lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <9bdd0eae-dbaf-f5a3-d067-81b0ae88522f@siemens.com>
Date:   Thu, 20 Feb 2020 08:09:50 +0100
From:   Jan Kiszka <jan.kiszka@...mens.com>
To:     Peng Fan <peng.fan@....com>,
        Jailhouse <jailhouse-dev@...glegroups.com>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Alice Guo <alice.guo@....com>
Subject: Re: [ANNOUNCE] Jailhouse 0.12 released

On 20.02.20 03:39, Peng Fan wrote:
>> Subject: [ANNOUNCE] Jailhouse 0.12 released
>>
>> This release is an important milestone for Jailhouse because it comes with a
>> reworked inter-cell communication device with better driver support and
>> even an experimental virtio transport model for this.
> 
> Great to know this.

If there is interest, please provide feedback, ideally also in the 
circle where I started spec discussions and QEMU implementation.

> 
>>
>> While this shared memory device model is still in discussion with virtio and
>> QEMU communities, thus may undergo some further smaller changes, it was
>> important to move forward with it because there is an increasing demand for
>> it on the Jailhouse side. We now support multi-peer connection, have a secure
>> (unprivileged) and efficient UIO driver and can even start working on virtio
>> integration - without having to touch the hypervisor any further. More
>> information also in [1].
> 
> Do we need to use qemu for virtio backend?
> 

Nope, in fact there are only primitive demo backends for block and 
console available that make use of UIO, see

http://git.kiszka.org/?p=linux.git;a=blob;f=tools/virtio/virtio-ivshmem-block.c;h=c97aa5076a6d22ccd01862f3e4db0e12641825c3;hb=refs/heads/queues/ivshmem2

and

http://git.kiszka.org/?p=linux.git;a=blob;f=tools/virtio/virtio-ivshmem-console.c;h=c79be22c6a7aa4c2eb49561e8c0d7c9a052e393d;hb=refs/heads/queues/ivshmem2

I was hoping to find something useful in ACRN but didn't succeed. So I 
hacked up these two (basically in two evenings, that's why these two are 
copy&paste). For the future, when the transport is more stable, looking 
into a vhost mapping could be beneficial, specifically for networking. 
Another direction could be https://github.com/rust-vmm/vm-virtio.

>>
>> The release has another important new, and that is SMMUv3 for ARM64
>> target, as well as the TI-specific MPU-like Peripheral Virtualization Unit (PVU).
>> SMMUv2 support is unfortunately still waiting in some NXP downstream
>> branch for being pushed upstream.
> 
> Alice in Cc is doing this effort together with i.MX8QM upstreaming.
> 

Great, looking forward!

>>
>> Note that there are several changes to the configuration format that require
>> adjustments of own configs. Please study related changes in our reference
>> configurations or, on x86, re-generate the system configuration.
>>
>> Due to all these significant changes, statistics for this release look about more
>> heavyweight than usual:
>> 195 files changed, 7185 insertions(+), 2612 deletions(-)
> 
> Yeah!! Besides this, any people still interested in booting jailhouse before Linux?
> I have achieved this on i.MX8MM with Linux + gic-demo cell, with a baremetal
> program and using U-Boot FIT to load all images.

Yes, there is definitely interest, for various reasons. One can be cache 
coloring. We are also considering to look into this boot mode in the 
context of the just started RISC-V port. And there might be a case on 
x86 again, but the boot environment is still not clear to me there 
(likely not UEFI).

If you have a prototype for ARM64 and U-Boot, that would be great to see 
it, maybe let more people play with it. Eventually, I want to start 
discussing requirements and potentially required new interfaces.

Jan

-- 
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