Evaluation of a Multiple Criticality Real-Time Virtual Machine System and Configuration of an RTOS's Resources Allocation Te

Total Page:16

File Type:pdf, Size:1020Kb

Evaluation of a Multiple Criticality Real-Time Virtual Machine System and Configuration of an RTOS's Resources Allocation Te Evaluation of a multiple criticality real-time virtual machine system and configuration of an RTOS’s resources allocation techniques Mohamed El Mehdi Aichouch To cite this version: Mohamed El Mehdi Aichouch. Evaluation of a multiple criticality real-time virtual machine system and configuration of an RTOS’s resources allocation techniques. Electronics. INSA de Rennes, 2014. English. NNT : 2014ISAR0014. tel-01127450 HAL Id: tel-01127450 https://tel.archives-ouvertes.fr/tel-01127450 Submitted on 7 Mar 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE INSA Rennes présentée par sous le sceau de l’Université européenne de Bretagne pour obtenir le titre de Mohamed El Mehdi Aichouch DOCTEUR DE L’INSA DE RENNES ECOLE DOCTORALE : Matisse Spécialité : Electronique et Télécommunication LABORATOIRE : IETR Thèse soutenue le 28.05.2014 Evaluation of a Multiple devant le jury composé de : Criticality Rea-Time Virtual Isabelle Puaut Professeur à l’université de Rennes 1 / Président Machine System and Laurent Pautet Professeur à Télécom Paris-Tech / rapporteur Configuration of an RTOS’s François Verdier Professeur à l’université de Nice-Sophia Antipolis / rapporteur Resources Allocation Jean-Luc Béchennec Chargé de recherche à l’IRRCyN CNRS UMR 6597 à Nantes / examinateur Techniques Jean-Christophe Prévotet Maître de conférence à l’INSA de Rennes / Co-encadrant de thèse Fabienne Nouvel Maître de conférence à l’INSA de Rennes / Directeur de thèse Evaluation of a Multiple-Criticality Real-Time Virtual Machine System and Configuration of an RTOS’s Resources Allocation Techniques. Mohamed El Mehdi Aichouch A dissertation submitted to the faculty of the INSA de Rennes in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Electronic and Telecommunication. INSA de Rennes 2014 Approved by: Isabelle Puaut Jean-Luc Bechennec´ Laurent Pautet Franc¸ois Verdier Jean-Christophe Prevotet´ Fabienne Nouvel ©2014 Mohamed El Mehdi Aichouch ALL RIGHTS RESERVED ii ABSTRACT Mohamed El Mehdi Aichouch Evaluation of a Multiple-Criticality Real-Time Virtual Machine System and Configuration of an RTOS’s Resources Allocation Techniques. In the domain of server and mainframe systems, virtualizing a computing system’s physical resources to achieve improved sharing and utilization has been well established for decades. Full virtualization of all system resources, including processor, memory and I/O devices makes it pos- sible to run multiple operating systems on a single physical platform. Recently, the availability of full virtualization on physical platforms that target embedded systems creates new uses cases in the domain of real-time embedded systems. In a non virtualized system, a single OS controls all hard- ware platform resources. A virtualized system includes a new layer of software, the virtual machine monitor (VMM). The VMM’s principal role is to arbitrate accesses to the underlying physical host platform’s resources so that multiple operating systems can share them. The VMM presents to each OS a set of virtual platform interfaces that constitute a virtual machine. Given the existence of a multitude of VMMs that have been proved efficient in the domain of server and mainframe systems, there is a trend to reuse the existing work. However, there is a difference in the performance metric required by these two domains. In this dissertation we use an existing VMM to evaluate the performance of a real-time operating system. We observed that the virtual machine monitor affects the internal overheads and latencies of the guest operating system. This observation led us to conduct further investigation in order to answer the following question: what are the hardware mechanisms and software implementations that could prevent the system from meeting its deadlines and guaranteeing its real-time constraints? Our analysis revealed that hardware mechanisms that allow a VMM to provide an efficient way to virtualize the memory management unit, and the device interrupts, are necessary to limit the overhead of the virtualization on real-time systems. More importantly, the scheduling of virtual iii machines by the VMM is essential to guarantee the temporal constraints of the system and have to be configured carefully. In a second work, and starting from a previous project aiming at helping a system designer to explore a software-hardware co-design of a solution using high-level simulation models, we proposed a methodology that allow the transformation of a simulation model into an executable program on a real hardware. The idea is to provide the system designer with the necessary tools to rapidly explore the design space and validate it, and then to generate a configuration that could be used directly on top of a real hardware. We used a model-driven engineering approach to perform a model-to-model transformation to convert the simulation model into an executable model. And we used a middleware able to sup- port a variety of resources allocation techniques in order to implement the configuration previously selected by the system designer during the simulation phase. We proposed a prototype that imple- ments our methodology and validate our concepts. The results of the experiments confirmed the viability of the approach. iv To my parents, Abdelhamid and Kalthoum. v ACKNOWLEDGEMENTS I would like to thank my advisors, Fabienne Nouvel and Jean-Christophe Prevotet´ for their unwavering support, for their help, and their precious advices. I would like to express my thanks and appreciation to all the members of my committe, Pro- fessor Isabelle Puaut, Professor Franc¸ois Verdier, Professor Laurent Pautet, and Doctor Jean-Luc Bechennec´ for their guidance and advice. Your acceptance to be present in my committe is great honor for me. I would also like to express my thanks and appreciation to all my colleagues. Very special thanks to Yaset Oliva, Yvan Kokar, Thierry Dubois, Tony Makdissy, Nicolas Cornillet, Jordan Lo- randel, Philippe Tanguy, Simon Mener, Vincent Callec, Abdallah Hamini, Ahmed Jaban, Saber Dakhli, Imen Ben Trad, Rida El Chall, Hiba Bawab, Hua Fu, Jean-Christophe Sibel, Ming Liu, Hui Ji, Linning Peng, Tian Xia, Ali Cheaito, Mohamed Maaz, Roua Youssef, Hussein Kudoh, Hanna Farhat, Bachir Habib, Georges Da Silva, Sofiane Chaabane, Morad Larbi, and Abdul Fall. — thank y’all for your kindness and the great moment we shared in our beautiful work place. I am deeply thankful to my colleague and friend Yaset Oliva for reviewing my research papers and giving me many precious adivces. Thank you very much for the interesting discussions, and for your help when I came to Rennes. I would like also to thank all the professors, research scientists, and technical staff at the In- stitut d’Electronique´ et de Tel´ ecommunication´ de Rennes. I would like also to thank all the SRC department staff at the INSA de Rennes. I am deeply thankful to my professor Benoˆıt Miramond, thank you for inviting me to join your research team and for your encouragement that motivated me to continue in this scientific research field. I am deeply thankful to my friend Mac Mollisson, from the real-time system group at the University of North Carolina at Chappel Hill, thank you very much for your support regarding the library, and thanks a lot for the great discussions and feedback regarding my research work. vi Foremost, I am greatly indebted to my parents Abdelhamid and Kalthoum for their unwavering support, understanding, and encouragement, both during my research study and before. I am also greatly indebted to my sister Nesrine and my brother-in-law Aimed, for their love and continuous support, for their help, and the wonderful times we spent together. I am also grateful to all my family members and friends. Thank you very much for your generosity and friendship. I could not finished this without you — thank y’all for your trust that this was indeed the right way. vii TABLE OF CONTENTS LISTOFTABLES ........................................ xiii LISTOFFIGURES ........................................ ............................... xiv LISTOFABBREVIATIONS ................................. xvii 1 Introduction . ............................. 1 2 RelatedWork.......................................... ................................ 3 2.1 Real-Time OS alongside General-Purpose OS . ........... 4 2.1.1 Dual-Kernel Design . .................. 5 2.1.2 Native Real-Time Linux . ............... 6 2.2 Virtual Machine Systems . .................... 7 2.3 Real-Time Virtual Machine Systems . ............... 9 2.3.1 Linux Kernel-based Virtual Machine . ........... 9 2.3.2 Microkernel Support for Virtualization . 13 2.3.2.1 OKL4 microvisor . 14 2.3.2.2 Nova microhypervisor . 15 2.3.2.3 L4Fiasco microkernel . 16 2.3.3 Xen.............................................. ........................ 19 2.3.4 RT-Xen ........................................... ....................... 23 2.3.5 Real-Time Xen-ARM . 30 2.3.6 Virtualization for safety-critical system . 32 2.4 RTOS Configuration . ..................
Recommended publications
  • Industrial Control Via Application Containers: Migrating from Bare-Metal to IAAS
    Industrial Control via Application Containers: Migrating from Bare-Metal to IAAS Florian Hofer, Student Member, IEEE Martin A. Sehr Antonio Iannopollo, Member, IEEE Faculty of Computer Science Corporate Technology EECS Department Free University of Bolzano-Bozen Siemens Corporation University of California Bolzano, Italy Berkeley, CA 94704, USA Berkeley, CA 94720, USA fl[email protected] [email protected] [email protected] Ines Ugalde Alberto Sangiovanni-Vincentelli, Fellow, IEEE Barbara Russo Corporate Technology EECS Department Faculty of Computer Science Siemens Corporation University of California Free University of Bolzano-Bozen Berkeley, CA 94704, USA Berkeley, CA 94720, USA Bolzano, Italy [email protected] [email protected] [email protected] Abstract—We explore the challenges and opportunities of control design full authority over the environment in which shifting industrial control software from dedicated hardware to its software will run, it is not straightforward to determine bare-metal servers or cloud computing platforms using off the under what conditions the software can be executed on cloud shelf technologies. In particular, we demonstrate that executing time-critical applications on cloud platforms is viable based on computing platforms due to resource virtualization. Yet, we a series of dedicated latency tests targeting relevant real-time believe that the principles of Industry 4.0 present a unique configurations. opportunity to explore complementing traditional automation Index Terms—Industrial Control Systems, Real-Time, IAAS, components with a novel control architecture [3]. Containers, Determinism We believe that modern virtualization techniques such as application containerization [3]–[5] are essential for adequate I. INTRODUCTION utilization of cloud computing resources in industrial con- Emerging technologies such as the Internet of Things and trol systems.
    [Show full text]
  • The Many Approaches to Real-Time and Safety Critical Linux Systems
    Corporate Technology The Many Approaches to Real-Time and Safety-Critical Linux Open Source Summit Japan 2017 Prof. Dr. Wolfgang Mauerer Siemens AG, Corporate Research and Technologies Smart Embedded Systems Corporate Competence Centre Embedded Linux Copyright c 2017, Siemens AG. All rights reserved. Page 1 31. Mai 2017 W. Mauerer Siemens Corporate Technology Corporate Technology The Many Approaches to Real-Time and Safety-Critical Linux Open Source Summit Japan 2017 Prof. Dr. Wolfgang Mauerer, Ralf Ramsauer, Andreas Kolbl¨ Siemens AG, Corporate Research and Technologies Smart Embedded Systems Corporate Competence Centre Embedded Linux Copyright c 2017, Siemens AG. All rights reserved. Page 1 31. Mai 2017 W. Mauerer Siemens Corporate Technology Overview 1 Real-Time and Safety 2 Approaches to Real-Time Architectural Possibilities Practical Approaches 3 Approaches to Linux-Safety 4 Guidelines and Outlook Page 2 31. Mai 2017 W. Mauerer Siemens Corporate Technology Introduction & Overview About Siemens Corporate Technology: Corporate Competence Centre Embedded Linux Technical University of Applied Science Regensburg Theoretical Computer Science Head of Digitalisation Laboratory Target Audience Assumptions System Builders & Architects, Software Architects Linux Experience available Not necessarily RT-Linux and Safety-Critical Linux experts Page 3 31. Mai 2017 W. Mauerer Siemens Corporate Technology A journey through the worlds of real-time and safety Page 4 31. Mai 2017 W. Mauerer Siemens Corporate Technology Outline 1 Real-Time and Safety 2 Approaches to Real-Time Architectural Possibilities Practical Approaches 3 Approaches to Linux-Safety 4 Guidelines and Outlook Page 5 31. Mai 2017 W. Mauerer Siemens Corporate Technology Real-Time: What and Why? I Real Time Real Fast Deterministic responses to stimuli Caches, TLB, Lookahead Bounded latencies (not too late, not too Pipelines early) Optimise average case Repeatable results Optimise/quantify worst case Page 6 31.
    [Show full text]
  • Xtratum User Manual
    XtratuM Hypervisor for LEON4 Volume 2: XtratuM User Manual Miguel Masmano, Alfons Crespo, Javier Coronel November, 2012 Reference: xm-4-usermanual-047d This page is intentionally left blank. iii/134 DOCUMENT CONTROL PAGE TITLE: XtratuM Hypervisor for LEON4: Volume 2: XtratuM User Manual AUTHOR/S: Miguel Masmano, Alfons Crespo, Javier Coronel LAST PAGE NUMBER: 134 VERSION OF SOURCE CODE: XtratuM 4 for LEON3 () REFERENCE ID: xm-4-usermanual-047d SUMMARY: This guide describes the fundamental concepts and the features provided by the API of the XtratuM hypervisor. DISCLAIMER: This documentation is currently under active development. Therefore, there are no explicit or implied warranties regarding any properties, including, but not limited to, correctness and fitness for purpose. Contributions to this documentation (new material, suggestions or corrections) are welcome. REFERENCING THIS DOCUMENT: @techreport fxm-4-usermanual-047d, title = fXtratuM Hypervisor for LEON4: Volume 2: XtratuM User Manualg, author = f Miguel Masmano and Alfons Crespo and Javier Coronelg, institution = fUniversidad Polit´ecnicade Valenciag, number = fxm-4-usermanual-047dg, year=fNovember, 2012g, g Copyright c November, 2012 Miguel Masmano, Alfons Crespo, Javier Coronel Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled ”GNU Free Documentation License”. Changes: Version Date Comments 0.1 November, 2011 [xm-4-usermanual-047] Initial document 0.2 March, 2012 [xm-4-usermanual-047b] IOMMU included.
    [Show full text]
  • TECOM Project Results Leaflet
    Project Results TECOM (ITEA2 ~ 06038) Delivering trust in embedded ••••••••••••••• systems n Partners Offering secure and dependable solutions Atego EADS DS for a wide range of applications Fagor ••••••••••••••••••••••••••••••••••••• Ikerlan Technicolor Technikon The TECOM (Trusted Embedded ABSTRACT ARCHITECTURES Trialog Computing) project has developed TECOM focused on the growing demand Universidad Politécnica de Madrid architectures and solutions combining for execution platforms in embedded Universidad Politécnica de Valencia embedded trust services and trusted systems that address both integrity and Visual Tools operating system technologies to security concerns. It developed abstract ensure security and dependability in architectures based on generic modules a wide range of complex and dynamic involving on one side an embedded trust n Countries involved embedded systems. The project focused services layer offering hardware security, on enabling multiple applications to and on the other trusted operating Austria be run safely on the same systems system technology involving system and France and processors while acting totally middleware space. The result can be Spain independently of each other. customised to a specific application. Applications range from protecting film rights in video-on-demand applications The state-of-the art approach to trust at n Project start to ensuring bug-free software upgrades systems level, close to the processor, is September 2007 in domestic appliances. some form of hypervisor or virtualisation application for securely partitioning the n Project end Industry and society are increasingly applications. While this has already been August 2010 dependent on embedded systems that are developed for use on PCs where it was becoming ever more complex, dynamic and possible to run two windows independently open, while interacting with progressively at the same time, it has not been available more demanding and heterogeneous for embedded systems.
    [Show full text]
  • Enabling Mobile Service Continuity Across Orchestrated Edge Networks
    This is a postprint version of the following published document: Abdullaziz, O. I., Wang, L. C., Chundrigar, S. B. y Huang, K. L. (2019). Enabling Mobile Service Continuity across Orchestrated Edge Networks. IEEE Transactions on Network Science and Engineering, 7(3), pp. 1774-1787. DOI: https://doi.org/10.1109/TNSE.2019.2953129 © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Enabling Mobile Service Continuity across Orchestrated Edge Networks Osamah Ibrahiem Abdullaziz, Student Member, IEEE, Li-Chun Wang, Fellow, IEEE, Shahzoob Bilal Chundrigar and Kuei-Li Huang Abstract—Edge networking has become an important technology for providing low-latency services to end users. However, deploying an edge network does not guarantee continuous service for mobile users. Mobility can cause frequent interruptions and network delays as users leave the initial serving edge. In this paper, we propose a solution to provide transparent service continuity for mobile users in large-scale WiFi networks. The contribution of this work has three parts. First, we propose ARNAB architecture to achieve mobile service continuity. The term ARNAB means rabbit in Arabic, which represents an Architecture for Transparent Service Continuity via Double-tier Migration. The first tier migrates user connectivity, while the second tier migrates user containerized applications. ARNAB provides mobile services just like rabbits hop through the WiFi infrastructure.
    [Show full text]
  • Building Embedded Linux Systems ,Roadmap.18084 Page Ii Wednesday, August 6, 2008 9:05 AM
    Building Embedded Linux Systems ,roadmap.18084 Page ii Wednesday, August 6, 2008 9:05 AM Other Linux resources from O’Reilly Related titles Designing Embedded Programming Embedded Hardware Systems Linux Device Drivers Running Linux Linux in a Nutshell Understanding the Linux Linux Network Adminis- Kernel trator’s Guide Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today for free. main.title Page iii Monday, May 19, 2008 11:21 AM SECOND EDITION Building Embedded Linux SystemsTomcat ™ The Definitive Guide Karim Yaghmour, JonJason Masters, Brittain Gilad and Ben-Yossef, Ian F. Darwin and Philippe Gerum Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Building Embedded Linux Systems, Second Edition by Karim Yaghmour, Jon Masters, Gilad Ben-Yossef, and Philippe Gerum Copyright © 2008 Karim Yaghmour and Jon Masters.
    [Show full text]
  • Spatial Isolation Refers to the System Ability to Detect and Avoid the Possibility That a Partition Can Access to Another Partition for Reading Or Writing
    Virtualización Apolinar González Alfons Crespo OUTLINE Introduction Virtualisation techniques Hypervisors and real-time TSP Roles and functions Scheduling issues Case study: XtratuM 2 Conceptos previos Máquina virtual (VM): software que implementa una máquina (computadora) como el comportamiento real. Hipervisor (también virtual machine monitor VMM) es una capa de software (o combinación de software/hardware) que permite ejecutar varios entornos de ejecución independientes o particiones en un computador. Partición: Entorno de ejecución de programas. Ejemplos: Linux + aplicaciones; un sistema operativo de tiempo real + tareas; … 3 Conceptos previos Partition Hypervisor 4 INTRODUCTION: Isolation Temporal isolation refers to the system ability to execute several executable partitions guaranteeing: • the timing constraints of the partition tasks • the execution of each partition does not depend on the temporal behaviour of other partitions. The temporal isolation enforcement is achieved by means of a scheduling policy: • Cyclic scheduling, the ARINC 653 • Periodic Priority Server • EDF Server • Priority 5 PARTITIONED SYSTEMS Temporal Isolation: duration Origin relative to MAF Slot (temporal window) P1P1 P2P2 P1P1 P3P3 P2P2 P2P2 P2P2 MAF (Major Frame) SlotP1P1 id = 3 start = 400ms duration = 100 partition: P1 Execution MAF 1 MAF 2 MAF 3 MAF 4 6 INTRODUCTION: Isolation Spatial isolation refers to the system ability to detect and avoid the possibility that a partition can access to another partition for reading or writing. The hardware
    [Show full text]
  • Virtualization Technologies Overview Course: CS 490 by Mendel
    Virtualization technologies overview Course: CS 490 by Mendel Rosenblum Name Can boot USB GUI Live 3D Snaps Live an OS on mem acceleration hot of migration another ory runnin disk alloc g partition ation system as guest Bochs partially partially Yes No Container s Cooperati Yes[1] Yes No No ve Linux (supporte d through X11 over networkin g) Denali DOSBox Partial (the Yes No No host OS can provide DOSBox services with USB devices) DOSEMU No No No FreeVPS GXemul No No Hercules Hyper-V iCore Yes Yes No Yes No Virtual Accounts Imperas Yes Yes Yes Yes OVP (Eclipse) Tools Integrity Yes No Yes Yes No Yes (HP-UX Virtual (Integrity guests only, Machines Virtual Linux and Machine Windows 2K3 Manager in near future) (add-on) Jail No Yes partially Yes No No No KVM Yes [3] Yes Yes [4] Yes Supported Yes [5] with VMGL [6] Linux- VServer LynxSec ure Mac-on- Yes Yes No No Linux Mac-on- No No Mac OpenVZ Yes Yes Yes Yes No Yes (using Xvnc and/or XDMCP) Oracle Yes Yes Yes Yes Yes VM (manage d by Oracle VM Manager) OVPsim Yes Yes Yes Yes (Eclipse) Padded Yes Yes Yes Cell for x86 (Green Hills Software) Padded Yes Yes Yes No Cell for PowerPC (Green Hills Software) Parallels Yes, if Boot Yes Yes Yes DirectX 9 Desktop Camp is and for Mac installed OpenGL 2.0 Parallels No Yes Yes No partially Workstati on PearPC POWER Yes Yes No Yes No Yes (on Hypervis POWER 6- or (PHYP) based systems, requires PowerVM Enterprise Licensing) QEMU Yes Yes Yes [4] Some code Yes done [7]; Also supported with VMGL [6] QEMU w/ Yes Yes Yes Some code Yes kqemu done [7]; Also module supported
    [Show full text]
  • Comparison of Platform Virtual Machines - Wikipedia
    Comparison of platform virtual machines - Wikipedia... http://en.wikipedia.org/wiki/Comparison_of_platform... Comparison of platform virtual machines From Wikipedia, the free encyclopedia The table below compares basic information about platform virtual machine (VM) packages. Contents 1 General Information 2 More details 3 Features 4 Other emulators 5 See also 6 References 7 External links General Information Name Creator Host CPU Guest CPU Bochs Kevin Lawton any x86, AMD64 CHARON-AXP Stromasys x86 (64 bit) DEC Alphaserver CHARON-VAX Stromasys x86, IA-64 VAX x86, x86-64, SPARC (portable: Contai ners (al so 'Zones') Sun Microsystems (Same as host) not tied to hardware) Dan Aloni helped by other Cooperati ve Li nux x86[1] (Same as parent) developers (1) Denal i University of Washington x86 x86 Peter Veenstra and Sjoerd with DOSBox any x86 community help DOSEMU Community Project x86, AMD64 x86 1 of 15 10/26/2009 12:50 PM Comparison of platform virtual machines - Wikipedia... http://en.wikipedia.org/wiki/Comparison_of_platform... FreeVPS PSoft (http://www.FreeVPS.com) x86, AMD64 compatible ARM, MIPS, M88K GXemul Anders Gavare any PowerPC, SuperH Written by Roger Bowler, Hercul es currently maintained by Jay any z/Architecture Maynard x64 + hardware-assisted Hyper-V Microsoft virtualization (Intel VT or x64,x86 AMD-V) OR1K, MIPS32, ARC600/ARC700, A (can use all OVP OVP Imperas [1] [2] Imperas OVP Tool s x86 (http://www.imperas.com) (http://www.ovpworld compliant models, u can write own to pu OVP APIs) i Core Vi rtual Accounts iCore Software
    [Show full text]
  • Hypervisors and Realtime Linux
    Hands-on course , 5 Hypervisors and realtime Linux day(s) Ref : HYP OBJECTIVES Participants At the end of this training you will be able to choose between the different realtime solutions for Linux and to Architects or developers in develop realtime applications based on Linux-RT, Xenomai or a realtime hypervisor architecture. charge of realtime application deployment merging realtime applications and opensource 1) Virtualisation using Linux 3) Overview of realtime architectures with Linux general purpose operating 2) The XEN Hypervisor 4) Realtime Hypervisors system. Pre-requisites Case study Basic knowledge of C The exercises are proposed using skeletons to be completed to allow the student to write a realtime programs development, application and to interface it with Linux. realtime executives and Linux or UNIX. 1) Virtualisation using Linux Next sessions - Overview of virtualization. History. Theory of virtualization. Virtualization types and modes. - The new virtualization helpers in modern CPU, Intel VTX and ARM Trust-zone. - Virtualization gains. Securing a system by diminution of the trusted software base. - Virtualization using Linux. Namespaces and application virtualization. - Overview of QEMU and KVM. Focus on XEN. 2) The XEN Hypervisor - Presentation of the XEN Hypervisor. Installation, commands overview. - Storage management, console, networking with XEN. - CPU virtualization, scheduling, checkpoints and migration. - Limits of the XEN scheduling. Tries to makes XEN realtime. - The XEN Development interface. Workshop Installation and management of the XEN Hypervisor. Implementation of a bare XEN application. Port of an Operating System to XEN. Xen scheduler. 3) Overview of realtime architectures with Linux - Linux realtime evolution. Origin of the problem. - Schedulers, bottom halves and latency.
    [Show full text]
  • EMC2 Prototyping and Benchmarking of Pikeos-Based and XTRATUM
    EMC2 Prototyping and Benchmarking of PikeOS-based and XTRATUM-based systems on LEON4x4 Introduction . Multi-core architectures will be adopted in the next generations of avionics and aerospace systems. Integrated Modular Avionics (IMA): mixed-criticality . Key requirement: spatial and temporal isolation . Virtualization appears to be a promising technique to implement robust software architectures in multi-core avionics platforms. Goal: exploiting virtualization in the prototyping of a multi-core test platform for the aerospace domain. This is a first attempt to exploit paravirtualization on Cobham-Gaisler LEON4, the European Space Agency Next Generation Microprocessor (NGMP). © 2015, Thales Alenia Space Reference Application Test Software (Test input, Application Stack: . Scenario: various analysis and (Telemetry, benchmarking) file transfers) levels of criticality and REFERENCE SOFTWARE dependability both at DEMO PLATFORM software and hardware level JTAG SPACEWIRE PERIPHERAL TARGET DEVICE 1 TEST SERIAL MULTICORE . Requirements: CONSOLE PROCESSING ETHERNET PLATFORM SPACEWIRE PERIPHERAL reliability, robustness. DEVICE 2 Overall objectives: . Implementation and analysis of a typical mixed-critical aerospace application over a next-gen multicore platform . Assessment and analysis of virtualization technologies (isolation) . Comparison of different hypervisors (robustness, self-healing) © 2015, Thales Alenia Space Platform & Tools The target hardware identified is a quad-core architecture based on the Gaisler SPARC-V8 LEON4 processor (ESA’s Next Generation MicroProcessor). Two different hypervisors, SYSGO PikeOS and FentISS XtratuM, have been considered for the implementation of the reference application on selected multicore platform. PikeOS is a platform providing RTOS, type I hypervisor and paravirtualization functionalities. XtratuM is an open-source, bare metal hypervisor targeting real- time systems and implementing the paravirtualization principle.
    [Show full text]
  • Use of Xtratum in an Automotive Application (*)
    Use of XtratuM in an Automotive Application (*) J. S´anchez , S. Peir´o, A. Crespo, J. Sim´o, M. Masmano, P. Balbastre Instituto de Automatica e Informatica Industrial Universidad Politecnica de Valencia, Spain jsanchez,mmasmano,speiro @ai2.upv.es, jsimo,acrespo,patricia disca.upv.es { } { } Abstract the paravirtualization technique, which means that Virtualization is playing a key role in many of software running on top of it must be modified in today software systems. At first used mainly to order to interact with the hypervisor and not with improve resource utilization, this technology is ex- the underlying hardware. Therefore, virtualization panding and has reached the market of embedded support cannot be limited to creating virtual ma- systems. In this scope, XtratuM o↵ers a virtual- chines but it has to be extended to provide support ization solution capable of running mixed-purpose for any run-time environment wanted to be run over applications. This paper presents the key contribu- XtratuM. tions to the OVERSEE project, whose architecture depends on the availability of this technology. This project has the goal of o↵ering an appropriate in- frastructure for the information technology systems of the upcoming smart vehicles. 1 Introduction The OVERSEE project [2] aims to provide a de- pendable and secure infrastructure for the execu- tion of mixed criticality applications on automotive systems. To meet this challenge, an architecture Figure 1: OVERSEE architecture overview. based on virtualization has been selected. XtratuM [1] o↵ers an ideal foundation for enforcing a strong Ultimately, this project has pushed forward the level of isolation, both temporal and spatial, thus cloud of available facilities in order to face the de- ensuring that vehicle functionality and safety can- sign of a XtratuM-based system.
    [Show full text]