Skip to content

Latest commit

 

History

History
590 lines (453 loc) · 24.2 KB

CHANGES.md

File metadata and controls

590 lines (453 loc) · 24.2 KB

v0.9.0 (2024-10-11)

  • Fetch stdadomic.h from system on FreeBSD (#574, @shym, @hannesm)
  • Improve documentation about NAT & deployement (#575, @panglesd, @reynir)
  • Ensure reproducibility of installed objects (#576, @dinosaure)
  • Allow 4GB of memory for the unikernel (#577, @mato, @reynir, @Kensan, @hannesm)
  • Fix error path execution about unstable TSC from system (#578, @reynir, @hannesm)
  • -no-acpi is deprecated, use -machine acpi=off (#579, @wegank)
  • Fix yield on spt target (#582, @reynir, @Firobe)
  • Delete redundant check (#583, @hannesm, @PizieDust)
  • Multiple net devices for virtio targets (#581, @ricarkol, @palainp, @reynir, @hannesm)

v0.8.1 (2024-04-05)

  • Update the documentation about how to use Solo5 (@fabbing, @dinosaure, @Kensan, #558)
  • Fix few warnings about the new introduced TLS support (@greydot, #563)
  • Prevent the release if we get some errors with -Werror (@hannesm, @palainp, #565)
  • Fix the gdb support and the EFLAGS register (@greydot, @reynir, #567)
  • Fix few warnings and errors on FreeBSD 14 (@hannesm, #564)
  • Allow to pass HOSTAR and HOST_PKG_CONFIG for the NixOS support (@sternenseemann, #508)

v0.8.0 (2023-04-25)

  • Be able to build spt, virtio, muen and xen targets on OpenBSD (@adamsteen, #544). This change does not allow us to "run" these targets on OpenBSD

  • Fix linker scripts with TLS (Thread Local Storage) sections (@palainp, @hannesm, @dinosaure, #542)

  • Export TLS symbols (@palainp, @hannesm, @dinosaure, #546) breaking change due to #542 & #546, tenders must be upgraded. Indeed, solo5.0.7.* tenders will not be able to load correctly unikernels compiled with solo5.0.8.0. The internal ABI version for solo5-hvt/solo5-spt was upgraded accordingly.

    This version implements Thread Local Storage. The user can initialise a TLS block with solo5_tls_init on a pointer to solo5_tls_size() free bytes. Then, the user is able to set the tp (Thread Pointer) pointer via solo5_set_tls_base(solo5_tls_tp_offset(tls_block)). More details are available into solo5.h.

    Note: this change does not allow a Solo5 unikernel to use multiple cores! It only provides an API required by OCaml 5 / pthread to launch, at most, one thread.

  • Fix tests reported by NixOS (@greydot, @ehmry, #547)

  • Split out the time.c implementation between Muen and HVT (@dinosaure, @Kensan, #552)

  • User hypercall instead of TSC-based clock when the user asks for the wall-clock (@dinosaure, @reynir, #549, #550)

    Note: only hvt & virtio are updated to avoid a clock drift on the wall-clock. Indeed, when the unikernel is suspended, the wall-clock is not updated. Muen & Xen still use a TSC-based wall-clock. The spt target was already in sync with the host's wall-clock.

  • Improve the muen clock (@Kensan, #553)

  • Fix the .bss section according to #542 & #546. The .bss section is tagged with PT_LOAD. Tenders are available to load this section properly. (@Kensan, @dinosaure, #551, #554)

  • Fix the cross-compilation of Solo5 for aarch64 (@dinosaure, @palainp, @hannesm, #555)

  • Increase the Muen ABI (2 to 3) due to TLS changes (@Kensan, #557)

  • Support lifecycle management for Muen (@Kensan, #557) The user is able to configure automatic restarting of unikernels that invokes solo5_ext()

  • Fix the test_fpu test & ensure the alignment of variables (@Kensan, #557)

v0.7.5 (2022-12-07)

  • Since MirageOS moved from PV mode to PVH on Xen, and thus replacing Mini-OS with solo5, there was an issue in the solo5 code which failed to properly account the already written bytes on the console. This only occurs if the output to be performed does not fit in a single output buffer (2048 bytes on Xen).

    The code in question set the number of bytes written to the last written count written = output_some(buf), instead of increasing the written count written += output_some(buf).

    Thanks to Krzysztof Burghardt, Pierre Alain, Thomas Leonard & Hannes Mehnert for the issue, review and proposal. The fix is available here: #538.

v0.7.4 (2022-11-04)

  • Mark .text execute-only, currently only on OpenBSD (@adamsteen, #450)
  • Allow all log levels to be passed as command line parameter to the tender (added --solo5:error, --solo5:warn, --solo5:info) (@reynir, #532)
  • Add tender command line argument --block-sector-size:=int. This allows to specify the desired block sector size. The default if not provided is 512, the same that was used before (@reynir, #528, addresses partially #325)
  • Check that the file passed as block device is aligned to the block sector size (@reynir, #527)
  • Use realpath to determine toolchain paths - allowing tools being symlinks as they are on NixOS (@greydot, #526)
  • Allow slack in sleep in test_time (@greydot, #525, #535)
  • Fix build when using git worktree (.git being a file) (@reynir, #531)
  • Fix tests on OpenBSD 7.2 (@dinosaure, #535)
  • Add x-ci-failures on our OPAM files about CentOS 7 (@dinosaure, #535)

v0.7.3 (2022-07-20)

  • Fix broken API doc link in the README.md (@YuseiIto, #521)
  • Be more informative when tap_attach fails (@reynir, #522)
  • Ignore up variable to avoid compiler warning on FreeBSD (@hannesm, #520)

v0.7.2 (2022-05-27)

  • Suppress gcc array bounds warning in test_zeropage (@felixmoebius, #515)
  • Xen: retrieve mem_size uniformly via XENMEM_memory_map hypercall. Previously, the memory map was extracted from the HVM start info (if available and booting directly via PVH), or multiboot info (if booting via multiboot). The fallback for direct PVH booting was the XENMEM_memory_map hypercall (which retrieves an E820 memory map). This lead to three distinct paths, with no fallback for the memory map not being present in the multiboot info. With QubesOS 4.1 (Xen 4.14), this didn't work anymore (it worked with QubesOS 4.0 (Xen 4.8)). Now, there is a single path of the code, which uses the hypercall. Since this is only executed once at startup, the overhead is negligible (@hannesm, #516, review and discussions with @marmarek @xaki23 @palainp)
  • Xen: do not skip first token of command line when booted via multiboot. This code originated from the virtio binding, but when booting on xen via multiboot there is no additional token. (@hannesm, #517, review and testing with @palainp @xaki23)

v0.7.1 (2022-03-14)

  • Use note.not_openbsd instead of note.not-openbsd as section name in solo5-stubs.ld to be compatible with GNU ld 2.37 on e.g. Arch Linux, Fedora 35, Alpine 3.15 (@TheLortex, #509)
  • Fix opam-release.sh: the second variant is -cross-aarch64 (@dinosaure, #511)
  • elftool: support manifests read from stdin or written to stdout using the - character (@ehmry, #510)
  • Fix the compilation of test_tls on ppc64 architecture (@dinosaure, @hannesm, #514)

v0.7.0 (2021-12-31)

  • Remove Genode bindings (#494, #506) The Genode bindings becomes incompatible with the upcoming LLVM/Clang based toolchain. It can be reinstated in the future if there is interest.

    GENODE_ABI_TARGET is not removed to disallow to re-use it for another purpose than the Genode binding.

  • New packaging, toolchains, cross-compilation (#494, #506)

    • Make Solo5 installable system-wide and be able to packaging Solo5 for the BSDs and Linux distributions
    • Replace Solo5-internal use of pkg-config by generated toolchain wrappers installed as "PREFIX/bin/ARCH-solo5-none-static-{cc,ld,objcopy}"
    • Solo5 bindings (ABIs) are co-installable under the same PREFIX
    • OPAM packaging is simplified (only one package solo5 remains)
    • Experimental: support for the cross-compilation (specially aarch64)
  • virtio: FreeBSD requires the grub-bhyve command (#506)

  • virtio: FreeBSD: wait a bit for cat to create the nmdm device (#506)

  • OpenBSD: all supported releases of OpenBSD use ld.ldd (#495, #506)

  • Be able to release our cross toolchain via our opam-release.sh script (#504)

NOTE: pkg-config still is required by Solo5 to get flags from libseccomp.

0.6.9 (2021-12-13)

  • virtio: add missing reset for net and blk devices (#491)
  • CI: disable genode (#493) Genode bindings are failing to build on Debian testing / GCC 10.x.
  • Avoid "-" in section names (in the ld scripts) since some GNU ld versions reject that (alpine 3.15, Fefora 35) (#502)
  • On OpenBSD, OpenBSD 6.7 is not supported anymore, all support releases use ld.lld (#495)

0.6.8 (2020-12-17)

Bug fixes:

  • xen: Fix corrupted console output by correctly waiting for xenconsoled to consume all data. (#490)
  • hvt: Free kvm_cpuid after use. (#485)

New features:

  • xen: Add multiboot support. (#482)

Acknowledgements:

  • Thanks to Marek Marczykowski-Górecki (@marmarek) for implementing multiboot support for the Xen target.

0.6.7 (2020-10-08)

Bug fixes:

  • spt: Fix a bug where libseccomp's seccomp_load() would cause the tender to be killed by SIGSYS due to calling free(), which would under certain conditions call sbrk(), which is not in our seccomp filter. Work around this behaviour by exporting the generated BPF filter and loading it into the kernel manually. (#479)
  • Various improvements to the Xen bindings for use by MirageOS. (#480, #476).

0.6.6 (2020-07-21)

New features:

  • This release adds minimal bindings for the Xen hypervisor. Hosts running Xen 4.10 or later on x86_64 are supported, and the bindings build Solo5 unikernels as PVHv2 domUs only. These bindings are not a full Solo5 target; they exist for the purpose of providing low-level bootstrap code to MirageOS and do not provide any network or block I/O functionality.

Bug fixes:

  • genode: Do not yield for expired deadlines. (#466)

0.6.5 (2020-05-14)

New features:

  • Stop host kernels from attempting to execute Solo5 binaries. This improves both the user experience on some hosts (e.g. "No such file or directory" vs. "Segmentation fault" on Linux) and overall security posture by forcing the host kernel ELF loader to bail out earlier rather than actually jumping to the unikernel code. (#442)
  • hvt: Full support for W^X and correct guest-side page protections on OpenBSD 6.7+ systems with EPT. (#447)
  • hvt: capsicum(4) sandbox for the hvt tender on FreeBSD 12+. (#366)

Bug fixes:

  • hvt: Fix hang in HVT_HYPERCALL_POLL. On Linux hosts, if solo5_yield() was called with a deadline that has already passed and the unikernel was not using any network devices then the underlying hypercall would hang forever. Not known to affect any existing code in production. (#460)

Other notable changes:

  • muen: Muen ABI updates, now uses ABI version 2 on the Solo5 side. Muen commit f10bd6b or later is required. (#454, #448)
  • genode: Support for Genode is limited by toolchain issues and Genode bindings are no longer built by default. (#446, see also ocaml/opam-repository#16368)
  • Improvements to the build system on BSD/clang hosts. System headers (sys/endian.h, osreldate.h) that were mistakenly being installed into the Solo5-provided include paths have been removed. For OCaml/MirageOS users, ocaml-freestanding 0.6.0 or later is now required. (#453, #455, #457, #461, see also mirage/ocaml-solo5#77)
  • Improvements to built-in self tests. (#451)
  • Fix build failures with GCC >= 10. (#459)

Known issues:

  • Full W^X support / correct guest-side page protections are currently only available on the "spt" target on Linux, and the "hvt" target on OpenBSD 6.7 or later. (#303)
  • On OpenBSD, "hvt" operation with multiple network devices results in packet loss. This appears to be a bug in kqueue(2) but we have no confirmation from upstream. (#374)
  • virtio-net is not functional on at least QEMU 5.0 and possibly earlier versions. QEMU versions up to and including 3.1.0 are known to work. (#463)

Acknowledgements:

  • Thanks to Adam Steen (@adamsteen) for pushing for OpenBSD kernel support for manipulating guest EPT mappings, bringing full W^X to hvt on OpenBSD 6.7 or later.
  • Thanks to Adrian-Ken Rueegsegger (@kensan) for the Muen updates.
  • Thanks to Anurag Soni (@anuragsoni) for diagnosing and fixing the build on systems with GCC >= 10.
  • Thanks to Hannes Mehnert (@hannesm) for diagnosing #460 and for help with testing BSD/clang build system changes and generally helping out.
  • Thanks to Stefan Grundmann (@sg2342) for the capsicum(4) hvt tender sandbox on FreeBSD.

0.6.4 (2019-11-14)

This release updates the Genode and Muen bindings, and fixes the following notable issues:

  • Disk images produced by solo5-virtio-mkimage were not bootable due to changes in recent SYSLINUX versions (thanks to Ricardo Koller, @ricarkol for finding the fix).
  • Build failure on FreeBSD 12.1+ (clang 8.0.1) due to issues with TLS in the toolchain.

New features:

  • "configure.sh" has a new "--only-tools" option, which builds no tenders or bindings. In conjunction with "make install-tools", this can be used to install "solo5-elftool" only. This is intended for downstream systems which need to make use of "solo5-elftool" to query manifest information.
  • A "scripts/opam-release.sh" tool has been added to generate OPAM repository metadata as part of the Solo5 release process.

Apart from that, this release contains documentation updates and the "hvt" tender on the aarch64 architecture is now considered production-quality.

0.6.3 (2019-10-08)

This release fixes a build problem with Linux distributions such as OpenSUSE which install libseccomp headers into subdirectories of /usr/include. Note that this introduces pkg-config as a dependency for building Solo5 on Linux.

No functional changes.

0.6.2 (2019-09-23)

This release fixes further OPAM/MirageOS installation problems found by CI, and the following build problems:

  • spt: Support ppc64le on RedHat (thanks to Stefan Berger, @stefanberger).
  • Fix check/warning for libseccomp >= 2.3.3 (thanks to Mechiel Lukkien, @mjl-).

No functional changes.

0.6.1 (2019-09-19)

This release fixes OPAM/MirageOS installation problems found by CI. No functional changes.

Additionally, the following entry was missed from the changes for 0.6.0:

  • Solo5 tenders, tools and bindings now have an embedded version number, using the well-known convention "v0.6.0-4-gc9786d87". Bindings will log the version number during start-up. As a consequence of this, Solo5 now needs to be built from either a Git tree or a tarball produced by "make distrib". Suitable tarballs are uploaded to Github during the release process.

0.6.0 (2019-09-19)

This is a major feature release which introduces the concept of an "application manifest", which enables support for multiple network and block devices.

This release removes the compile-time specialization of the "hvt" tender. While this was a nice experiment, it is not practical for real-world deployment scenarios where it is expected that the party supplying the tender (i.e. the operator / user) will be different to the party supplying the unikernel (i.e. the developer).

Due to these and other changes, both the public Solo5 APIs (as defined and documented in solo5.h) and internal tenders/bindings ABI have changed. Likewise, the build process for Solo5-based unikernels has changed, and downstream projects will need to be updated.

Please refer to the following list of changes and the Solo5 documentation in docs/ for details.

New features:

  • Application manifest and support for multiple devices. New APIs have been added and existing APIs changed. See solo5.h for details. A new tool, "solo5-elftool" has been added to generate the binary application manifest from JSON source.
  • New "spt" (sandboxed process tender) target, allows running Solo5-based unikernels as user processes on Linux, using a minimal, strict seccomp-BPF sandbox for isolation. Runs on the x86_64, aarch64 and ppc64le processor architectures.
  • Compile-time specialization of the "hvt" (hardware virtualized tender) target has been removed. Two variants of the "hvt" tender are built, "solo5-hvt" and "solo5-hvt-debug" with support for GDB and guest coredumps where available.
  • Both the "hvt" and "spt" tenders and bindings now have an internal ABI version, and this ABI version is embedded into the unikernel binary. Tenders will not run a binary whose ABI version or target does not match.
  • Downsteam libOS projects using custom linker scripts for Solo5 will need to be updated to handle the ELF NOTEs used to embed the ABI version and application manifest in a Solo5 binary.

