Loading…
July 9 - 11, 2019 | Chicago, Illinois
View More Details  & Register Here

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, July 9
 

8:00am CDT

Continental Breakfast
Tuesday July 9, 2019 8:00am - 9:00am CDT
Gallery Foyer, 5th Floor

8:00am CDT

Registration
Tuesday July 9, 2019 8:00am - 5:00pm CDT
Gallery Foyer, 5th Floor

9:00am CDT

Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Open Source, Citrix Systems UK Ltd. & Xen Project Chairperson
In this keynote talk, we will give an overview of the state of the Xen Project, trends that impact the project, see whether challenges that surfaced last year have been addressed and how we did it, and highlight new challenges and solutions for the coming year.

Speakers
avatar for Lars Kurth

Lars Kurth

Director, Open Source, Citrix Systems UK Ltd
Lars Kurth is a highly effective, passionate community manager with strong experience of working with open source communities (Symbian, Symbian DevCo, Eclipse, GNU) and currently is the community manager for the Xen Project. Lars has 12 years of experience building and leading engineering... Read More →



Tuesday July 9, 2019 9:00am - 9:25am CDT
Gallery, 5th Floor
  Keynote Sessions

9:30am CDT

Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solutions, EPAM Systems
Artem will briefly cover what has been done since the first talk on Xen in Automotive domain back in 2013, what is going on now and what is still missing for broad adaptation of Xen in vehicles. The following topics will be covered:
  • Embedded/automotive features of Xen
  • Collaboration with AGL and GENIVI organizations for standardization
  • Efforts on Functional Safety compliance
Artem will also go over typical automotive use scenarios for Xen which may not be the same as generic computing use of hypervisor.

Speakers
avatar for Artem Mygaiev

Artem Mygaiev

Director, Technology Solutions, EPAM Systems
Artem Mygaiev is a technology expert with 19 years of experience in software engineering and software project management in various technology domains. Artem specializes in embedded software development and system level open source software. Beginning 2012 Artem is actively contributing... Read More →



Tuesday July 9, 2019 9:30am - 9:55am CDT
Gallery, 5th Floor
  Keynote Sessions

10:00am CDT

Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software Engineer, Citrix
The idea of making Xen secret-free has been floating since Spectre and Meltdown came into light. In this talk we will discuss what is being done and what needs to be done next.

Speakers
WL

Wei Liu

Software Engineer, Citrix
Wei has worked on various aspects in Xen ecosystem for the past few years. His recent interest is hypervisor development and upstream CI systems.


Tuesday July 9, 2019 10:00am - 10:25am CDT
Gallery, 5th Floor
  Keynote Sessions

10:25am CDT

Coffee Break
Tuesday July 9, 2019 10:25am - 10:55am CDT
Gallery Foyer, 5th Floor

10:55am CDT

Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
PCI is a local computer bus for attaching hardware devices in a computer, and is the main peripheral bus on modern x86 systems. As such, having a proper way to emulate it is crucial for Xen to be able to expose both fully emulated devices or passthrough devices to guests.

This talk will focus on the current status of PCI emulation in Xen, how and where it is used, what are its main limitations and future plans to improve it in order to be more robust and modular.

Speakers
avatar for Roger Pau Monné

Roger Pau Monné

Software Engineer, Citrix
Roger Pau Monné is a Software Engineer at Citrix. He is currently working on hypervisor related topics most of the time. Apart from contributing to Xen he is also a FreeBSD developer and contributes to other Xen-related projects, like the Linux kernel and QEMU.


Tuesday July 9, 2019 10:55am - 11:20am CDT
Gallery, 5th Floor
  Sessions

10:55am CDT

Will Robots Automate Your Job Away? Streamlining Xen Project Contributions Through CI - Doug Goldstein, Rackspace
Doug has long advocated for more CI/CD (Continuous Integration / Continuous Delivery) processes to be adopted by the Xen Project from the use of Travis CI and now GitLab CI. This talk aims to propose ideas for building upon the existing process and transforming the development process to provide users a higher quality with each release by the Xen Project.

Speakers
avatar for Doug Goldstein

Doug Goldstein

Site Reliability Engineer, Rackspace
Doug Goldstein is a Site Reliability Engineer at Rackspace, a cloud hosting company, working on hypervisors and related software in the OpenStack Public Cloud group. He has been involved in open source software for over 18 years contributing to a wide array of projects such as Gentoo... Read More →



Tuesday July 9, 2019 10:55am - 11:20am CDT
Contemporary, 6th Floor
  Sessions

11:25am CDT

Bringing Xen to the Masses: The Story of Building a Community-driven Platform Around Xen
Xen is a very powerful hypervisor with a talented and diverse developers community. Despite the fact it's almost everywhere (from the Cloud to the embedded world), it can be difficult to set up and manage as a system administrator. General purpose distros have Xen packages, but that's just a start in your Xen journey: you need some tooling and knowledge to have a working and scalable platform.

