xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: George Dunlap <george.dunlap@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@zentific.com>,
	StefanoStabellini <sstabellini@kernel.org>,
	Wei Liu <wei.liu2@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Dario Faggioli <dario.faggioli@citrix.com>,
	Tim Deegan <tim@xen.org>, Paul Durrant <paul.durrant@citrix.com>,
	xen-devel@lists.xenproject.org,
	Anthony Perard <anthony.perard@citrix.com>,
	Ian Jackson <ian.jackson@citrix.com>,
	Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH RFC] Add SUPPORT.md
Date: Thu, 7 Sep 2017 12:31:13 +0100	[thread overview]
Message-ID: <50c99d3e-3a41-c789-dae6-af09ed1add43@citrix.com> (raw)
In-Reply-To: <59A82162020000780017625C@prv-mh.provo.novell.com>

On 08/31/2017 01:46 PM, Jan Beulich wrote:
>>>> On 31.08.17 at 12:27, <george.dunlap@citrix.com> wrote:
>> vMCE: Is MCE an x86-only thing, or could this conceivably by extended
>> to ARM?
> 
> I think this can't be reasonably extended beyond x86 (and,
> considering their similar origin, ia64).

OK, I'll changet this to "x86/vMCE" then.

>> +## Tooling
>> +
>> +### gdbsx
>> +
>> +    Status, x86: Supported
>> +
>> +Debugger to debug ELF guests
>> +
>> +### vPMU
>> +
>> +    Status, x86: Supported, Not security supported
>> +
>> +Virtual Performance Management Unit for HVM guests
> 
> Why is this under Tooling?

Perhaps 'tooling' isn't the right name for this section; it includes:

- gdbsx
- vpmu
- guest serial console
- xentrace
- gcov

All of the other features have something to do with looking into the
guest / hypervisor and figuring out what's wrong.

But in any case, vPMU is more about allowing in-guest tools to analyze
the performance of the guest itself; as such it should probably
somewhere else.  I've moved it under "## Hardware".

>> +## Scalability
>> +
>> +### 1GB/2MB super page support
>> +
>> +    Status: Supported
> 
> Is this a host, guest, CPU, and/or IOMMU capability? Do the same
> superpage sizes apply to 16k/64k-page-size ARM? 

I'd say the useful thing to talk about is guest support.  Let me think
about how to reword this.

>> +### Fair locks (ticket-locks)
>> +
>> +    Status: Supported
> 
> ... here I wonder whether these are legitimately on this list in the
> first place. Admins have no way to avoid their use.

I've deleted this item.

>> +### Live Patching
>> +
>> +    Status: Supported, x86 only
>> +
>> +Compile time disabled
> 
> Bu we're settled to change that, aren't we? It was even meant to be
> so in 4.9, but then didn't make it.

Change the compile time disabling?  I don't really know. :-)

What gets checked in should ideally be true at the time it's checked in.

>> +### Virtual Machine Introspection
>> +
>> +    Status: Supported, x86 only
> 
> Including security support?

Not sure, actually.  Opinions?

>> +### x86/Advanced Vector eXtension
>> +
>> +    Status: Supported
> 
> How fine-grained do we want this document to be? If this one is a
> valid entry, then many other CPUID bits will need to have entries
> too.

Well remember that this list came from the "Feature support matrix",
which was also meant to announce / brag about new features we were
developing.

This is already really long.  Anything that comes accessible to guests
by default (which AVX instructions are) must be supported (including
security support).  I wonder if there's a better way to specify this
sort of thing.

> Having reached the end of the list I further wonder whether we
> shouldn't add information on various hypercalls and their subops.
> I.e. a full walk through include/public/ may be needed to see
> what additional entries may be necessary or desirable.

Yes, probably useful.

>> +# Format and definitions
>> +
>> +This file contains prose, and machine-readable fragments.
>> +The data in a machine-readable fragment relate to
>> +the section and subection in which it is fine.
> 
> "subsection" and s/fine/found/ ?

Ack.

> 
>> +## Definition of Status labels
>> +
>> +Each Status value corresponds to levels of security support,
>> +testing, stability, etc., as follows:
>> +
>> +### Experimental
>> +
>> +    Functional completeness: No
>> +    Functional stability: Here be dragons
>> +    Interface stability: Not stable
>> +    Security supported: No
>> +
>> +### Tech Preview
> 
> I think most if not all entries using this say just "Preview" - I think
> the terms would better fully match.

I like 'Tech Preview' better, so unless someone objects I'll change them
all to 'Tech Preview'.

I was originally using only 'Preview' because I thought a single word
would be more easy to parse; but we have "not security supported"
anyway, so might as well go with what sounds better.

Thanks,
 -George

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

  reply	other threads:[~2017-09-07 11:31 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-08-31 10:27 [PATCH RFC] Add SUPPORT.md George Dunlap
2017-08-31 10:46 ` Paul Durrant
2017-08-31 10:56   ` George Dunlap
2017-08-31 11:03     ` Paul Durrant
2017-08-31 11:05       ` George Dunlap
2017-08-31 11:25 ` Roger Pau Monne
2017-08-31 12:40   ` Jan Beulich
2017-09-07 10:49   ` George Dunlap
2017-09-07 13:57     ` Roger Pau Monné
2017-09-07 14:42       ` George Dunlap
2017-09-07 21:36   ` Stefano Stabellini
2017-09-11 15:54     ` Julien Grall
2017-09-11 16:15       ` George Dunlap
2017-09-11 16:21         ` Julien Grall
2017-08-31 12:46 ` Jan Beulich
2017-09-07 11:31   ` George Dunlap [this message]
2017-09-07 11:50     ` Jan Beulich
2017-09-14 17:58       ` Konrad Rzeszutek Wilk
2017-09-07 21:38   ` Stefano Stabellini
2017-09-01 15:00 ` [PATCH RFC] Add SUPPORT.md\ Wei Liu
2017-09-07 13:52   ` George Dunlap
2017-09-07 14:56     ` Wei Liu
2017-09-11 14:22       ` George Dunlap
2017-09-07 21:54 ` [PATCH RFC] Add SUPPORT.md Stefano Stabellini
2017-09-08  9:38   ` Roger Pau Monné
2017-09-08 19:37     ` Stefano Stabellini
2017-09-11 14:16   ` George Dunlap
2017-09-11 15:02     ` Anthony PERARD
2017-09-11 15:07       ` George Dunlap
2017-09-11 15:21         ` Anthony PERARD
2017-09-11 16:16     ` Julien Grall
2017-09-11 16:28       ` George Dunlap
2017-09-11 20:13     ` Rich Persaud
2017-09-11 20:57       ` Stefano Stabellini
2017-09-12  8:26     ` Dario Faggioli
2017-09-11 16:00   ` Julien Grall
2017-09-11 16:04     ` George Dunlap
2017-09-11 16:39     ` Stefano Stabellini
2017-09-11 18:03       ` Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=50c99d3e-3a41-c789-dae6-af09ed1add43@citrix.com \
    --to=george.dunlap@citrix.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=anthony.perard@citrix.com \
    --cc=dario.faggioli@citrix.com \
    --cc=ian.jackson@citrix.com \
    --cc=paul.durrant@citrix.com \
    --cc=roger.pau@citrix.com \
    --cc=sstabellini@kernel.org \
    --cc=tamas.lengyel@zentific.com \
    --cc=tim@xen.org \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).