Jamaicavm 8.2 User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Jamaicavm 8.2 User Manual JamaicaVM 8.2 — User Manual Java Technology for Critical Embedded Systems aicas GmbH 2 JamaicaVM 8.2 — User Manual: Java Technology for Critical Embedded Systems JamaicaVM 8.2, Release 1. Published January 15, 2019. c 2001–2019 aicas GmbH, Karlsruhe. All rights reserved. 3 No licenses, expressed or implied, are granted with respect to any of the technology described in this publication. aicas GmbH retains all intellectual property rights associated with the technology described in this publication. This publication is intended to assist application developers to develop applications only for the Jamaica Virtual Machine. Every effort has been made to ensure that the information in this publication is accurate. aicas GmbH is not responsible for printing or clerical errors. Although the information herein is provided with good faith, the supplier gives neither warranty nor guarantee that the information is correct or that the results described are obtainable under end-user conditions. aicas GmbH phone +49 721 663 968-0 Emmy-Noether-Straße 9 fax +49 721 663 968-99 76131 Karlsruhe email [email protected] Germany web http://www.aicas.com aicas America Limited phone +1 203 359 5705 4023 Kennett Pike, Suite 810 Wilmington, DE 19807 email [email protected] USA web http://www.aicas.com aicas GmbH phone +33 1 49 97 17 62 9 Allee´ de l’Arche fax +33 1 49 97 17 00 92671 Paris La Defense´ email [email protected] France web http://www.aicas.com This product includes software developed by IAIK of Graz University of Technology. This software is based in part on the work of the Independent JPEG Group. This product includes software that is derivative of the work by Markus Kuhn licensed under CC BY 4.0. This product includes the Elliptic Curve Cryptography library, copyright Oracle America, Inc. It is licensed under LGPL v2.1 and GPL v2 with the classpath exception. This product is based in part on the work of the FreeType Project. Java and all Java-based trademarks are registered trademarks of Oracle America, Inc. All other brands or product names are trademarks or registered trademarks of their respective holders. ALL IMPLIED WARRANTIES ON THIS PUBLICATION, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO NINETY (90) DAYS FROM THE DATE OF THE ORIGINAL RETAIL PURCHASE OF THIS PRODUCT. Although aicas GmbH has reviewed this publication, aicas GmbH MAKES NO WARRANTY OR REPRESENTATION, EITHER EXPRESSED OR IMPLIED, WITH RESPECT TO THIS PUBLICATION, ITS QUALITY, ACCURACY, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. AS A RESULT, THIS PUBLICATION IS PROVIDED AS IS, AND YOU, THE PURCHASER, ARE ASSUMING THE ENTIRE RISK AS TO ITS QUALITY AND ACCURACY. IN NO EVENT WILL aicas GmbH BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY DEFECT OR INACCURACY IN THIS PUBLICATION, even if advised of the possibility of such damages. THE WARRANTIES SET FORTH ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESSED OR IMPLIED. 4 Contents Preface 15 Intended Audience of This Book . 15 Contacting aicas . 16 What is New in JamaicaVM 8.2 . 16 What is New in JamaicaVM 8.1 . 17 What is New in JamaicaVM 8.0 . 17 I Introduction 19 1 Key Features of JamaicaVM 21 1.1 Hard Realtime Execution Guarantees . 21 1.2 Real-Time Specification for Java support . 22 1.3 Minimal footprint . 22 1.4 ROMable code . 23 1.5 Native code support . 23 1.6 Dynamic Linking . 23 1.7 Supported Platforms . 23 1.7.1 Development platforms . 23 1.7.2 Target platforms . 24 1.8 Fast Execution . 25 1.9 Tools for Realtime and Embedded System Development . 25 2 Getting Started 27 2.1 Installation of JamaicaVM . 27 2.1.1 Linux . 28 2.1.2 Windows . 30 2.2 Installation of License Keys . 30 2.2.1 Using the Standard Edition . 31 2.2.2 Using the Personal Edition . 31 2.3 JamaicaVM Directory Structure . 32 5 6 CONTENTS 2.3.1 API Specification . 32 2.3.2 Target Platforms . 32 2.4 Building and Running a Java Program . 34 2.4.1 Host Platform . 34 2.4.2 Target Platform . 36 2.4.3 Improving Size and Performance . 36 2.4.4 Overview of Further Examples . 37 2.5 Notations and Conventions . 37 2.5.1 Typographic Conventions . 38 2.5.2 Argument Syntax . 38 2.5.3 Jamaica Home and User Home . 39 3 Tools Overview 41 3.1 Jamaica Java Compiler . 41 3.2 Jamaica Virtual Machine . 41 3.3 Creating Target Executables . 42 3.4 Accelerating JAR Files . 43 3.5 Monitoring Realtime Behavior . 43 4 Support for the Eclipse IDE 45 4.1 Plug-in installation . 45 4.1.1 Installation on Eclipse . 45 4.1.2 Installation on Other IDEs . 46 4.2 Setting up JamaicaVM Distributions . 47 4.3 Using JamaicaVM in Java Projects . 47 4.4 Setting Virtual Machine Parameters . 47 4.5 Building applications with Jamaica Builder . 48 4.5.1 Getting started . 48 4.5.2 Jamaica Buildfiles . 48 II Tools Usage and Guidelines 51 5 Performance Optimization 53 5.1 Creating a profile . 53 5.1.1 Using the profiling VM . 54 5.1.2 Creating a profiling application . 54 5.1.3 Dumping a profile via network . 55 5.1.4 Creating a micro profile . 56 5.2 Using a profile with the Builder . 56 5.2.1 Building with a profile . 56 CONTENTS 7 5.2.2 Building with multiple profiles . 57 5.3 Interpreting the profiling output . 57 5.3.1 Format of the profile file . 58 5.3.2 Example . 62 6 Reducing Footprint and Memory Usage 65 6.1 Compilation . 65 6.1.1 Suppressing Compilation . 65 6.1.2 Using Default Compilation . 67 6.1.3 Using a Custom Profile . 68 6.1.4 Code Optimization by the C Compiler . 70 6.1.5 Full Compilation . 71 6.2 Smart Linking . 72 6.3 API Library Classes and Resources . 74 6.4 RAM Usage . 75 6.4.1 Measuring RAM Demand . 75 6.4.2 Memory Required for Threads . 77 6.4.3 Memory Required for Line Numbers . 81 7 Memory Management Configuration 85 7.1 Configuration for soft-realtime applications . 85 7.1.1 Initial heap size . 85 7.1.2 Maximum heap size . 86 7.1.3 Finalizer thread priority . 86 7.1.4 Reference Handler thread priority . 87 7.1.5 Reserved memory . 87 7.1.6 Stop-the-world Garbage Collection . 89 7.1.7 Recommendations . 89 7.2 Configuration for hard-realtime applications . 90 7.2.1 Usage of the Memory Analyzer tool . 90 7.2.2 Measuring an application’s memory requirements . 90 7.2.3 Fine tuning the final executable application . 92 7.2.4 Constant Garbage Collection Work . 94 7.2.5 Comparing dynamic mode and constant GC work mode . 95 7.2.6 Determination of the worst case execution time of an al- location . 96 7.2.7 Examples . 96 8 Debugging Support 99 8.1 Enabling the Debugger Agent . 99 8.2 Connecting to Jamaica from the Command Line . 100 8 CONTENTS 8.2.1 Using sockets as transport layer . 100 8.2.2 Using shared memory as transport layer . 101 8.3 Configuring the IDE to connect to Jamaica . 101 8.4 Reference Information . 103 9 The Real-Time Specification for Java 105 9.1 Realtime programming with the RTSJ . 105 9.1.1 Thread Scheduling . 106 9.1.2 Memory Management . 106 9.1.3 Synchronization . 106 9.1.4 Example . 107 9.2 Realtime Garbage Collection . 108 9.3 Relaxations in JamaicaVM . 108 9.3.1 Use of Memory Areas . 109 9.3.2 Thread Priorities . 109 9.3.3 Runtime checks for NoHeapRealtimeThread . 109 9.3.4 Static Initializers . 109 9.3.5 Class PhysicalMemoryManager . 110 9.4 Limitations of RTSJ Implementation . 110 9.5 Computational Transparency . 111 9.5.1 Efficient Java Statements . 112 9.5.2 Non-Obvious Slightly Inefficient Constructs . 114 9.5.3 Statements Causing Implicit Memory Allocation . 114 9.5.4 Operations Causing Class Initialization . 117 9.5.5 Operations Causing Class Loading . 118 9.6 Supported Standards . 119 9.6.1 Real-Time Specification for Java . 119 9.6.2 Java Native Interface . 121 9.7 Memory Management . 122 9.7.1 Memory Management of RTSJ . 123 9.7.2 Finalizers . 124 9.7.3 Configuring a Realtime Garbage Collector . 125 9.7.4 Programming with the RTSJ and Realtime Garbage Col- lection . 126 9.7.5 Memory Management Guidelines . 127 9.8 Scheduling and Synchronization . 128 9.8.1 Schedulable Entities . 128 9.8.2 Synchronization . 130 9.8.3 Scheduling Policy and Priorities . 133 9.9 Libraries . 136 9.10 Summary . ..
Recommended publications
  • An OSEK/VDX-Based Multi-JVM for Automotive Appliances
    AN OSEK/VDX-BASED MULTI-JVM FOR AUTOMOTIVE APPLIANCES Christian Wawersich, Michael Stilkerich, Wolfgang Schr¨oder-Preikschat University of Erlangen-Nuremberg Distributed Systems and Operating Systems Erlangen, Germany E-Mail: [email protected], [email protected], [email protected] Abstract: The automotive industry has recent ambitions to integrate multiple applications from different micro controllers on a single, more powerful micro controller. The outcome of this integration process is the loss of the physical isolation and a more complex monolithic software. Memory protection mechanisms need to be provided that allow for a safe co-existence of heterogeneous software from different vendors on the same hardware, in order to prevent the spreading of an error to the other applications on the controller and leaving an unclear responsi- bility situation. With our prototype system KESO, we present a Java-based solution for ro- bust and safe embedded real-time systems that does not require any hardware protection mechanisms. Based on an OSEK/VDX operating system, we offer a familiar system creation process to developers of embedded software and also provide the key benefits of Java to the embedded world. To the best of our knowledge, we present the first Multi-JVM for OSEK/VDX operating systems. We report on our experiences in integrating Java and an em- bedded operating system with focus on the footprint and the real-time capabili- ties of the system. Keywords: Java, Embedded Real-Time Systems, Automotive, Isolation, KESO 1. INTRODUCTION Modern cars contain a multitude of micro controllers for a wide area of tasks, ranging from convenience features such as the supervision of the car’s audio system to safety relevant functions such as assisting the braking system of the car.
    [Show full text]
  • Secure Control Applications in Smart Homes and Buildings
    Die approbierte Originalversion dieser Dissertation ist in der Hauptbibliothek der Technischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Secure Control Applications in Smart Homes and Buildings DISSERTATION submitted in partial fulfillment of the requirements for the degree of Doktor der Technischen Wissenschaften by Mag. Dipl.-Ing. Friedrich Praus Registration Number 0025854 to the Faculty of Informatics at the Vienna University of Technology Advisor: Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Wolfgang Kastner The dissertation has been reviewed by: Ao.Univ.Prof. Dipl.-Ing. Prof. Dr. