From: George Dunlap <george.dunlap@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@zentific.com>,
StefanoStabellini <sstabellini@kernel.org>,
Wei Liu <wei.liu2@citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Dario Faggioli <dario.faggioli@citrix.com>,
Tim Deegan <tim@xen.org>, Paul Durrant <paul.durrant@citrix.com>,
xen-devel@lists.xenproject.org,
Anthony Perard <anthony.perard@citrix.com>,
Ian Jackson <ian.jackson@citrix.com>,
Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH RFC] Add SUPPORT.md
Date: Thu, 7 Sep 2017 12:31:13 +0100 [thread overview]
Message-ID: <50c99d3e-3a41-c789-dae6-af09ed1add43@citrix.com> (raw)
In-Reply-To: <59A82162020000780017625C@prv-mh.provo.novell.com>
On 08/31/2017 01:46 PM, Jan Beulich wrote:
>>>> On 31.08.17 at 12:27, <george.dunlap@citrix.com> wrote:
>> vMCE: Is MCE an x86-only thing, or could this conceivably by extended
>> to ARM?
>
> I think this can't be reasonably extended beyond x86 (and,
> considering their similar origin, ia64).
OK, I'll changet this to "x86/vMCE" then.
>> +## Tooling
>> +
>> +### gdbsx
>> +
>> + Status, x86: Supported
>> +
>> +Debugger to debug ELF guests
>> +
>> +### vPMU
>> +
>> + Status, x86: Supported, Not security supported
>> +
>> +Virtual Performance Management Unit for HVM guests
>
> Why is this under Tooling?
Perhaps 'tooling' isn't the right name for this section; it includes:
- gdbsx
- vpmu
- guest serial console
- xentrace
- gcov
All of the other features have something to do with looking into the
guest / hypervisor and figuring out what's wrong.
But in any case, vPMU is more about allowing in-guest tools to analyze
the performance of the guest itself; as such it should probably
somewhere else. I've moved it under "## Hardware".
>> +## Scalability
>> +
>> +### 1GB/2MB super page support
>> +
>> + Status: Supported
>
> Is this a host, guest, CPU, and/or IOMMU capability? Do the same
> superpage sizes apply to 16k/64k-page-size ARM?
I'd say the useful thing to talk about is guest support. Let me think
about how to reword this.
>> +### Fair locks (ticket-locks)
>> +
>> + Status: Supported
>
> ... here I wonder whether these are legitimately on this list in the
> first place. Admins have no way to avoid their use.
I've deleted this item.
>> +### Live Patching
>> +
>> + Status: Supported, x86 only
>> +
>> +Compile time disabled
>
> Bu we're settled to change that, aren't we? It was even meant to be
> so in 4.9, but then didn't make it.
Change the compile time disabling? I don't really know. :-)
What gets checked in should ideally be true at the time it's checked in.
>> +### Virtual Machine Introspection
>> +
>> + Status: Supported, x86 only
>
> Including security support?
Not sure, actually. Opinions?
>> +### x86/Advanced Vector eXtension
>> +
>> + Status: Supported
>
> How fine-grained do we want this document to be? If this one is a
> valid entry, then many other CPUID bits will need to have entries
> too.
Well remember that this list came from the "Feature support matrix",
which was also meant to announce / brag about new features we were
developing.
This is already really long. Anything that comes accessible to guests
by default (which AVX instructions are) must be supported (including
security support). I wonder if there's a better way to specify this
sort of thing.
> Having reached the end of the list I further wonder whether we
> shouldn't add information on various hypercalls and their subops.
> I.e. a full walk through include/public/ may be needed to see
> what additional entries may be necessary or desirable.
Yes, probably useful.
>> +# Format and definitions
>> +
>> +This file contains prose, and machine-readable fragments.
>> +The data in a machine-readable fragment relate to
>> +the section and subection in which it is fine.
>
> "subsection" and s/fine/found/ ?
Ack.
>
>> +## Definition of Status labels
>> +
>> +Each Status value corresponds to levels of security support,
>> +testing, stability, etc., as follows:
>> +
>> +### Experimental
>> +
>> + Functional completeness: No
>> + Functional stability: Here be dragons
>> + Interface stability: Not stable
>> + Security supported: No
>> +
>> +### Tech Preview
>
> I think most if not all entries using this say just "Preview" - I think
> the terms would better fully match.
I like 'Tech Preview' better, so unless someone objects I'll change them
all to 'Tech Preview'.
I was originally using only 'Preview' because I thought a single word
would be more easy to parse; but we have "not security supported"
anyway, so might as well go with what sounds better.
Thanks,
-George
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-09-07 11:31 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-08-31 10:27 [PATCH RFC] Add SUPPORT.md George Dunlap
2017-08-31 10:46 ` Paul Durrant
2017-08-31 10:56 ` George Dunlap
2017-08-31 11:03 ` Paul Durrant
2017-08-31 11:05 ` George Dunlap
2017-08-31 11:25 ` Roger Pau Monne
2017-08-31 12:40 ` Jan Beulich
2017-09-07 10:49 ` George Dunlap
2017-09-07 13:57 ` Roger Pau Monné
2017-09-07 14:42 ` George Dunlap
2017-09-07 21:36 ` Stefano Stabellini
2017-09-11 15:54 ` Julien Grall
2017-09-11 16:15 ` George Dunlap
2017-09-11 16:21 ` Julien Grall
2017-08-31 12:46 ` Jan Beulich
2017-09-07 11:31 ` George Dunlap [this message]
2017-09-07 11:50 ` Jan Beulich
2017-09-14 17:58 ` Konrad Rzeszutek Wilk
2017-09-07 21:38 ` Stefano Stabellini
2017-09-01 15:00 ` [PATCH RFC] Add SUPPORT.md\ Wei Liu
2017-09-07 13:52 ` George Dunlap
2017-09-07 14:56 ` Wei Liu
2017-09-11 14:22 ` George Dunlap
2017-09-07 21:54 ` [PATCH RFC] Add SUPPORT.md Stefano Stabellini
2017-09-08 9:38 ` Roger Pau Monné
2017-09-08 19:37 ` Stefano Stabellini
2017-09-11 14:16 ` George Dunlap
2017-09-11 15:02 ` Anthony PERARD
2017-09-11 15:07 ` George Dunlap
2017-09-11 15:21 ` Anthony PERARD
2017-09-11 16:16 ` Julien Grall
2017-09-11 16:28 ` George Dunlap
2017-09-11 20:13 ` Rich Persaud
2017-09-11 20:57 ` Stefano Stabellini
2017-09-12 8:26 ` Dario Faggioli
2017-09-11 16:00 ` Julien Grall
2017-09-11 16:04 ` George Dunlap
2017-09-11 16:39 ` Stefano Stabellini
2017-09-11 18:03 ` Julien Grall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50c99d3e-3a41-c789-dae6-af09ed1add43@citrix.com \
--to=george.dunlap@citrix.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=anthony.perard@citrix.com \
--cc=dario.faggioli@citrix.com \
--cc=ian.jackson@citrix.com \
--cc=paul.durrant@citrix.com \
--cc=roger.pau@citrix.com \
--cc=sstabellini@kernel.org \
--cc=tamas.lengyel@zentific.com \
--cc=tim@xen.org \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).