XCP-ng was built to overcome those issues: by bringing Xen to the masses with a fully turnkey distro with Xen as its core. It's the logical sequel to the XCP project, with a community focus from the start. We'll see how it happened, what we did, and what's next. Finally, we'll see the impact of XCP-ng on the Xen Project.

Speakers
BR

Benjamin Reis

R&D developer, Vates
Benjamin Reis has been working with free software projects since 2016: first Linphone, a VoIP softphone, then he joined Vates, a French company specializing in Open Source, in 2019 to work on XCP-ng as a R&D developer.



Tuesday July 9, 2019 11:25am - 11:50am CDT
Gallery, 5th Floor

11:25am CDT

Memories of a VM Funk - Mihai Donțu, Bitdefender
This talk is a follow-up to our Summit 2017 presentation in which we covered our plans for Intel VMFUNC and #VE, as well as related use-cases. This year, we will provide a report on what we have accomplished in Xen 4.12, and what remains to be addressed. We will also give a brief status update of VMI on AMD hardware. The session will end with some real-world numbers of the Hypervisor Introspection solution running on Citrix Hypervisor 8.0 with #VE enabled.

Speakers
MD

Mihai Donțu

Engineering Manager, Bitdefender
I lead the Linux development team at Bitdefender and I am currently involved in integrating our HVI technology with open source hypervisors like Xen and KVM



Tuesday July 9, 2019 11:25am - 11:50am CDT
Contemporary, 6th Floor
  Sessions

11:55am CDT

QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant, Citrix Systems
For many years the QEMU codebase has contained PV backends for Xen guests, giving them paravirtual access to storage, network, keyboard, mouse, etc. however these backends have not been configurable as QEMU devices as their implementation did not fully adhere to the QEMU Object Model (QOM).

Particularly the PV storage backend not using proper QOM devices, or qdevs, meant that the QEMU block layer needed to maintain legacy code that was cluttering up the source. This was causing push-back from the maintainers who did not want to accept any patches relating to that Xen backend until it was 'qdevified'.

In this talk, I'll explain the modifications I made to QEMU to achieve 'qdevification' of the PV storage backend, how compatibility with the libxl toolstack was maintained, and what the next steps in both QEMU and libxl development should be.

Speakers
avatar for Paul Durrant

Paul Durrant

Principal Hypervisor Engineer, Amazon
Paul Durrant is a Principal Hypervisor Engineer in the Amazon Web Services EC2 team based in Cambridge, UK.



Tuesday July 9, 2019 11:55am - 12:20pm CDT
Contemporary, 6th Floor
  Sessions

11:55am CDT

[ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
Volodymyr will speak about TEE mediators. This is a new feature in Xen which allows multiple virtual machines to interact with Trusted Execution Environment available on platform. He developed mediator for one of TEEs, namely OP-TEE.

He will give background information on why TEE is needed at all and share some implementation details.

Speakers
VB

Volodymyr Babchuk

Senior Embedded Engineer, EPAM Systems
Volodymyr is senior embedded software engineer at EPAM Systems. He participates in a project aimed to bring XEN into automotive solutions. 



Tuesday July 9, 2019 11:55am - 12:20pm CDT
Gallery Foyer, 5th Floor
  Sessions

12:25pm CDT

Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerrigan, Assured Information Security, Inc.
High level toolstacks for server and cloud virtualization are very mature with large communities using and supporting them. Client virtualization is a much more niche community with unique requirements when compared to those found in the server space. In this talk, we’ll introduce a client virtualization toolstack for Xen (redctl) that we are using in Redfield, a new open-source client virtualization distribution that builds upon the work done by the greater virtualization and Linux communities. We will present a case for maturing libxl’s Go bindings and discuss what advantages Go has to offer for high level toolstacks, including in the server space.

Speakers
BK

Brendan Kerrigan 

Principal Software Engineer, Assured Information Security, INC.
Brendan Kerrigan is a principal engineer at AIS, where he specializes in hypervisor development, graphics virtualization, and embedded development.
NR

Nick Rosbrook

Software Engineer, Assured Information Security, Inc.
Nick Rosbrook is a software engineer at Assured Information Security, Inc., where he works on wireless networking, IPsec, and virtualization. He enjoys working on open source projects, especially Redfield, StrongSwan, and Xen.



Tuesday July 9, 2019 12:25pm - 12:50pm CDT
Contemporary, 6th Floor
  Sessions

12:25pm CDT

Core Scheduling in Xen - Jürgen Groß, SUSE
Today Xen is scheduling guest virtual cpus on all available physical cpus independently from each other. Recent security issues on modern processors (e.g. L1TF) require to turn off hyperthreading for best security in order to avoid leaking information from one hyperthread to the other. One way to avoid having to turn off hyperthreading is to only ever schedule virtual cpus of the same guest on one physical core at the same time. This is called core scheduling.

This presentation shows results from the effort to implement core scheduling in the Xen hypervisor. The basic modifications in Xen are presented and performance numbers with core scheduling active are shown.

