Applying the Engineering Statechart Formalism to the Evaluation of Soft Real-Time in Operating Systems - a Use Case Tailored Modeling and Analysis Technique

Total Page:16

File Type:pdf, Size:1020Kb

Applying the Engineering Statechart Formalism to the Evaluation of Soft Real-Time in Operating Systems - a Use Case Tailored Modeling and Analysis Technique Dissertation zur Erlangung des Grades des Doktors der Ingenieurwissenschaften der Naturwissenschaftlich-Technischen Fakult¨aten der Universit¨atdes Saarlandes R S V E I T I A N S U S S A I R S A V I E N Applying the Engineering Statechart Formalism to the Evaluation of Soft Real-Time in Operating Systems - A Use Case Tailored Modeling and Analysis Technique Vorgelegt von Alexander Koenen-Dresp Glons, Belgien Tag der Einreichung: 4. Juli 2008 Tag des Kolloquiums: 28. Oktober 2008 Dekan: Prof. Dr. Joachim Weickert Vorsitzender der Pr¨ufungskommission: Prof. Dr. Reinhard Wilhelm 1. Berichterstatter: Prof. Dr. Helge Scheidig 2. Berichterstatter: Prof. Bernd Finkbeiner, PhD Akademischer Mitarbeiter: Dr. Mark Hillebrand Acknowledgements First of all I thank my primary advisor Professor Helge Scheidig for the unique opportu- nity to participate in his research. I am also very grateful for the excellent supervision and the guidance Professor Bernd Finkbeiner gave me during my research. Without his clear guidelines on the methodology, this thesis would never have been possible. My colleges Sebastian Sch¨oningand Reinhart Spurk also greatly contributed to this work - thank you. Words cannot express my gratitude towards my wife Wiebke. Her never-ending fight for my success was the best support for which I could ever have hoped. I am very grateful to my three proof readers, Calogero Cumbo, Christian Franze and Robert Koch. To Robert I owe thanks for his friendship and personal support over the last decade. Since my research and the writing of this thesis was conducted while I was a full-time employee of the German Armed Forces Command Control and Information System Reg- iment (GAFCCIS Rgt) in Cologne and later of the NATO Programming Centre (NPC) in Glons (Belgium), I would like to thank all my superior officers for their support. In particular, Colonel Scholz, Commander of the GAFCCIS Rgt and his deputy Lieutenant Colonel Domke. At the NPC my thanks go to Colonel Eisenreich, Commander of the NPC, Lieutenant Colonels Nauth and Feuerbach, the Senior National Officers of Germany and to all my colleges for taking over my duties during my absent periods. Finally I would like to express my sincere appreciation to my family and all those not mentioned who have contributed, directly or indirectly to this thesis. For my beloved wife Wiebke and my dearly departed grandfather Paul All we have to decide is what to do with the time that is given to us. Gandalf the Grey, J.R.R. Tolkien Abstract Multimedia applications that have emerged in recent years impose unique requirements on an underlying general purpose operating system (GPOS). The suitability of a GPOS for multimedia processing is judged by its soft real-time capabilities. To date, the question of how these capabilities can be assessed has scarcely been addressed: this is a gap in GPOS research. By answering questions on the impacts of the Interrupt Handling Facility (IHF) on the overall soft real-time capabilities of a GPOS, this thesis contributes to the filling of this blank space. The Engineering Statechart Formalism (ESF ), a use case tailored formal method of modeling real-world OS, is syntactically and semantically defined. Models of the IHF of selected real-world operating systems are then created by means of this technique. As no appropriate real-time concept fitting the goals of this thesis as yet exists, a suitable definition is constructed. By projecting this system-wide idea to the interrupt subsystem, specific indicators for this subsystem are derived. These indicators are then evaluated by applying formal techniques such as graph-based analysis and temporal logic model checking to the ESF models. Finally, the assertions derived from this evaluation are interpreted with respect to their impacts on real-time multimedia processing in different general purpose operating systems. Kurzzusammenfassung Multimedia-Anwendungen haben in den letzten Jahren weite Verbreitung erfahren. Solche Anwendungen stellen besondere Anforderungen an das Betriebssystem (BS), auf dem sie ausgef¨uhrtwerden. Insbesondere Echtzeitf¨ahigkeiten des Betriebssystems sind von Be- deutung, wenn es um seine Eignung f¨urMultimedia-Verarbeitung geht. Bis heute wurde die Frage, wie sich diese F¨ahigkeiten konkret innerhalb eines BS manifestieren, nur unzu- reichend untersucht. Die vorliegende Arbeit leistet einen Beitrag zur F¨ullungdieser L¨ucke in der BS-Forschung. Die Effekte des Subsystems zur Unterbrechungsbehandlung in BS auf die Echtzeitf¨ahigkeit des Gesamtsystems werden detailliert auf Basis von Modellen dieses Subsystems in ver- schiedenen BS analysiert. Um eine formale Auswertung zu erlauben, wird eine auf den Anwendungsfall zugeschnittene formale Methode zur BS-Modellierung verwendet. Die spezifizierte Syntax und Semantik dieses Engineering Statechart Formalism (ESF) basieren auf dem klassischen Statechart-Formalismus. Da bislang kein geeigneter Echtzeit-Begriff existiert, wird eine konsistente Definition herge- leitet. Durch die Abbildung dieser sich auf das Gesamtsystem beziehenden Eigenschaft auf die Unterbrechungsbehandlung werden spezifische Indikatoren f¨urdieses Subsystem hergeleitet. Die Auspr¨agungendieser Indikatoren f¨urdie verschiedenen untersuchten Be- triebssyteme werden anhand formaler Methoden wie graphbasierter Analyse und Tempo- ral Logic Model Checking ausgewertet. Die Interpretation der Untersuchungsergebnisse liefert Aussagen ¨uber die Effekte der Implementierung der Unterbrechungsbehandlung auf die Echtzeitf¨ahigkeit der untersuchten Betriebssysteme bei der Verarbeitung von multime- dialen Daten. Ausf¨uhrliche Zusammenfassung Multimedia-Anwendungen haben in den letzten Jahren weite Verbreitung erfahren. Solche Anwendungen stellen besondere Anforderungen an das Betriebssystem (BS), auf dem sie ausgef¨uhrtwerden. Insbesondere Echtzeitf¨ahigkeiten des Betriebssystems sind von Bedeu- tung, wenn es um seine Eignung f¨urMultimedia-Verarbeitung geht. Es existieren zwar zahlreiche L¨osungen f¨urdie Verbesserung des systeminternen Scheduling, aber ganzheitliche Ans¨atze,die andere Komponenten des Systems mit einbeziehen, sind bisher kaum vorhan- den. Die damit einhergehende Frage, wie sich die geforderten Echtzeitf¨ahigkeiten in konkreten Subsystemen innerhalb eines BS manifestieren, ist daher bis heute nur un- zureichend untersucht. Die vorliegende Arbeit leistet einen Beitrag zur F¨ullungdieser L¨ucke in der Betriebssystem- Forschung. Der interaktive Teil eines Betriebssystems, die Unterbrechungsbehandlung, wird hier eingehend hinsichtlich seiner Einfl¨usseauf das Systemverhalten hin untersucht. Dazu kommen Methoden aus den Disziplinen des Software Engineering und der rechner- gest¨utztenVerifikation zum Einsatz: die Effekte des Subsystems zur Unterbrechungsbe- handlung in verschiedenen BS auf die Echtzeitf¨ahigkeit des Gesamtsystems werden detail- liert mittels formaler Modelle abgebildet und analysiert. Da sich Betriebssysteme bez¨uglich ihrer inh¨arenten Eigenschaften signifikant von an- deren Software-Systemen unterscheiden, ist der erste notwendige Schritt die Entwick- lung einer formalen, anwendungsfallspezifischen Modellierungstechnik. Ein auf klassischen Statecharts basierender Formalismus { der Engineering Statechart Formalism (ESF) { wird hergeleitet und seine Syntax sowie Semantik definiert. Die zus¨atzlichen Statechart- Elemente erleichtern die Modellierung von Rekursion, reduzieren die Komplexit¨atder Modelle und stellen ein Werkzeug zur Verf¨ugung,um sowohl logisch gruppierte als auch parallele Abl¨aufeohne Mehraufwand abzubilden. Drei unterschiedliche Betriebssysteme f¨urdie Intel IA32-Architektur, namentlich Linux, OpenBSD und L4Ka::Pistachio werden ausgew¨ahltund die relevanten Bestandteile des Interrupt-Subsystems mittels Techniken des Reverse Engineering unter Verwendung des ESF modelliert. Da bislang kein f¨urdie Zielsetzung dieser Arbeit geeigneter Echtzeit-Begriff existiert, wird eine konsistente Definition basierend auf Time Utility Functions (TUF) hergeleitet. Die somit erreichte Abgrenzung zwischen hartem und weichem Echtzeitbegriff erlaubt die Fest- legung des Konzeptes von Multimedia-orientierter weicher Echtzeit f¨ur Betriebssysteme. Dieser sich auf das Gesamtsystem beziehende Echtzeitbegriff wird anschließend auf die Unterbrechungsbehandlung projiziert. Da dieser Projektionsvorgang eine komplette Sys- temarchitektur voraussetzt, wird die am Lehrstuhl f¨urBetriebssysteme der Universit¨at des Saarlandes entwickelte Component Extension (CE) als Referenz-Architektur angenom- men. Mittels der Projektion werden spezifische Indikatoren f¨urdas Interrupt-Subsystem hergeleitet. Diese Indikatoren werden ISO-Qualit¨atsfaktorenf¨urAnwendungssoftware zu- geordnet. Die Auspr¨agungendieser Indikatoren f¨urdie drei verschiedenen untersuchten Betriebs- syteme werden anhand unterschiedlicher formaler Methoden ausgewertet. Dabei werden in Abh¨angigkeit von der Natur jedes Indikators verschiedene Herangehensweisen spezifiziert und angewandt. Architekturelle Eigenschaften werden mittels statischer, syntaktischer Analyseverfahren ausgewertet, f¨urKontrollflussbasierte Indikatoren wird eine Methode zur graphbasierten Analyse entwickelt. Die verbleibenden, eingabeabh¨angigenIndika- toren werden dann mittels Temporal Logic Model Checking evaluiert. Daf¨urwird ein umfassendes Regelwerk zur Umwandlung von ESF -Modellen in Kripkestrukturen definiert. Die Interpretation der Untersuchungsergebnisse liefert quantitative und qualitative Aus- sagen ¨uber die Effekte der Implementierung der Unterbrechungsbehandlung auf
Recommended publications
  • R&S®BBA100 Broadband Amplifier Open
    R&S®BBA100 Broadband Amplifier Open Source Acknowledgment 5353.8300.00 – 01 /RL/1/EN 01.00 / Broadcasting 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S BBA100 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 7 3.1 Apache License 2.0 ..................................................................................................... 7 3.2 GNU Library General Public License, Version 2.0 (LGPL 2.0) ..............................10 3.3 Boost Software License ............................................................................................18 3.4 GNU General Public License, Version 2.0 (GPL 2.0) ..............................................18 3.5 GNU Lesser General Public License, Version 2.1 (LGPL 2.1) ...............................24 3.6 Mozilla Public License, Version 1.1 (MPL 1.1) ........................................................32 3.7 MIT ...............................................................................................................................40 3.8 JDOM License
    [Show full text]
  • A Political History of X Or How I Stopped Worrying and Learned to Love the GPL
    A Political History of X or How I Stopped Worrying and Learned to Love the GPL Keith Packard SiFive [email protected] Unix in !"# ● $SD Everywhere – $'t not actually BS% ● )*+* want, to make Sy,tem V real – S'rely they still matter ● .o Free So/tware Anywhere The 0rigins of 1 ● $rian Reid and Pa'l Asente at Stan/ord – - kernel → VGTS → W window system – Ported to VS100 at Stan/ord ● $o4 Scheifler started hacking W→ X – Working on Argus with Barbara Liskov at LCS – 7ade it more Unix friendly (async9, renamed X -AXstation 00 (aka v, 339 Unix Workstation Market ● Unix wa, closed source ● Most vendors ,hipped a proprietary 0S 4ased on $SD #.x ● S'n: HP: Digita(: )po((o: *ektronix: I$7 ● ;congratu(ation,: yo'<re not running &'nice=. – Stil(: so many gratuito', di/ference, -AXstation II S'n >?@3 Early Unix Window Systems ● S'n-iew dominated (act'al commercial app,A De,ktop widget,A9 ● %igital had -WS/UIS (V7S on(y9 ● )pollo had %omain ● *ektronix demon,trating Sma((*alk 1 B1@ ● .onB/ree so/tware ● U,ed internally at MIT ● Shared with friend, in/ormally 1 3 ● )(mo,t u,able ● %elivered by Digital on V)1,tation, ● %i,trib'tion was not all free ,o/tware – Sun port relied on Sun-iew kernel API – %igital provided binary rendering code – IB7 PC?2T support act'ally complete (C9 Why 1 C ● 1 0 had wart, – rendering model was pretty terrible ● ,adly, X1 wa,n't m'ch better... – External window management witho't borders ● Get everyone involved – Well, at lea,t every workstation vendor willing to write big checks X as Corporate *ool ● Dim Gettys and Smokey
    [Show full text]
  • Rich Internet Applications
    Rich Internet Applications (RIAs) A Comparison Between Adobe Flex, JavaFX and Microsoft Silverlight Master of Science Thesis in the Programme Software Engineering and Technology CARL-DAVID GRANBÄCK Department of Computer Science and Engineering CHALMERS UNIVERSITY OF TECHNOLOGY UNIVERSITY OF GOTHENBURG Göteborg, Sweden, October 2009 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Rich Internet Applications (RIAs) A Comparison Between Adobe Flex, JavaFX and Microsoft Silverlight CARL-DAVID GRANBÄCK © CARL-DAVID GRANBÄCK, October 2009. Examiner: BJÖRN VON SYDOW Department of Computer Science and Engineering Chalmers University of Technology SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 Department of Computer Science and Engineering Göteborg, Sweden, October 2009 Abstract This Master's thesis report describes and compares the three Rich Internet Application !RIA" frameworks Adobe Flex, JavaFX and Microsoft Silverlight.
    [Show full text]
  • Report on the 2020 FOSS Contributor Survey
    Report on the 2020 FOSS Contributor Survey The Linux Foundation & The Laboratory for Innovation Science at Harvard Frank Nagle Harvard Business School David A. Wheeler The Linux Foundation Hila Lifshitz-Assaf New York University Haylee Ham Jennifer L. Hoffman Laboratory for Innovation Science at Harvard Acknowledgments This report and the research behind it would not have been possible without the leadership of the Core Infrastructure Initiative’s Advisory Committee, composed of Josh Corman, Steve Lipner, Audris Mockus, Henning Piezunka, and Sam Ransbotham. Frank Nagle would also like to thank his fellow co-directors of the Core Infrastructure Initiative, Jim Zemlin at the Linux Foundation and Karim Lakhani at the Laboratory for Innovation Science at Harvard, for their counsel and direction throughout this project. Gratitude and thanks to Michael Dolan and Kate Stewart at the Linux Foundation for their ongoing commitment to this undertaking. Thank you to James Dana for laying the initial groundwork for this survey. Finally — and perhaps, most importantly — thank you to all the individuals who contribute to FOSS projects. Without their tireless efforts, our core digital infrastructure and the feats enabled by it would not be sustainable. REVISED: This report has been updated since its original release on 8 December 2020. This second version, released on 10 December 2020, corrects errors found in the original text and graphics. Contents Executive Summary 4 Introduction 7 Methodology 9 Overview of Findings 10 Demographics 10 Figure 1: Gender
    [Show full text]
  • Draft: 1.028, 31/01/2011 Words: 38326, Pages: 129 2
    Draft: 1.028, 31/01/2011 Words: 38326, Pages: 129 2 Copyright © 2009 by Keith Curtis I am making this book available as a free digital download. In general, I tried to get permission for the use of other's information. However, I have over 100 images and it was hard to figure out where to get permission for some of them. For those, I will claim permission under fair use ;-) I am happy to remove any content if its owner objects. Every movement grows one person at a time. Keith Curtis [email protected] twitter: @keithccurtis ISBN 978-0-578-01189-9 3 TABLE OF CONTENTS Batalla del Software Libre.................................................................1 Ejército del Software Libre............................................................3 iBio.................................................................................................6 Glosario............................................................................................10 Wikipedia.........................................................................................11 Linux................................................................................................18 Desarrollo Distribuido.................................................................22 Superioridad del Núcleo de Linux...............................................26 La Carrera de las Funcionalidades..............................................40 Linux está Inexorablemente Ganando.........................................43 El cobro por un Sistema Operativo..............................................44
    [Show full text]
  • Kernel Validation with Kselftest Shuah Khan, Kernel Maintainer and Fellow, the Linux Foundation
    Kernel Validation With Kselftest Shuah Khan, Kernel Maintainer and Fellow, The Linux Foundation • Why do we test? • Kinds of testing/tests ... – Unit, developer, regression, integration • Linux kernel testing philosophy – Developer and community driven testing – Reliance on community and users • Linux kernel release cycle – Time based - not feature based – Continuous and parallel development/testing model • Linux kernel testing and validation – Writing tests • Kernel test frameworks - Kselftest & KUnit – Developer testing • Kselftest, KUnit and others. – Regression testing • Kselftest, KUnit and others. • Linux kernel testing and validation – Continuous Integration testing • Static analysis tools (sparse, smatch, coccicheck etc.) • Dynamic analysis tools (fuzzers, syzbot etc.) • Where does this all happen? – Developer test systems – Continuous Integration Rings • Kernel CI Dashboard — Home • 0-Day - Boot and Performance issues • 0-Day - Build issues • Linaro QA • Buildbot • Hulk Robot • What is tested? – Kernel repositories: • linux mainline • linux-next • developer git repositories – Active kernel releases • Basic testing – Boot and usage test – Run basic sanity tests • Basic sanity tests – Does networking (wifi/wired) work correctly? – Does ssh work? – rsync a large file(s) from another system – Download files: wget, ftp, git clone etc. – Play audio/video • Examine kernel logs – Look for new critical and error messages – Check for new warning messages – Check for panic traces • Kernel selftest (Kselftest) – Regression test suite • Kernel
    [Show full text]
  • License Agreement
    TAGARNO MOVE, FHD PRESTIGE/TREND/UNO License Agreement Version 2021.08.19 Table of Contents Table of Contents License Agreement ................................................................................................................................................ 4 Open Source & 3rd-party Licenses, MOVE ............................................................................................................ 4 Open Source & 3rd-party Licenses, PRESTIGE/TREND/UNO ................................................................................. 4 atk ...................................................................................................................................................................... 5 base-files ............................................................................................................................................................ 5 base-passwd ...................................................................................................................................................... 5 BSP (Board Support Package) ............................................................................................................................ 5 busybox.............................................................................................................................................................. 5 bzip2 .................................................................................................................................................................
    [Show full text]
  • Titans and Trolls of the Open Source Arena
    Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS
    [Show full text]
  • Please Don't Go
    Please Don’t Go - Increasing Women’s Participation in Open Source Software Bianca Trinkenreich Northern of Arizona University Flagstaff, AZ, USA [email protected] Abstract—Women represent less than 24% of the software the development of the community with norms and values development industry and suffer from various types of prejudice consistent with their own vision [12], focusing on the first and biases. In Open Source Software projects, despite a variety social experiences through programs such as mentorships [13], of efforts to increase diversity and multi-gendered participation, women are even more underrepresented (less than 10%). My and fixing the gender-bias issues in non-inclusive tools and research focuses on answering the question: How can OSS infrastructure [14]. Some strategies that are discouraged by communities increase women’s participation in OSS projects? the literature include setting quotas for women. Just increasing I will identify the different OSS career pathways, and develop the proportion of women can lead to questioning stereotypes a holistic view of women’s motivations to join or leave OSS, and decisions to simply re-classify types of work that are cur- along with their definitions of success. Based on this empirical investigation, I will work together with the Linux Foundation rently packaged in masculine-feminine stereotyped specialties. to design attraction and retention strategies focused on women. Another discouraged strategy is related to coding schools that Before and after implementing the strategies, I will conduct train women in specialties where they are already represented. empirical studies to evaluate the state of the practice and These schools might perpetuate the disadvantage of women understand the implications of the strategies.
    [Show full text]
  • Javafx in Action by Simon Morris
    Covers JavaFX v1.2 IN ACTION Simon Morris SAMPLE CHAPTER MANNING JavaFX in Action by Simon Morris Chapter 1 Copyright 2010 Manning Publications brief contents 1 ■ Welcome to the future: introducing JavaFX 1 2 ■ JavaFX Script data and variables 15 3 ■ JavaFX Scriptcode and structure 46 4 ■ Swing by numbers 79 5 ■ Behind the scene graph 106 6 ■ Moving pictures 132 7 ■ Controls,charts, and storage 165 8 ■ Web services with style 202 9 ■ From app to applet 230 10 ■ Clever graphics and smart phones 270 11 ■ Best of both worlds: using JavaFX from Java 300 appendix A ■ Getting started 315 appendix B ■ JavaFX Script: a quick reference 323 appendix C ■ Not familiar with Java? 343 appendix D ■ JavaFX and the Java platform 350 vii Welcome to the future: introducing JavaFX This chapter covers ■ Reviewing the history of the internet-based application ■ Asking what promise DSLs hold for UIs ■ Looking at JavaFX Script examples ■ Comparing JavaFX to its main rivals “If the only tool you have is a hammer, you tend to see every problem as a nail,” American psychologist Abraham Maslow once observed. Language advocacy is a popular pastime with many programmers, but what many fail to realize is that programming languages are like tools: each is good at some things and next to useless at others. Java, inspired as it was by prior art like C and Smalltalk, sports a solid general-purpose syntax that gets the job done with the minimum of fuss in the majority of cases. Unfortunately, there will always be those areas that, by their very nature, demand something a little more specialized.
    [Show full text]
  • Safeguarding the Future of Linux Through Standards
    Safeguarding the Future of Linux Through Standards “ Through the defi nition and testing of operating system interfaces, the LSB creates a stable platform that benefi ts Safeguarding Key Facts the Future of bo th developers and users.” - Linus Torvalds Linux Through Standards • The FSG is a non-profi t organization devoted to the ongoing success of Linux The Free Standards Group is an independent nonprofi t organization dedicated to accelerating the use and acceptance of free and open source • Growing membership includes all leading Linux vendors software by developing and promoting standards. Supported by leaders and many infl uential non-profi ts in the IT industry as well as the open source development community, the in the Linux community Free Standards Group fulfi lls a critical need to have common behavioral • Workgroups cover key specifi cations, tools and ABIs across Linux platforms. The Linux Standard Base Linux standards issues such as a binary standard and offers an answer to the most pressing issue facing Linux today: fragmentation. internationalization • Board members include an A well supported standard for Linux is the neccesary component to Linux’s assortment of Linux experts continued success. Without a commonly adopted standard, Linux will fragment, and senior representatives of the Linux community thus proving costly for ISVs to port their applications to the operating system and making it diffi cult for end users and Linux vendors alike. By adopting the • Headquartered in San Francisco Linux Standard Base, the Linux community provides this crucial portability so that applications can be used on more than one distribution of Linux with little or no change.
    [Show full text]
  • Conferences Industry News Resources
    Status of Embedded Linux Embedded Linux Community Update March 2020 Tim Bird Sr. Staff Software Engineer, Sony Electronics Architecture Group Chair, Core Embedded Linux Project 1 110/23/2014 PA1 Confidential Nature of this talk… • Quick overview of lots of embedded topics • A springboard for further research • If you see something interesting, you have a link or something to search for • Not comprehensive! • Just stuff that I saw 2 210/23/2014 PA1 Confidential Outline Linux Kernel Technology Areas Conferences Industry News Resources 3 310/23/2014 PA1 Confidential Outline Linux Kernel Technology Areas Conferences Industry News Resources 4 410/23/2014 PA1 Confidential Kernel Versions • Linux v5.1 – 5 May 2019 – 63 days • Linux v5.2 – 7 Jul 2019 – 63 days • Linux v5.3 – 15 Sep 2019 – 70 days • Linux v5.4 – 24 Nov 2019 – 70 days • Linux v5.5 – 26 Jan 2020 – 63 days • Current kernel = v5.6-rc4 • Merge window is closed – no new features for 5.6 • Expect 5.6 kernel on March 29 or April 5 5 510/23/2014 PA1 Confidential Linux v5.1 • Deprecating support for a.out binaries • https://www.phoronix.com/scan.php?page=news _item&px=Linux-Dropping-A.Out • Use ELF from now on • Lots of DRM changes • https://www.phoronix.com/scan.php?page=news _item&px=Linux-5.1-DRM-Changes • More Y2038 work • More syscalls with 64-bit time values • See https://git.kernel.org/pub/scm/linux/kernel/git/torvald s/linux.git/commit/?id=b1b988a6a035 for a list of new syscalls (20 of them) 610/23/2014 PA1 Confidential Linux v5.1 (cont.) • Energy-Aware scheduling • New sysctl knob
    [Show full text]