Important

This is the latest documentation for the unstable development branch of Project ACRN (master).
Use the drop-down menu on the left to select documentation for a stable release such as v3.2 or v3.0.

ACRN v3.0.2 (Nov 2022)

We are pleased to announce the release of the Project ACRN hypervisor version 3.0.2 with hot fixes to the v3.0 release.

ACRN is a flexible, lightweight reference hypervisor that is built with real-time and safety-criticality in mind. It is optimized to streamline embedded development through an open-source platform. See the What Is ACRN introduction for more information.

All project ACRN source code is maintained in the https://github.com/projectacrn/acrn-hypervisor repository and includes folders for the ACRN hypervisor, the ACRN device model, tools, and documentation. You can download this source code either as a zip or tar.gz file (see the ACRN v3.0.2 GitHub release page) or use Git clone and checkout commands:

git clone https://github.com/projectacrn/acrn-hypervisor
cd acrn-hypervisor
git checkout v3.0.2

The project’s online technical documentation is also tagged to correspond with a specific release: generated v3.0 documents can be found at https://projectacrn.github.io/3.0/. Documentation for the latest development branch is found at https://projectacrn.github.io/latest/.

ACRN v3.0.2 requires Ubuntu 20.04 (as does v3.0). Follow the instructions in the Getting Started Guide to get started with ACRN.

What’s New in v3.0.2

Passthrough PMU (performance monitor unit) to user VM only in debug builds

ACRN v2.6 introduced PMU passthrough to RT VMs that have LAPIC passthrough enabled. This is useful for performance profiling at development time but can cause workload interference in a production build. PMU passthrough is only enabled now for a hypervisor debug mode build.

Added tarfile member sanitization to Python tarfile package extractall() calls

A vulnerability in the ACRN Configurator is patched, where files extracted from a maliciously crafted tarball could be written to somewhere outside the target directory and cause unsafe behavior.

Run executables with absolute paths in board inspector

Using partial executable paths in the board inspector may cause unintended results when another executable has the same name and is found via PATH settings. The board inspector now uses absolute paths to executable.

See ACRN v3.0 (Jun 2022) and ACRN v3.0.1 (Jul 2022) for additional release information.