Archived/GSoC 2013

From Xen
Revision as of 12:01, 30 January 2013 by WeiLiu (talk | contribs) (Add anchor for mirage project)
Icon Ambox.png This Page is under construction.


GSoC and Xen

This page is used to list project ideas for Google Summer of Code (GSOC) 2013.

Key Google Pages

Icon Ambox.png Note that Google has not yet announced GSOC 2013


Project List

Community Reviewed Project List

This section contains GSoC Projects that have been reviewed by Xen Maintainers and Committers. Community members are free to add their own project ideas, but these need to add them in the Unreviewed Project Ideas section of this document.

Icon todo.png To Do:

Migrate reviewed and suitable project ideas from Xen Development Projects to this page

.


Microcode uploader implementation

Date of insert: 02/08/2012; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: Intel is working on early implementation where the microcode blob would be appended to the initrd image. The kernel would scan for the appropiate magic constant and load the microcode very early. The Xen hypervisor can do this similarly.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Introducing PowerClamp-like driver for Xen

Date of insert: 01/22/2013; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: George Dunlap <george.dunlap@eu.citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: PowerClamp was introduced to Linux in late 2012 in order to allow users to set a system-wide maximum power usage limit. This is particularly useful for data centers, where there may be a need to reduce power consumption based on availability of electricity or cooling. A more complete writeup is available at LWN. These same arguments apply to Xen. The purpose of this project would be to implement a similar functionality in Xen, and to make it interface as well as possible with the Linux PowerClamp tools, so that the same tools could be used for both.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Xen in the Real-Time/Embedded World: Improve the Temporal Isolation among vCPUs in SEDF

Date of insert: 08/08/2012; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Dario Faggioli <dario.faggioli@citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: No matter if it is to build a multi-personallity mobile phone, or help achieving consolidation in industrial and factory automation, embedded virtualization ([1], [2], [3]) is upon us. In fact, quite a number of embedded hypervisors already exist, e.g.: Wind River Hypervisor, CodeZero or PikeOS. Xen definitely is small, fast type-1 hypervisor with support for multiple VMs [1], so it could be a good candidate embedded hypervisor.

Moreover, Xen offers with an implementation of one of the most famous and efficient real-time scheduling algorithm, the Earliest Deadline First (which is called SEDF in Xen), and real-time support is a key feature for a successful embedded hypervisor. Using such an advanced scheduling policy is, if it is implemented correctly, a great advancement and provide much more flexibility than only using vCPU pinning (which is what most embedded hypervisors do to guarantee real-time performances and isolation).

Unfortunately, SEDF, the EDF implementation in Xen, still has some rough edges that need to be properly addressed, if we want it to be a valid solution for providing the temporal isolation real-time applications requires. In fact, as of now, SEDF deals with events such as a vCPU blocking (in general, stopping running) and unblocking (in general, restarting running) by trying (and failing!) to special case all the possible situations, resulting in the code being rather complicated, ugly, inefficient and hard to maintain. Unified approaches have been proposed for enabling blocking and unblocking in EDF, while still guaranteeing temporal isolation among different vCPUs.

Therefore, this project aims at implementing one of this solutions in SEDF, and more specifically the one called Constant BandWidth Server (CBS, [1], [2], [3]).

Note for the GSoC Working Group: this can be coalesced with any other project called "Xen in the Real-Time/Embedded World: XXX" (or even with both of them).
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Xen in the Real-Time/Embedded World: Improve Multiprocessor Support in SEDF

Date of insert: 08/08/2012; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Dario Faggioli <dario.faggioli@citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: No matter if it is to build a multi-personallity mobile phone, or help achieving consolidation in industrial and factory automation, embedded virtualization ([1], [2], [3]) is upon us. In fact, quite a number of embedded hypervisors already exist, e.g.: Wind River Hypervisor, CodeZero or PikeOS. Xen definitely is small, fast type-1 hypervisor with support for multiple VMs [1], so it could be a good candidate embedded hypervisor.

Moreover, Xen offers with an implementation of one of the most famous and efficient real-time scheduling algorithm, the Earliest Deadline First (which is called SEDF in Xen), and real-time support is a key feature for a successful embedded hypervisor. Using such an advanced scheduling policy is, if it is implemented correctly, a great advancement and provide much more flexibility than only using vCPU pinning (which is what most embedded hypervisors do to guarantee real-time performances and isolation).

Unfortunately, SEDF, the EDF implementation in Xen, does not properly handle SMP systems yet, unless specific vCPU pinning is specified by the user. That is a big limitation of the current implementation, especially since EDF can work well without the need of imposing this constraint, providing much more flexibility and efficiency in exploiting the system resources to their most.

Therefore, this project aims at extending the SEDF scheduler, enabling proper support for SMP hardware. The fist step would be to use, instead of one vCPU run-queue per each physical processor (pCPU), only one per each "set of pCPUs" (e.g., only one run-queue for all the pCPUs that have a common L3 cache). This would already increase the effectiveness of the scheduler on current hardware a lot. After that, a mechanism for balancing and migrating vCPUs among different run-queues should be envisioned and implemented.

Note for the GSoC Working Group: this can be coalesced with any other project called "Xen in the Real-Time/Embedded World: XXX" (or even with both of them).
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Refactor Linux hotplug scripts

Date of insert: 15/11/2012; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Roger Pau Monné <roger.pau@citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: Current Linux hotplug scripts are all entangled, which makes them really difficult to understand or modify. The reason of hotplug scripts is to give end-users the chance to "easily" support different configuration for Xen devices. Linux hotplug scripts should be analized, providing a good description of what each hotplug script is doing. After this, scripts should be cleaned, putting common pieces of code in shared files across all scripts. A Coding style should be applied to all of them when the refactoring is finished.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


XL to XCP VM motion

Date of insert: 15/11/12; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Ian Campbell <ian.campbell@citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: Currently xl (the toolstack supplied alongside Xen) and xapi (the XCP toolstack) have very different concepts about domain configuration, disk image storage etc. In the XCP model domain configuration is persistent and stored in a data base while under xl domain configuration is written in configuration files. Likewise disk images are stored as VDIs in Storage Repositories while under xl disk images are simply files or devices in the dom0 filesystem. For more information on xl see XL. For more information on XCP see XCP Overview.

This project is to produce one or more command-line tools which support migrating VMs between these toolstacks.

One tool should be provided which takes an xl configuration file and details of an XCP pool. Using the XenAPI XML/RPC interface It should create a VM in the pool with a close approximation of the same configuration and stream the configured disk image into a selected Storage Repository.

A second tool should be provided which performs the opposite operation, i.e. give a reference to a VM residing in an XCP pool it should produce an XL compatible configuration file and stream the disk image(s) our of Xapi into a suitable format.

These tools could be reasonably bundled as part of either toolstack and by implication could be written in either C, Ocaml or some other suitable language.

The tool need not operate on a live VM but that could be considered a stretch goal.

An acceptable alternative to the proposed implementation would be to implement a tool which converts between a commonly used VM container format which is supported by XCP (perhaps OVF or similar) and the xl toolstack configuration file and disk image formats.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


VM Snapshots

Date of insert: 16/01/2013; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: Although xl is capable of saving and restoring a running VM, it is not currently possible to create a snapshot of the disk together with the rest of the VM.

QEMU is capable of creating, listing and deleting disk snapshots on QCOW2 and QED files, so even today, issuing the right commands via the QEMU monitor, it is possible to create disk snapshots of a running Xen VM. xl and libxl don't have any knowledge of these snapshots, don't know how to create, list or delete them.

This project is about implementing disk snapshots support in libxl, using the QMP protocol to issue commands to QEMU. Users should be able to manage the entire life-cycle of their disk snapshots via xl. The candidate should also explore ways to integrate disk snapshots into the regular Xen save/restore mechanisms and provide a solid implementation for xl/libxl.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Allowing guests to boot with a passed-through GPU as the primary display

Date of insert: 01/22/2013; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: George Dunlap <george.dunlap@eu.citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: One of the primary drivers of Xen in the "consumer market" of the open-source world is the ability to

pass through GPUs to guests -- allowing people to run Linux as their main desktop but easily play games requiring proprietary operating systems without rebooting.

GPUs can be easily passed through to guests as secondary displays, but as of yet cannot be passed through as primary displays. The main reason is the lack of ability to load the VGA BIOS from the card into the guest.

The purpose of this project would be to allow HVM guests to load the physical card's VGA bios, so that the guest can

boot with it as the primary display.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Fuzz testing Xen with Mirage

Date of insert: 28/11/2012; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Anil Madhavapeddy <anil@recoil.org>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: MirageOS (http://openmirage.org) is a type-safe exokernel written in OCaml which generates highly specialised "appliance" VMs that run directly on Xen without requiring an intervening guest kernel. We would like to use the Mirage/Xen libraries to fuzz test all levels of a typical cloud toolstack. Mirage has low-level bindings for Xen hypercalls, mid-level bindings for domain management, and high-level bindings to XCP for cluster management. This project would build a QuickCheck-style fuzzing mechanism that would perform millions of random operations against a real cluster, and identify bugs with useful backtraces.
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Testing PV and HVM installs of Debian using debian-installer

Date of insert: 2013-01-23; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Ian Jackson <ian.jackson@eu.citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: The testing system "osstest" which is used for the push gate for the xen and related trees should have Debian PV and HVM guest installations, based on the standard Debian installer, in its repertoire. Also it currently always tests

kernels as host and guest in the same installation.

  • Task 1: Generalise the functions in osstest which generate debian-installer preseed files and manage the installation, to teach them how to set up PV and HVM guests, and provide an appropriate ts-* invocation script.
  • Task 2: Extend the guest installer from task 1 to be able to install a kernel other than the one which comes from the Debian repository, so that it is possible to test one kernel as host with a different specified kernel as guest.
  • Task 3: Determine which combinations of kernel branches should be added to the test schedules, push gates, etc. and write this up in a report for deployment by the infrastructure maintainers.
  • More information: See xen-devel test reports. Code is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=summary
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Testing NetBSD

Date of insert: 2013-01-23; Verified: Icon Ambox.png Not specified, date when created; GSoC: Yes
Mentor: Ian Jackson <ian.jackson@eu.citrix.com>
Difficulty: Icon Ambox.png Unknown
Skills Needed: Icon Ambox.png Unknown
Description: The testing system "osstest" which is used for the push gate for the xen and related trees should be able to test NetBSD both as host and guest.
  • Task 1: Understand how best to automate installation of NetBSD. Write code in osstest which is able to automatically and noninteractively install NetBSD on a bare host.
  • Task 2: Test and debug osstest's automatic building arrangements so that they can correctly build Xen on NetBSD.
  • Task 3: Write code in osstest which can automatically install the Xen from task 2 on the system installed by task 1.
  • Task 4: Debug at least one of the guest installation capabilities in osstest so that it works on the Xen system from task 3.
  • Task 5: Rework the code from task 1 so that it can also install a NetBSD guest, ideally either as a guest of a Linux dom0 or of a NetBSD dom0.
  • Task 6: Determine which versions of NetBSD and of Linux should be tested in which combinations and write this up in a report for deployment by the infrastructure maintainers.
  • More information: See xen-devel test reports. Code is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=summary
Outcomes: Icon Ambox.png Not specified, project outcomes
Steps: Icon Ambox.png Not specified, necessary steps to accomplish project goal
References: Icon Ambox.png Not specified, useful references (mail threads / manuals / web pages) for students to learn background and motivation of the project. If the references are inlined in description, simply write "References inline in description".


Unreviewed Project Ideas

Rules and Advice for Adding Ideas

  • Be creative
  • Use the Template:GSoC Project template to encode ideas on this page. Please read the Template Documentation before you do so.
  • Be specific: what do you want to be implemented; if at all possible provide an indication of size and complexity as described above to make it easier for a student to choose ideas
  • If you are willing to mentors those ideas, add your name and email to the idea.
  • If you're an interested student, add your name and email next to the idea. It is ok to have several students interested by one idea.
  • Aspiring students need to get in touch with the xen.org community manager via community.manager@xen.org to register their interest

New Project Ideas

Icon Info.png Add new projects here.