On 21.07.20 16:33, [email protected] wrote:
I have been reluctant to ask this question for quite a while, especially from third perspective security, which actually goes hand-in-hand with the second.

Jan schrieb am Montag, 20. Juli 2020 um 23:27:54 UTC+2:

    On 20.07.20 09:57, Rick Xu wrote:
     > For 3 reasons, first, it uses a LINUX as a host OS and then
    changes it
     > to a guest OS, so a running host OS was saved.
     > Second, less virtualization and more real-time.
     > Third,  it's easy to use.
     > [..]
     > And if it has not been used for products, why?

From my last months' view of setting up an academical use-case of a mixed criticality/mixed security-level system, from the perspective of an application-oriented engineer, I would not agree on the term 'easy'. I have also setup my use-case using other hypervisors, which I would consider 'easier', but I hit other barriers. Though, everything has pros and cons and I may be comparing apples with chocolate cheesecake, not blaming anyone. It is really cool to see the improved features and the HW support growing on ARM systems. At this point, I find Jailhouse being quite tightly interwoven with its underlying HW, in other words, without excellent knowledge of the HW, setting up JH is really hard. If I had only one wish, it would be improving the documentation for Jailhouse integrators.

I don't disagree. I think NXP and TI did some work in the context of their SDKs, though even that is limited when a customer actually wants to map that on a concrete product design. And general bits of information are better shared in the central project. Contributions welcome (TM)!


    Jailhouse is primarily useful in two application areas. [...]

    The second, still more research-like area is functional safety. This is
    our (Siemens) primary focus with Jailhouse. And while we are still
    waiting for and even collaborating on developing [3] a certifiable [...]

The Selene Project sounds interesting, all the best with that!
I am/was working on a project on mixed-criticality security certification and certifiable HW really is still a blind spot. (what about, "we just _trust_ Intel processors to do the right thing"?!)


Would you enjoy riding a train where the signalling system was built with blind trust? Don't worry, you won't because the authorities would not allow us to release such trains onto the track.

I believe, in the not so far future a good portion of mixed-criticality systems will also require security certification (to prove integrity of the safety function). Nothing can function in a void. Any (modern) critical functionality requires some sort of networking / data exchange and it is quite wise to split that off into different cells, so there are different certification levels - both in terms of safety (thorough, long-term) and of security (quick update/patches). Jailhouse really shows how much we trust in the underlying HW for these separation guarantees.

Exactly our concerns. So even if you make it "simpler" by not using hardware virtualization (with its arch and SoC specialties), you will end up trying to certify a "simple" OS that does the partitioning for the different functions with "standard" OS/process isolation means. And... you will still hit almost the same questions about complex multicore hardware, how to ensure it does what needs to do for the OS in that case. Plus you may end up with a way more complex partitioning layer, way closer to Linux than to Jailhouse.

There are evolving security standards like ISO62443, or, e.g., its derivative EN 50701 for railway. However, from my current understanding Jailhouse is still too "low-level" and would require more tooling and documentation to enable "easy" product certification. And this could become a professional/commercial service beyond the open-source initiative or requires additional forces in the product development.

Definitely. We went with a plan for many of those todos /wrt safety to TÜV a couple of years ago, at a time where we were still hoping for a breakthrough on the hardware front. It would be quite a bit of work, but it is more or less clear that this would be feasible (was also the inofficial feedback from the authorities back then), and that also economically. Still, more homework would be needed to map results on a concrete product.

BTW, https://cip-project.org is looking into 62443 compliance for a small Linux base system. I'm not directly involved on that topic but on the project in general, and I can confirm from that level that concrete topics so far are different from what is bothering us /wrt safety certifications.

Jan

--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux

--
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jailhouse-dev/53766782-fbb9-d91f-592d-bc932955bafa%40siemens.com.

Reply via email to