Speakers
avatar for Jürgen Groß

Jürgen Groß

Virtualization Engineer, SUSE
Jürgen is contributing to Xen since 2007. About 6 years ago he joined SUSE to work full time on Xen. He is maintainer of Xen code in the Linux kernel and has added multiple major features to the Xen hypervisor, which he presented on previous Xen summits.



Tuesday July 9, 2019 12:25pm - 12:50pm CDT
Gallery, 5th Floor
  Sessions

12:50pm CDT

Lunch
Tuesday July 9, 2019 12:50pm - 1:50pm CDT
Canvas, 1st Floor

1:50pm CDT

Design Session - Build System Gripe Session
Everyone agrees that the build system isn't ideal. Let's talk about what could be improved, and specifically, who is going to do it.
Topics include:
  • Moving "external" builds to a separate part of the tree, not built by default
  • Adding more "external" builds; pvgrub for instance
  • Making it easy to build with no internet access
  • Using git submodules


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 1:50pm - 2:35pm CDT
Gallery, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

1:50pm CDT

Design Session - Linux device model stubdom discussion
Talk about aligning approaches for the Linux stubdom for HVM guests (qemu) between projects that utilize it (OpenXT, Qubes, etc).


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 1:50pm - 2:35pm CDT
Contemporary, 6th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

2:40pm CDT

Design Session - Building Stub Domains with Unikraft
Unikraft is a Xen sub-project providing a common code-base for unikernels with the explicit goal of making unikernels more mainstream by easing the difficulty and time it takes to build them. One of the potentially beneficial targets for Unikraft is to use it as a basis for dom0 de-aggregation; towards this goal, we have been looking at initially building Xenstore Unikraft unikernels. In this design session we would like to discuss obstacles towards a Unikraft Xenstore domain, but also steps towards driver domains and dom0 de-aggregation.


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 2:40pm - 3:25pm CDT
Gallery, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

2:40pm CDT

Design Session - IOMMU drivers in Xen
We should establish what the structure and interfaces of IOMMU drivers in Xen should look like, how an interface should be expose to handle a flexible configuration (by dom0 at least) and then how we may provide PV or emulated IOMMU support for guests


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 2:40pm - 3:25pm CDT
Contemporary, 6th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

3:25pm CDT

Coffee Break
Tuesday July 9, 2019 3:25pm - 3:55pm CDT
Gallery Foyer, 5th Floor

3:55pm CDT

Design Session - x86: "caching" strategy for HVM insn emulation
Due to the involvement of qemu and the way code is structured, re-execution of insns under emulation is frequently necessary. Such re-execution must under no circumstance take a path different from the one the original execution(s) has (have) taken. This in particular means that page walks done to emulate memory accesses cannot be allowed to read different data from guest page tables during re-execution than what was read originally, which implies that data read (and possibly also data written) needs to be "cached".

The purpose of this session is to come to an agreement how to best arrange for such caching, and how to best integrate it also taking into consideration further plans on changes to our emulation paths.

Scheduling note: The presumed audience for this is small, so if we're tight on slots, then this is a prime candidate to scratch, in which case the topic will be converted to an informal talk.


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 3:55pm - 4:40pm CDT
Contemporary, 6th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

3:55pm CDT

Design Session - Xen Project CI Infrastructure v2: where we are, gaps and how to tie it all together
Doug Goldstein will lead, Lars will help moderate
To discuss and agree
  • GitLabCI status
  • Making GitLab part of the official infrastructure
  • Workflow and changes to enable off-list testing
  • :patchew and patchwork as triggers and implications - see https://markmail.org/message/4ur5mqx2yruhvfcj
  • Other checks status: clang-format
  • What needs to be done and who does it
More speculative
  • Opportunities for OSSTEST and GitLabCi to somehow interact
  • What next

Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 3:55pm - 4:40pm CDT
Gallery, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

4:45pm CDT

Design Session - Documentation improvements
Xen's documentation is currently quite lackluster in a variety of areas - some important elements such as the VMI API have virtually no docs at all. This session will concern writing new docs for undocumented parts of Xen (myself focusing on VMI in particular), updating existing docs, and potentially moving Xen's docs to Sphinx to improve readability, organization, and convenience of publishing (which Andrew is currently working on).


Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 4:45pm - 5:30pm CDT
Contemporary, 6th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

4:45pm CDT

Design Session - PCI passthrough discussion
Future development plans for PCI passthrough on Xen:
  • PCI passthrough for PVH guests.
  • Usage of Linux VFIO/MDEV on Xen systems.

Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Tuesday July 9, 2019 4:45pm - 5:30pm CDT
Gallery, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

5:30pm CDT

Welcome Reception
Join us for appetizers and drinks.

Tuesday July 9, 2019 5:30pm - 7:00pm CDT
Canvas, 1st Floor
 
Wednesday, July 10
 

8:00am CDT

Continental Breakfast
Wednesday July 10, 2019 8:00am - 9:00am CDT
Gallery Foyer, 5th Floor

8:00am CDT

Registration
Wednesday July 10, 2019 8:00am - 5:00pm CDT
Gallery Foyer, 5th Floor

9:00am CDT

Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
This talk will introduce Dom0-less: a new way of using Xen to build mixed-criticality solutions. Dom0-less is a Xen feature that adds a novel approach to static partitioning based on virtualization. It allows multiple domains to start at boot time directly from the Xen hypervisor, decreasing boot times dramatically. Xen userspace tools, such as xl and libvirt, become optional.

Dom0-less extends the existing device tree based Xen boot protocol to cover information required by additional domains. Binaries, such as kernels and ramdisks, are loaded by the bootloader (u-boot) and advertised to Xen via new device tree bindings.

The audience will learn how to use Dom0-less to partition the system. Uboot and device tree configuration details will be explained to enable the audience to get the most out of this feature. The talk will include a status update and details on future plans.

Speakers
avatar for Stefano Stabellini

Stefano Stabellini

Principal Engineer, Xilinx
Stefano Stabellini serves as system software architect and virtualization lead at Xilinx, the world's largest supplier of FPGA solutions. Previously, at Aporeto, he created a virtualization-based security solution for containers and authored several security articles. As Senior Principal... Read More →



Wednesday July 10, 2019 9:00am - 9:25am CDT
Gallery, 5th Floor
  Keynote Sessions

9:30am CDT

Keynote: Unikraft Weather Report - Simon Kuenzer, Senior Researcher & Felipe Huici, Chief Researcher, NEC Laboratories Europe GmbH
In​ ​recent​ ​years unikernels have​ ​shown​ ​immense​ ​performance potential​ (e.g., boot times of only a few ms, image sizes of only hundreds of KBs).The​ ​fundamental​ ​drawback​ ​of​ ​unikernels​ ​is​ ​that​ ​they​ ​require​ ​that applications​ ​be​ ​manually​ ​ported​ ​to​ ​the​ ​underlying​ ​minimalistic​ ​OS, needing​ ​both​ ​expert​ ​work​ ​and​ ​often​ ​considerable​ ​amount of​ ​time.​

The Unikraft project provides a unikernel code base and build system that significantly simplifies the building of unikernels. In addition to support for a number CPU architectures, languages and frameworks, Unikraft provides debugging and tracing features that are generally sorely missing from unikernel projects. In this talk we will talk about these features, show a set of preliminary performance numbers, and provide a roadmap for the project's future.

Speakers
avatar for Simon Kuenzer

Simon Kuenzer

Senior Researcher, NEC Laboratories Europe GmbH
Simon is a systems researcher passionate about virtualization and Unikernels. He's been at NEC Labs for the past 8 years and has expertise in operating systems, virtualization, and networking. In addition, he is the lead maintainer of Unikraft, a Xen incubation project. Simon received... Read More →
avatar for Felipe Huici

Felipe Huici

Chief Researcher, NEC Laboratories Laboratories GmbH
Felipe Huici is a chief researcher at NEC Europe Laboratories GmbH, CEO of the Unikraft.io start-up, and is passionate about high performance systems and lightweight virtualization.


Wednesday July 10, 2019 9:30am - 10:05am CDT
Gallery, 5th Floor
  Keynote Sessions

10:10am CDT

Application Agnostic High Availability Solution On Hypervisor Level - Chen Zhang, Intel
In today's public and private cloud markets, availability is a very important metric for all cloud service providers. COLO is an ideal Application-agnostic Solution for Non-stop service in the cloud. Our solution can protect user service even from physical network or power interruption. And the the switching process is difficult for users to perceive (TCP connection will not be terminated). Under COLO mode, both primary VM (PVM) and secondary VM (SVM) are running parallel. The COLO has more than ten times performance increase compared with previous solution (like Remus). Current COLO codes has been merged in QEMU community, we can use COLO in upstream without any other addition patches. In this talk, we will talk about the COLO implementation in QEMU and Xen, the new designed COLO-Proxy, discussing on problems we've met while developing COLO. and report the latest progress from Intel.

Speakers
CZ

Chen Zhang

Software engineer, Intel
Chen is software engineer from Intel Open Source Technology Center. He works on virtualization field many years. Maintain COLO project in KVM and Xen. And he is core developer for COLO from OTC. Most recently he focus on the COLO and security field.



Wednesday July 10, 2019 10:10am - 10:35am CDT
Contemporary, 6th Floor
  Sessions

10:10am CDT

Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
Xen currently has two major mechanisms to maintain security while hosting untrusted VMs without causing disruption to those guests: live patching, and live migration. We introduce a third method: live updating Xen. A live-update operation involves loading of the newly-staged hypervisor into RAM, the currently-running Xen serializing its state, and then transferring control to the newly-staged Xen, all without disrupting running instances, beyond a little downtime when neither hypervisor is running guest vCPUs.

We present a proposal on the design of such a feature, and invite comments and feedback.

Speakers
DW

David Woodhouse

Principal Kernel / Hypervisor Engineer, Amazon
David has been hacking on the Linux kernel since its early days, both professionally and as a hobbyist. Of late, he is interested in hypervisor and OS security.
AS

Amit Shah

Kernel / Hypervisor Engineer, Amazon
Amit is a long-time contributor to Operating Systems and Hypervisors. While more experienced in KVM, he is probing some aspects of Xen while working at EC2.



Wednesday July 10, 2019 10:10am - 10:35am CDT
Gallery, 5th Floor
  Sessions

10:35am CDT

Coffee Break
Wednesday July 10, 2019 10:35am - 11:05am CDT
Gallery Foyer, 5th Floor

11:05am CDT

How TrenchBoot is Enabling Measured Launch for Open-Source Platform Security - Daniel Smith, Apertus Solutions
TrenchBoot is a cross-community OSS integration project for hardware-rooted, late launch integrity of open and proprietary systems. It provides a general purpose, open-source DRTM kernel for measured system launch and attestation of device integrity to trust-centric access infrastructure. TrenchBoot closes the UEFI Measurement Gap and reduces the need to trust system firmware. This talk will introduce TrenchBoot architecture and a recent collaboration with Oracle to launch the Linux kernel directly with Intel TXT or AMD SVM Secure Launch. It will propose mechanisms for integrating the Xen hypervisor into a TrenchBoot system launch. DRTM-enabled capabilities for client, server and embedded platforms will be presented for consideration by the Xen community.

Speakers
avatar for Daniel Smith

Daniel Smith

Chief Technologist, Apertus Solutions
Daniel Smith began using Linux in 1997, building Linux-based endpoint security solutions in 2004 and contributing to the OpenXT virtualization platform in 2014, later serving as release manager for OpenXT 7.0. He developed the first open-source implementation of DRTM forward sealing... Read More →


Wednesday July 10, 2019 11:05am - 11:50am CDT
Contemporary, 6th Floor
  Sessions

11:05am CDT

Xen API Archaeology: Creating a Full-Featured VMI Debugger for the Xen Hypervisor - Spencer Michaels, NCC Group
Despite the popularity of the Xen hypervisor, there are very few tools capable of performing virtual machine introspection (VMI) on Xen guests — not even a full-featured debugger! This is in large part because Xen's VMI APIs are obscure and poorly documented; even among Xen developers, there are very few people who know how to use them. This has serious consequences for projects targeting Xen, as the lack of tooling makes it difficult to verify the correctness and security of software running on Xen. In this presentation, Spencer will introduce and explain Xen's VMI APIs in detail, with the goal of providing all the information necessary to construct fully-featured Xen VMI API clients and analysis tools. In doing so, he will share the hands-on experience he gained while developing his recently-released tool Xendbg, a feature-complete reference implementation of a modern Xen VMI debugger.

Speakers
avatar for Spencer Michaels

Spencer Michaels

Security Consultant, NCC Group
Spencer Michaels is a Security Consultant at NCC Group, an information security firm specializing in application, network, and mobile security. At NCC, Spencer performs network and web application penetration testing and code review, as well as research into various low-level technologies... Read More →



Wednesday July 10, 2019 11:05am - 11:50am CDT
Gallery, 5th Floor
  Sessions

11:55am CDT

Secure Unikraft Applications with Solo5 - Haibo Xu, ARM
As the number of contributions grow, reviewer bandwidth becomes a bottleneck; and maintainers are always asking for more help. However, ultimately maintainers must at least Ack every patch that goes in; so if you're not a maintainer, how can you contribute? Why should anyone care about your opinion?

This talk will try to lay out some advice and guidelines for non-maintainers, for how they can do code review in a way which will effectively reduce the load on maintainers when they do come to review a patch.

Speakers
avatar for Haibo Xu

Haibo Xu

Senior Software Engineer, ARM
Software Engineer in Arm Open Source Software team. Mainly focus on Virtualization, Containers and Security. Currently focus on Unikraft/gVisor/Firecracker/Nabla /Solo5 opensource projects support on arm64 platform.



Wednesday July 10, 2019 11:55am - 12:20pm CDT
Contemporary, 6th Floor
  Sessions

11:55am CDT

The Xen-Blanket for 2019 - Christopher Clark and Kelli Little, Star Lab Corporation
The Open Source Xen-Blanket software was developed by researchers at IBM and Cornell University, as extensions to the Xen hypervisor and its PV drivers, to enable seamless use of Xen PV drivers in guest VMs of nested Xen deployments. It was presented at the EuroSys 2012 conference, with a paper that has been widely cited since, and deployed in Cornell's SuperCloud.

Xen-Blanket has never been presented to the Xen Community and the software left unmaintained. However, recent work by Star Lab has modernized its implementation, aiming to encourage its adoption and incorporation into the Xen Project software.

This session will introduce the Xen-Blanket, describing its motivation and features; present the structure of the implementation in the hypervisor and device drivers; outline an example architecture for its deployment; and summarize its current state and plans within the Xen Project.

Speakers
KL

Kelli Little

Software Engineer, Star Lab Corporation
Kelli Little is a software engineer at Star Lab. She has worked as a developer for 7 years, starting as an intern in high school working with Raytheon. Kelli received her BS from Berry College with a focus in physics. She has worked extensively with project development and research... Read More →
avatar for Christopher Clark

Christopher Clark

Consultant, Hyperlaunch
Christopher Clark is a software consultant working on Open Source virtualization technology with the Xen hypervisor, most recently involved with developing the new Hyperlaunch feature for Xen with Star Lab.



Wednesday July 10, 2019 11:55am - 12:20pm CDT
Gallery, 5th Floor
  Sessions

12:25pm CDT

Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
The use of Virtual GPUs (vGPUs) has widely grown in server farms to give Virtual Machines (VMs) dedicated graphics. Software rendering with virtual CPUs can only take us so far and even with Intel-GVT, which uses integrated graphics, there isn't enough power to do the fun stuff. In this presentation, Jon Farrell will be talking about the process of implementing AMD MxGPU on Xen, challenges that he encountered while doing it, and discussing performance metrics of bare metal and vGPU VM on popular benchmarks like 3D Mark* and The Witcher 3. To wrap up his presentation, Jon will share his thoughts about future research and where this technology can take us.

Speakers
JF

Jonathan Farrell

Software Engineer, Assured Information Security, Inc.
Jon Farrell has a bachelor's degree in Computer Science from Binghamton University and has been employed by Assured Information Security (AIS) for the last three years. During that time, he has been working on the SecureView graphics team where he helped redesign the display architecture... Read More →



Wednesday July 10, 2019 12:25pm - 12:50pm CDT
Contemporary, 6th Floor
  Sessions

12:25pm CDT

Support of PV Devices in Nested Xen - Jürgen Groß, SUSE
Current support of nested virtualization with Xen is limited to fully emulated devices for the L1 hypervisor (L0 hypervisor being the one running on the physical machine). For being able to let L2 dom0 make use of L1 PV devices several new interfaces are needed.
In this design session I'll present my ideas how to add support of PV devices for L2 dom0. There are several possibilities how to do the work which I'd like to discuss.

Speakers
avatar for Jürgen Groß

Jürgen Groß

Virtualization Engineer, SUSE
Jürgen is contributing to Xen since 2007. About 6 years ago he joined SUSE to work full time on Xen. He is maintainer of Xen code in the Linux kernel and has added multiple major features to the Xen hypervisor, which he presented on previous Xen summits.



Wednesday July 10, 2019 12:25pm - 12:50pm CDT
Gallery, 5th Floor
  Sessions

12:50pm CDT

Lunch
Wednesday July 10, 2019 12:50pm - 1:50pm CDT
Canvas, 1st Floor

1:50pm CDT

Improve the Reliability and Efficiency of Late Microcode Update - Chao Gao, Intel
Microcode update is used to correct errata by loading an Intel-supplied data block (so-called microcode) into the processor. Especially, late microcode update (aka, load microcode to processors at run-time) avoids system reboot which is necessary in early microcode update and greatly reduces system downtime. But, current late microcode update on Xen may fail in some cases as microcode becomes more complex in order to fix some sophisticated security issues. Chao will introduce his work to improve reliability and efficiency of microcode update.

Speakers
CG

Chao Gao

Cloud Software Engineer, Intel
Chao has work for Intel for 4 years as a software engineer. He is responsible for enabling new Intel virtualization features in KVM/Xen and is familiar with interrupt virtualization, performance tuning and virtualization base security. Currently, Chao is working on using HLAT to enhance... Read More →



Wednesday July 10, 2019 1:50pm - 2:15pm CDT
Gallery, 5th Floor
  Sessions

1:50pm CDT

When Unikraft Meets Arm64 - Jia He, Arm
Unikraft allows developers to build unikernels targeted at specific applications easily.

Since Unikraft was announced, Arm has been actively involved to enable it on arm64 kvm platform.

In this presentation I intend to share:
1) Features status on arm64, kvm platform(merged and under review)
2) Scalability: multi-thread, SMP support
3) Todo list

I will also show some demos on Arm64 among them:
1) 2 veth NIC tx/rx using virtio-mmio bus
2) a lightweight web server


Speakers
avatar for Jia He

Jia He

Staff software engineer, Arm
Justin He is a Staff Software Engineer at Arm in the Opensource Software Ecosystem. He focuses on virtualization/kernel areas. He is responsible for kata-containers and Unikraft on Arm



Wednesday July 10, 2019 1:50pm - 2:15pm CDT
Contemporary, 6th Floor
  Sessions

2:20pm CDT

Deprivileging QEMU Device Models - Ian Jackson, Citrix
Xen uses qemu to provide a PC emulation for HVM x86 guests. In this scenario, qemu unavoidably has a large attack surface. In the default configuration, qemu runs with root privilege in dom0, so a code execution vulnerability in qemu is a host privilege escalation.

We have been working to reduce the privilege of qemu, even when run as a process in dom0. As of Xen 4.12 most of qemu's privilege within dom0 can be removed by running in the Tech Preview deprivileged mode. We are aiming to quickly make the feature fully supported, or perhaps even the default.

I will give a briefing on the state of qemu depriv in 4.12, including recommendations on when to enable this feature. And I'll survey the work to be done before we can declare it fully supported, and before we can enable it by default.

Speakers
IJ

Ian Jackson

Xen Committer, Citrix
Ian is a longstanding contributor to the Xen Project, working for Citrix as Xen committer, maintainer, security team member, CI system owner, etc.  Ian's other interests include a strong connection to the Debian Project.


slides pdf
talk txt

Wednesday July 10, 2019 2:20pm - 2:45pm CDT
Gallery, 5th Floor
  Sessions

2:20pm CDT

Using Xen to Enable an Open Source Safety Certifiable Automotive Grade Linux - Walt Miner, The Linux Foundation
The members of the Automotive Grade Linux (AGL) project have been developing the Unified Code Base (UCB) distribution for automotive use since 2015. Initially the focus was on In-Vehicle Infotainment systems, but lately the project has turned towards instrument cluster, telematics, heads-up display, and other safety critical systems that require ISO 26262 ASIL-B certification. Car and truck manufacturers are looking for AGL to provide a solution that makes use of AGL in a way that meets the demands of ISO 26262 and is readily available to a broad community. Walt takes a look at what has been done on the AGL community to prepare for this and looks to how AGL can work with the Xen project to make this a reality.

Speakers
avatar for Walt Miner

Walt Miner

AGL Community Manager, The Linux Foundation
Walt Miner has worked for The Linux Foundation as the Community Manager for Automotive Grade Linux since 2014. Walt has spoken at Automotive Linux Summit, Embedded World Conference in Nuremberg, Embedded Linux Conference, LinuxCon North America, and Open Source Summit North America... Read More →



Wednesday July 10, 2019 2:20pm - 2:45pm CDT
Contemporary, 6th Floor
  Sessions

2:50pm CDT

Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark, OpenXT Project
Defending the security of interconnected systems is shifting to depend upon methods for determining the level of trust to be placed in devices and users, with mandatory enforcement of access control policies and robust mechanisms for ensuring the integrity of communication between mutually-authenticated entities.

Virtualization-based security leverages trust in the hypervisor to provide strong mechanisms to virtual machines, enabling increased protection, in server, client and embedded deployments.

The interfaces provided by the hypervisor for inter-domain communication determine critical properties for data isolation and control of information flow.

Hypervisor-Mediated data eXchange describes key aspects of these data transfer primitives and has some support in Hyper-V. The first Open Source implementation of HMX is Argo, a Xen hypervisor feature developed with the OpenXT Project.

Speakers
avatar for Christopher Clark

Christopher Clark

Consultant, Hyperlaunch
Christopher Clark is a software consultant working on Open Source virtualization technology with the Xen hypervisor, most recently involved with developing the new Hyperlaunch feature for Xen with Star Lab.



Wednesday July 10, 2019 2:50pm - 3:15pm CDT
Contemporary, 6th Floor
  Sessions

2:50pm CDT

Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
2018 saw fundamental shifts in security boundaries which were previously taken for granted.  A lot of work has been done in the past 2 years, and largely in secret under embargo, but there is plenty more work to be done to strengthen the existing mitigations and to try to recover some performance without reopening security holes.

This talk will look at speculative execution sidechannels, the work which has already been done to mitigate the security holes, and future work which hopes to bring some improvements.

Speakers
AC

Andrew Cooper

Staff Software Engineer, Citrix
Andrew is a senior software engineer working in the Ring0 team for the Citrix Hypervisor. Upstream, he is an x86 hypervisor maintainer, committer, and a member of the Xen security team.


Wednesday July 10, 2019 2:50pm - 3:15pm CDT
Gallery, 5th Floor

3:15pm CDT

Coffee Break
Wednesday July 10, 2019 3:15pm - 3:45pm CDT
Gallery Foyer, 5th Floor

3:45pm CDT

A Journey to Mirage OS as Xen PVH - Marek Marczykowski-Górecki, Invisible Things Lab
Marek will present difficulties faced during converting Mirage OS Xen build from old PV-only Mini-OS fork, to recent Unikraft with addition of PVH support. This talk will focus mostly on the latter part - adding PVH support to Unikraft, it's current state and future work.
There will be also a little of context how is that useful for Qubes OS.

Speakers
MM

Marek Marczykowski-Górecki

Lead engineer, Invisible Things Lab
Marek is an experienced system architect and Linux administrator. He specializes in security, virtualization and high availability. His work as an active open-source contributor can be found in projects like Linux kernel, Linux-HA, Xen, and, of course, Qubes OS. Marek holds a master’s... Read More →



Wednesday July 10, 2019 3:45pm - 4:30pm CDT
Contemporary, 6th Floor
  Sessions

3:45pm CDT

Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
The Arm architecture provides a set of guidelines that any software should abide by when accessing the memory with MMU off and update page-tables. Failing to do so may result in getting TLB conflicts or breaking coherency.

In a previous talk ("Keeping coherency on Arm"), we focused on updating safely the stage-2 (aka P2M) page-tables. This talk will focus on the boot code and Xen memory management.

During this session, we will introduce some of the guidelines and when they should be used. We will also discuss how Xen boot sequence needs to be reworked to avoid breaking the guidelines.

Speakers
avatar for Julien Grall

Julien Grall

Xen maintainer, Amazon Web Services
Julien Grall is an kernel/hypervisor engineer in the Amazon EC2 team. He is currently working on adding support for live updating the Xen hypervisor. Julien has been involved in Xen community since 2012. Today he is a Xen Project committer, and he maintains Xen on Arm.


Wednesday July 10, 2019 3:45pm - 4:30pm CDT
Gallery, 5th Floor
  Sessions

4:35pm CDT

Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Systems UK Ltd
As the number of contributions grow, reviewer bandwidth becomes a bottleneck; and maintainers are always asking for more help. However, ultimately maintainers must at least Ack every patch that goes in; so if you're not a maintainer, how can you contribute? Why should anyone care about your opinion?

This talk will try to lay out some advice and guidelines for non-maintainers, for how they can do code review in a way which will effectively reduce the load on maintainers when they do come to review a patch.

Speakers
avatar for George Dunlap

George Dunlap

Principal Software Engineer, Citrix Systems R&D UK Ltd
George Dunlap worked with the Xen project while a graduate student at the University of Michigan before receiving his PhD in 2006, then worked as a core Xen developer for many years for Citrix's open-source team in Cambridge, England. He is now community manager and chairman of the... Read More →


Wednesday July 10, 2019 4:35pm - 5:20pm CDT
Gallery, 5th Floor
  Keynote Sessions

6:00pm CDT

All-Attendee Evening Event
Join us for an evening of networking, games, and food.

SPIN is only a 4 minute walk from the hotel.  Walking directions available.

Wednesday July 10, 2019 6:00pm - 9:00pm CDT
SPIN Chicago 344 N State St, Chicago, IL 60654
 
Thursday, July 11
 

8:00am CDT

Continental Breakfast
Thursday July 11, 2019 8:00am - 9:00am CDT
Gallery Foyer, 5th Floor

8:00am CDT

Registration
Thursday July 11, 2019 8:00am - 4:00pm CDT
Gallery Foyer, 5th Floor

9:00am CDT

9:00am CDT

9:50am CDT

Design Session: Live-updating Xen
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 9:50am - 10:35am CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

10:35am CDT

Coffee Break
Thursday July 11, 2019 10:35am - 11:05am CDT
Gallery Foyer, 5th Floor

11:05am CDT

Design Session: Exposing hardware-backed CPU timers to limit overhead from Xen's software timers
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 11:05am - 11:50am CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

11:05am CDT

Design Session: osstest before push to nonrewinding branch
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 11:05am - 11:50am CDT
Gallery 2/3, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

11:05am CDT

Design Session: Technical debt in the Xen ecosystem
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 11:05am - 11:50am CDT
Contemporary, 6th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

11:55am CDT

Design Session: LivePatch improvements and features
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 11:55am - 12:40pm CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

11:55am CDT

Design Session: Xen Adventures in Edge Computing
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 11:55am - 12:40pm CDT
Gallery 2/3, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

12:40pm CDT

Lunch
Thursday July 11, 2019 12:40pm - 1:40pm CDT
Canvas, 1st Floor

1:40pm CDT

1:40pm CDT

Design Session: Rust & Xen
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 1:40pm - 2:25pm CDT
Gallery 2/3, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

1:40pm CDT

Design Session: Virtio on Xen
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 1:40pm - 2:25pm CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

2:30pm CDT

Design Session: Run-time control of Speculative mitigation facilities
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 2:30pm - 3:15pm CDT
Gallery 2/3, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

2:30pm CDT

Design Session: Toolstacks for the future
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 2:30pm - 3:15pm CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

3:15pm CDT

Coffee Break
Thursday July 11, 2019 3:15pm - 3:45pm CDT
Gallery Foyer, 5th Floor

3:45pm CDT

Design Session: A new book on Xen?
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 3:45pm - 4:30pm CDT
Gallery 1, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

3:45pm CDT

Design Session: Nested virtualization
Design sessions are NOT presentations, but problem-solving sessions with tangible output (e.g. a set of notes published on a list, photos of whiteboards, etc). There is also no pre-determined schedule: attendees will vote which sessions they plan to attend during the event. Our design session scheduling tool will do automatic scheduling based on attendee input and minimize conflicts between attendees.

Design sessions can be submitted at any time, even during the event. To submit a design session, go to https://design-sessions.xenproject.org.

Examples of design sessions already submitted for this year’s summit are:
For a full list of submitted design sessions, go to https://design-sessions.xenproject.org/list/discussion


Thursday July 11, 2019 3:45pm - 4:30pm CDT
Gallery 2/3, 5th Floor
  Design Sessions
  • Experience Level Any
  • Audience Both

4:30pm CDT

4:30pm CDT

5:15pm CDT

5:15pm CDT