Security improvements:

  • Stack smashing protection is now supported and all bindings, tenders and other host tools are built with -fstack-protector-strong. This setting is also passed down to MirageOS unikernels via OPAM/pkg-config.
  • On Linux, tenders are built with -z noexecstack to enforce a non-executable stack.
  • Low memory, including the zero page, is now unmapped on "hvt", "spt" and "virtio" targets. Tender-internal structures in this memory range are mapped read-only.
  • Tests for W^X / guest-side page protections have been added and are enforced on those targets where this is supported.
  • The ELF loader used by tenders has undergone extensive review and re-factoring, and fixes for a number of potential security issues have been put in place.

Other changes:

  • The "hvt" tender now uses epoll(7) on Linux and kqueue(2) on the BSDs for network I/O.
  • The "hvt" tender "--dumpcore" option now requires a directory, which must exist at run time.
  • The printf() implementation used by bindings has been replaced with a much better implementation from https://github.com/mpaland/printf.
  • The solo5_set_tls_base() API has been added to give language runtimes that wish to manipulate the architecture-specific TLS base register an interface for it.
  • Many bug fixes, improvements and a lot of code review throughout.
  • A C11 compiler is now required, to allow for the use of _Static_assert().

Known issues:

  • Full W^X support is currently only possible on the "spt" target. Partial support is possible for the "hvt" target running on Linux/KVM hosts. (#303)
  • On OpenBSD, "hvt" operation with multiple network devices results in packet loss. This appears to be a bug in kqueue(2) but we have no confirmation from upstream. (#374)

Acknowledgements:

Thanks to the following new contributors to this release:

  • Frithjof Schulze (@schulze)
  • Haibo Xu (@xiaobo55x)
  • Stefan Berger (@stefanberger)

And finally, a special thank you to C For C's Sake (@cfcs) for extensive code review.

0.5.0 (N/A)

  • Skipped for version numbering consistency with downstream MirageOS/Solo5 components.

0.4.1 (2018-11-08)

This release introduces experimental support for the Genode Operating System Framework as a target for Solo5-based unikernels, and basic support for dropping "root" privileges in the "hvt" tender on FreeBSD and OpenBSD.

Other changes:

  • Migrate OPAM integration to OPAM 2.

Acknowledgements:

Thanks to the following new contributors to this release:

  • Emery Hemingway (@ehmry)
  • Stefan Grundmann (@sg2342)

0.4.0 (2018-09-14)

This release is a major restructuring and renaming of Solo5 components, primarily to reflect that the "ukvm monitor" is no longer specific to the KVM hypervisor and to allow for future development of further targets and tenders enabling different sandboxing technologies.

Major changes:

  • kernel/X: Moved to bindings/X, now referred to as the "Solo5 bindings for X". Build products are now named bindings/X/solo5_X.o.
    • kernel/solo5.h: Moved to include/solo5/solo5.h.
  • ukvm: Target has been renamed to hvt. Monitor code is now referred to as the hvt tender and has been moved to tenders/hvt/.
    • ukvm-configure: Now named solo5-hvt-configure.
    • ukvm-bin: Now named solo5-hvt.
    • ukvm/ukvm_guest.h: Renamed to include/solo5/hvt_abi.h.
  • Generated VM names used on FreeBSD and OpenBSD have been changed from ukvm%d to solo5-%d, with %d being the PID of the solo5-hvt tender.
  • Core file names produced by the hvt dumpcore module have been changed from core.ukvm.%d to core.solo5-hvt.%d.
  • solo5-run-virtio and solo5-mkimage: Renamed to solo5-virtio-run and solo5-virtio-mkimage respectively.
  • OPAM packages used by MirageOS have been renamed from solo5-kernel-X to solo5-bindings-X, accounting for the change from ukvm to hvt. Full details of the impact of this change on existing Mirage/Solo5 installations will be provided separately as part of a MirageOS release.

For further details please refer to the discussion and commits merged as part of #274.

Other changes:

  • Update OpenBSD requirements to 6.4 and minor OpenBSD build fixes (#270, #273).

0.3.1 (2018-08-10)

Minor point release with build fixes:

  • Fix array-bounds compilation error with newer compilers (#266, #267).
  • Synchronise with OpenBSD vmmvar.h changes (#268).

Thanks to the following new contributors to this release:

  • Rolf Sommerhalder (@hb9cwp)
  • Sven Anderson (@ansiwen)

0.3.0 (2018-06-15)

a.k.a. the "longest-overdue release in the history of the project", hopefully to stay that way.

The biggest user-visible changes by far are the porting of ukvm to run on FreeBSD and OpenBSD vmm, and the addition of support for the Muen Separation Kernel as a host system. Oh, and support for ARM64 as a host architecture.

Major changes:

  • Internal re-design and refactoring to enable support for multi-{arch, host system} (#171, #192).
  • ukvm: FreeBSD vmm support (#171).
  • ukvm: OpenBSD vmm support (#226).
  • Support for Muen Separation Kernel as a host system (#190).
  • aarch64 support (#209).
  • Much improved support for GDB server in ukvm (#198).
  • ukvm: Support for post-mortem debugging (guest core dumps) (#258).
  • ukvm: Support for setting guest memory size with --mem (#211).
  • Public (unikernel-facing) API refresh, documentation and cleanups (#244, #245).
  • Self-tests reworked using "bats" framework (#246).

Acknowledgements:

Thanks to the following new contributors to this release:

  • Adam Steen (@adamsteen)
  • Nikhil AP (@niks3089)
  • Wei Chen (@Weichen81)

0.2.2 (2017-04-04)

This release incorporates fixes since the release of MirageOS 3.0.

The changes in #166 may have a security impact, all users are encouraged to rebuild their deployed unikernels against this release.

Notable changes:

  • Add self-test for guest exception handling (#162).
  • Setup FPU in ukvm and add self-test for FPU/SSE operation (#163).
  • Fix check for KVM 32-bit gap (#165).
  • Replace kernel/lib.c with musl-derived implementations (#166).
  • solo5-virtio-run.sh support for Arch Linux (#168, #169).

Acknowledgements:

Thanks to the following new contributors to this release:

  • Adrian-Ken Rueegsegger (@Kensan)
  • Michael LeMay (@mdlemay)
  • Gabriel Jaldon (@gjaldon)

0.2.1 (2017-02-21)

Point release to address a compilation issue on systems with Clang 3.9 (#158) and correct license headers for some source files (#159).

0.2.0 (2017-01-26)

This release is targeted for use with MirageOS 3.0.

High-level user-visible changes in this release:

  • Support for building the virtio backend on FreeBSD.
  • The virtio drivers are now stable and tested on QEMU/KVM, FreeBSD/bhyve and Google Compute Engine.
  • A new option (--net-mac) for specifying a user-defined MAC address to ukvm.
  • A new script solo5-mkimage.sh for building MBR-partitioned disk images with a bootloader and Solo5 (virtio backed) unikernel, with integrated support for building images for Google Compute Engine.
  • A new script solo5-run-virtio for launching Solo5 (virtio backed) unikernels on QEMU/KVM and FreeBSD/bhyve.
  • Improvements to the standalone test programs under tests/, including an automated test suite.
  • Standardised license headers and copyright notices across the codebase and introduced an AUTHORS file listing contributors and their affiliations.

Notable changes under the hood:

  • Security audit of the ukvm "hypercall" interfaces and ELF loader.
  • Cleanup and refactoring of the low-level interrupt and trap handling code.
  • Memory layout improvements and unification between the ukvm and virtio backends.
  • Many bug fixes.

Acknowledgements:

The following people helped by filing valuable issues, testing and other non-code contributions to this release:

  • David Kaloper (@pqwy)
  • Hannes Mehnert (@hannesm)
  • Ian Campbell (@ijc25)
  • Sean Grove (@sgrove)

Thank you!

0.1.1 (2016-07-21)

  • Initial release for publishing to opam.ocaml.org.