happy to take changes into upstream as long as they are sensible._
_George: the key behind the discussion was to be able to deliver a functional solution soon. We can make it nicer incrementally._
_(he didn’t take any notes during the discussion - we are going to have to reconstruct some of the discussion)_
_Andrew: Yi & Yu were taking notes in the meeting_
**ACTION: Lars to reach out to Yi & Yu and see what they have**
### Intel Processor Trace virtualization enabling ```
Stakeholders: Luwei Kang, Intel
_Partly blocked on CPUID & MSR_
_Discussed the corner cases - these are in a PPT from Intel which Lars is waiting for. There was an open question re nested virt and a recognition that both cannot co-exist._
### Extend resources to support more vcpus in single VM ```
Stakeholders: Chao Gao, Intel
_Also depends on the topology work
IOREQ work needs another iteration
Virtual IOMMU needs to be done_
### EPT-Based Sub-page Write Protection Support ```
Stakeholders: Zhang Yi, Intel
_Intel posted series and doesn’t know what to do next due to lack of feedback. We were also lacking a plausible use-case:
Intel and BitDefender are talking together to clarify the use-case. Still largely blocked on reviews._
### SGX Virtualization design and draft patches ```
Stakeholders: Kai HUANG, Intel
Kai sent Lars some notes, which are published here:
Partly blocked on CPUID & MSR
XPTI would become very problematic with 5 level paging.
Currently Intel’s lowest priority.
## Then there were series which were blocked on CPUID and related work
### Add guest CPU topology support support has been posted on which this series depends on, but it ```
StakeHolders: Zhang Yi, Intel - Andrew Cooper, Citrix - Sergey Dyasli, Citrix - Roger Pau Monne, Citrix ``` [PATCH 00/13] x86: CPUID and MSR policy marshalling is only covering ⅓ of the needed patches and requires some
fixes. Sergey is working on the libxc side and Andrew on the hypervisor auditing/checking. Roger is working on topology support, which depends on the other three pieces.
## And other series, which are moving forward
### paravirtual IOMMU interface
Stakeholder: Paul Durrant, Citrix
### x86/cpuid: enable new cpu features
Stakeholder: Yang Zhong, Intel
### add vIOMMU support with irq remapping function of virtual VT-d ```
Stakeholder: Chao Gao, Intel
Stakeholder: Janakarajan Natarajan, AMD
### MSR Spec Support for AMD speculative store bypass mitigations ```
Stakeholder: Brian Woods, AMD
Stakeholder: Christopher Clark, OpenXT
_Waiting for Christopher’s reply_
_Daniel De Graf on sabbatical - not sure for how long_