Received: by 10.223.164.202 with SMTP id h10csp3467875wrb; Sun, 19 Nov 2017 23:01:24 -0800 (PST) X-Google-Smtp-Source: AGs4zMZtTWY5PXHTmP4J14NXrNg6mYIalYhUoZUbloMDMYQHAzkfdeE6ta1pOSmj8uhP42LAN3JF X-Received: by 10.84.143.68 with SMTP id 62mr12986560ply.315.1511161284595; Sun, 19 Nov 2017 23:01:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1511161284; cv=none; d=google.com; s=arc-20160816; b=d+ZDWWGYWk9v3RNulIZHfvINVT9VSaKyKDZ6e6Lv3j6n2hpyZ+oRibilDmzYUNz6vn TNxP3X+0C4IEpVBMWpPgf7t5FotE5NkNrxC5/H1z15jTEgy7REkzEvpqOH4ou3VzMerh v2+2h+rUxu+A8L2kmgVe80NJAW3gPP+I6RFJ6aZ/8o6Mn/CR+0yfLt16GGqSBOeGLBt5 Bymo6b8HcSu30TJvqK1Axmy30S7ScUL38eWH2lRweNvMdi8x+zpRm+gaQpw1AJSj9ZdS fIxw2y46ttDihR4x2sIPkSGw4FI3ibJeFsg8t1sl38N0BHt7gGuA3EvAsKtkq1VoHUDX w5lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=mgW970dgjfakLF/Me/lbuh+XwhEU+qLkvQUD0zY8VfQ=; b=jO5nB5l6YTMDsE597M1gPTIlNcQRBKe2DqKmAUJ0O2tm8ulvedURwK6utdHrgM3tmo YrGq/bMWo+32lgilXTT3V9wquA/7o4u8DwI8vILeQm4k2oEXn7vsJhSA8EHrf8r/FRvS qoeXaF62LD8NwH8UaEe5jkcf4QtursDT2/h1DpikFvh3lHj1iBiE00Ah/EFJDD274Zua UB3TAcrnAVXkl7ub62LCVYdxM8tvt/97Gpz44gXYQHf9PDZ5oC+vRfc88FX9ljn3bY4r fNWokUfBc6Two4JOHIuDgTPBT1aPXMsl6lJHs1L5ehYb3Lggbgg9Q8vPNytxKs5SMg0t aYJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15si7367898pgc.761.2017.11.19.23.01.13; Sun, 19 Nov 2017 23:01:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751109AbdKTHAg (ORCPT + 68 others); Mon, 20 Nov 2017 02:00:36 -0500 Received: from thoth.sbs.de ([192.35.17.2]:36990 "EHLO thoth.sbs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751021AbdKTHAe (ORCPT ); Mon, 20 Nov 2017 02:00:34 -0500 Received: from mail1.siemens.de (mail1.siemens.de [139.23.33.14]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id vAK70Mre010663 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 20 Nov 2017 08:00:23 +0100 Received: from md1f2u6c.ww002.siemens.net ([167.87.32.91]) by mail1.siemens.de (8.15.2/8.15.2) with ESMTP id vAK70L1P031452; Mon, 20 Nov 2017 08:00:22 +0100 Subject: Re: [PATCH 00/10] x86: Add support for running as secondary Jailhouse guest To: "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar Cc: x86@kernel.org, Linux Kernel Mailing List , jailhouse-dev@googlegroups.com References: <6c61ceb7-e3fe-57a8-de50-e8f573d18cfd@zytor.com> From: Jan Kiszka Message-ID: <4fd4a154-4f84-9ee4-a96f-23a84e7bc75c@siemens.com> Date: Mon, 20 Nov 2017 08:00:20 +0100 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 In-Reply-To: <6c61ceb7-e3fe-57a8-de50-e8f573d18cfd@zytor.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2017-11-18 22:15, H. Peter Anvin wrote: > On 11/15/17 23:26, Jan Kiszka wrote: >> This series paves the way to run Linux in so-called non-root cells >> (guest partitions) of the Jailhouse hypervisor. >> >> Jailhouse [1] was started 4 years ago as an open-source (GPL) leight- >> weight hypervisor that statically partitions SMP systems. It's unique in >> that it uses one Linux instance, the root cell, as boot loader and >> management console. Jailhouse targets use cases for hard real-time and >> safety-critical systems that KVM cannot cater due to its inherent >> complexity. >> >> Jaihouse can run bare-metal, free and closed-source RTOSes as secondary >> guests and, with this series, also x86 Linux instances. While ARM and >> ARM64 non-root Linux guests are feasible without extra patches, thanks >> to the high configurability via device trees, x86 requires special >> platform support, mostly to step away from non-existing resources in a >> non-root Jailhouse cell. >> > > Could you please write a single summary about the virtualization holes > in Jailhouse that you are papering over? Actually, we are not virtualizing any full device in Jailhouse. That is an architectural decision that allows to keep the critical code base very small (9200 LOC on Intel right now). So, anything that is not there multiple times is not exposed or problematic state modifications are blocked. That leaves the non-root cells with: - local CPU resources (processor, LAPIC etc.) - exclusive memory regions - exclusive PCI devices (or functions) - read access to the PM timer (as clocksource) - exclusively assigned pins on the IOAPIC (if any - it's not recommended to partition it) - virtual shared memory devices for inter-cell communication Thus, the list of non-existing x86 resources and features: - LPC with all its legacy devices like PIT, PIC, RTC, SMBus etc. (unless you decide to pass one through exclusively) - HPET - normal PCI bus topology - BIOS / UEFI firmware services, including ACPI enumeration (that lacks means to describe absence of PC platform devices anyway) - mass storage or network virtualization - sharing such devices is not in the scope of the hypervisor - no restart interface Deviations and restrictions: - CPU start address is configurable, typically set to 0 - but that's handled by the boot loader (comes with Jailhouse) - LAPIC can only be operated in flat mode, and the content of LDR is frozen Jan -- Siemens AG, Corporate Technology, CT RDA ITP SES-DE Corporate Competence Center Embedded Linux From 1584466790650109912@xxx Sun Nov 19 04:21:23 +0000 2017 X-GM-THRID: 1584207726806216160 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread