Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2539395imm; Mon, 24 Sep 2018 06:08:30 -0700 (PDT) X-Google-Smtp-Source: ACcGV60b+nn2w/i4Q8D20LiLtBHpH6p1QVE0tvfWp4c2tz8GDV2TvrWi8IuVukAvuIHgopvt1ZB7 X-Received: by 2002:a17:902:c3:: with SMTP id a61-v6mr10419199pla.279.1537794510736; Mon, 24 Sep 2018 06:08:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537794510; cv=none; d=google.com; s=arc-20160816; b=cH0HFLHV9WFHl55d6xnhWBhkPh198fQMcEGLN+YMmxtNopLLvi2d9MCCflwDz/lTTW z3oR7Hd46AaU8LYSTHiEnSlCmNaWIEQ/FL4zAqcqcEeqzT08c0S7q3GZrPwb4FJLvzRJ 04dMPIe5189PMcyqap9ji8Z6mVCq/L2LA5CS9+/UbMpEjhs+bv6+hDoRD+iCQ5D1RJUh UNpL2DE5qI9mQtAsTdg96nPvj64gGy12khQrzK6gJ1KiO43WzUjX3KrME9m9Q7U73apR WaOgWva5LWsYiMKG8apIM8q53igRDmxCyKmoTEYr03Xy6TpiNm+5JTog4F4SG9BUNymc U8jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:to :subject:from; bh=jS2XkK6s82QHqzx7VGcqS77cLmZiLcJ7u8aKVUVDt1M=; b=uEGuzwiGDo36TUcF4yf0rdKfQowspevuRAhQoVGITAsOTNkJOUifaV68QMo/JX8ADA ow7QNgD7DDKHpjSuustQGdUQGCrJtyVVaonL00nCsoP6M1M7Jmtr68PBYD52JBx9Bpnv 5fZsJb2N+PS/YIoYj+pMTOYtlJ2jb8fj/aKAujI+dUqAVoE5Z5rMkroQSbbrJpCGinfT GEPSfOXnvmlo6dMXa1piEGYkVidsmFmiKcIq2rP4tr5pnutr6wT/eldrKP00YwUWE+71 WUxpnThLHVH3ETmraqeIt7j8Ss/qOU7A48cxmyRkBoNWDxKXNMtmORx8aJEaMReGdA03 VbCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y86-v6si38086866pfi.195.2018.09.24.06.08.14; Mon, 24 Sep 2018 06:08:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729716AbeIXTJh (ORCPT + 99 others); Mon, 24 Sep 2018 15:09:37 -0400 Received: from thoth.sbs.de ([192.35.17.2]:51317 "EHLO thoth.sbs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728984AbeIXTJh (ORCPT ); Mon, 24 Sep 2018 15:09:37 -0400 X-Greylist: delayed 691 seconds by postgrey-1.27 at vger.kernel.org; Mon, 24 Sep 2018 15:09:34 EDT Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id w8OCu0aB030865 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 24 Sep 2018 14:56:00 +0200 Received: from [167.87.12.89] ([167.87.12.89]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id w8OCtxeg002243; Mon, 24 Sep 2018 14:55:59 +0200 From: Jan Kiszka Subject: [ANNOUNCE] Jailhouse 0.10 released To: Jailhouse Cc: Linux Kernel Mailing List X-Mozilla-News-Host: news://news://news://blaine.gmane.org Message-ID: <6b9ac0eb-653c-1d24-9126-6d138ed2edfd@siemens.com> Date: Mon, 24 Sep 2018 14:55:59 +0200 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org O'zapft is, so better release before going to the Wiesn: We are happy to announce a new version of the partitioning hypervisor Jailhouse. There is a similar amount of changes again, though some are more fundamental, namely the changes around per-cpu page tables: 174 commits, 248 files changed, 4013 insertions, 8548 deletions. The code reduction is primarily related to the removal of the vexpress target from CI as well as internal code reuse in the Python tool extension. - Removed targets: - VExpress (virtual ARMv7 target) - Cross-arch changes: - use per-cpu page tables to hide private information of other cells while running in the hypervisor (AKA generic and fast Spectre/L1TF mitigation) - support for EFI framebuffer as UART alternative - removal of VGA support (substituted by EFI framebuffer) - provide pyjailhouse module, so far as internal Python API to Jailhouse functionality (will be extended step-wise to public API) - "jailhouse hardware check" no longer requires a system config - inmates: convert all build-time configurations into cell configs and runtime parameters (AKA comm region also for ARM) - plug race between guest-controlled relocation of intercepted MMIO regions and their access - fix split-up of hughpages a higher addresses - fix write to MSI-X registers during PCI device hand-over - ARM / ARM64: - basic SMCCC moderation - fix GICv3 registers dispatching - support for more than 8 CPUs with GICv3 - fix unreliable startup on ARM64 due to missing cache flush - fix for printk() of long long variables - proper GICv2 shutdown after setup error - inmates: save/restore registers in interrupt handlers - x86: - harden non-present mappings against L1TF - CPU startup fix for slower targets - do no trap on writes to read-only APIC LVT bits - inmates: report SMI counter changes in apic-demo You can download the new release from https://github.com/siemens/jailhouse/archive/v0.10.tar.gz then follow the README.md for first steps on recommended evaluation platforms and check the tutorial session from ELC-E 2016 [1][2]. To try out Jailhouse in a virtual environment or on a few reference boards, there is an image generator available [3]. It will soon be updated to the new release as well. Drop us a note on the mailing list if you run into trouble. What's (probably) next? First of all, we are looking forward to a couple of IOMMU implementations for ARM64 targets. Still on my to-do list is enabling of the Ultra96 board that Xilinx kindly provided (primarily a jailhouse-images topic, but all preconditions are finally fulfilled). And the topic of inter-cell communication standardization is also not forgotten. The plan is now virtio over share memory transports, "just" needs a prototype and virtio spec extension proposals. Thanks to all the contributors and supporters! Jan [1] https://events.linuxfoundation.org/sites/events/files/slides/ELCE2016-Jailhouse-Tutorial.pdf [2] https://youtu.be/7fiJbwmhnRw?list=PLbzoR-pLrL6pRFP6SOywVJWdEHlmQE51q [3] https://github.com/siemens/jailhouse-images -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux