From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6520575510316056576 X-Received: by 10.46.18.16 with SMTP id t16mr209669lje.40.1518191001803; Fri, 09 Feb 2018 07:43:21 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 10.25.72.82 with SMTP id v79ls800929lfa.7.gmail; Fri, 09 Feb 2018 07:43:21 -0800 (PST) X-Google-Smtp-Source: AH8x224NKZYCkkGQRbNZ/VEtkk6zxQ33j1ZUpUL14fI6Um2BTRqXMnyWj4lRqzQVzq7LA//2Rv+W X-Received: by 10.25.23.71 with SMTP id n68mr241547lfi.5.1518191001102; Fri, 09 Feb 2018 07:43:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518191001; cv=none; d=google.com; s=arc-20160816; b=n2vtcXQZEnxMxqBbDK8UKvbU4CrhSozsZeytqZw3/rRuNm+qS5VLahGIIbpa5OsWdW lkf9qh4W1k08LLDjkR+qVSrl96ek8zBBwCtta3mmt2ftH7wlQtXApV4KrfS/mCuwomIV bSq9/CBP2Ahj6H5K8PCS6/Iyg3XpP/EMREzainv+Wdq9NzSqcO8/AI86UbwvIt+e2HYC ZGNPFbgF1+MtMKc5NcOEwIWTgzptKzmV/nsrBdqpvuSE5I53fapj9yumYWcvpJVgxGis Y4le6+UH/IcGaIaaIO3ylU88QDo7RaRBYZwIl+kDUAgOo0KL6Z9aqKRpGpme8oL96e7D UMcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:references:to:from:subject :arc-authentication-results; bh=VmPl3FfoU7dEfAss4BDgiirlq0/C8QdRGeQUZOTu5AU=; b=j4/cFgIIRLFdjJk84WlSA0rmoeup1Jc5j3pcfRph3L0n0p51s93ZX+Wr9v/yTQjYH0 h7sdePpyfU1W5C3VYr/qOfWePZXzn8VeDibA4dyinSFB/yDW0K8xbIeQ/SR2d23yeqFO A9G1ShVKIC9xiltpyjOCzC1T2MCIcjPkL++0ooXG8TzYNazNZpAu2mjCi+QV98cZJILE hHEXbLJ3mi8dH/XhjKRBel1zxZ1qbeZ9q30f0lgl/rBIARQk3DDIuZiaLjQDa8imTLhX hfKAPYsNv4KRejyle3G/sAEufm2yLdnbBKiYjFpdqSDH4835tWfcgUY29k9fO28auQwi sJYA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id w29si175318lfc.5.2018.02.09.07.43.20 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 09 Feb 2018 07:43:21 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Received: from mail3.siemens.de (mail3.siemens.de [139.25.208.14]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id w19FhKhY019589 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 9 Feb 2018 16:43:20 +0100 Received: from [139.25.68.37] (md1q0hnc.ad001.siemens.net [139.25.68.37] (may be forged)) by mail3.siemens.de (8.15.2/8.15.2) with ESMTP id w19FhKd6001319; Fri, 9 Feb 2018 16:43:20 +0100 Subject: Re: x86-64 Jailhouse demo image generation using Isar From: Jan Kiszka To: Jailhouse , isar-users References: Message-ID: Date: Fri, 9 Feb 2018 16:43:19 +0100 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: Uu2nh9W77YAC On 2018-02-09 16:23, Jan Kiszka wrote: > Hi all, > > cross-posting to two communities as this is of common interested: > > I've just uploaded a new side-project of Jailhouse. It's called > jailhouse-images [1], and it aims at generating all what is required to > try out Jailhouse in QEMU/KVM environment. > > It does this by using the Isar image builder for Debian. So this project > may also serve the Isar project as reference and test case. > > I didn't write a README yet, but the project is almost self explaining: > > - make sure you have docker installed and can launch privileged > containers and qemu-system-x86_64 in a recent version (2.9 is fine > e.g.) > > - clone the jailhouse-images project [1] > > - run ./build-images.sh (takes about 15 minutes on a decent notebook > with decent Internet) > > - run ./start-qemu.sh x86 > > - log into the machine (root/root) and play with Jailhouse > > Jailhouse config files are installed under /etc/jailhouse, inmate images > /usr/libexec/jailhouse/demos. > > Jan > > [1] https://github.com/siemens/jailhouse-images > Forgot to mention some things: 1. Feedback if the whole setup works for others would be very welcome! 2. This actually stresses yet another OSS project of us: kas [2]. It's being used for Isar layer configuration management and bitbake setup along with its build container kasproject/kas-isar for Isar. 3. One already planned feature for jailhouse-images is support for a qemu-amd64 image, probably also stressing qemu-static vs. cross build support. We could also include support for bootable images of some of our reference boards at some point, but we will need some more tuning on Isar for that first (on wic in particular). And, eventually, this builder could spit out images for automated tests as well. Jan [2] https://github.com/siemens/kas -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux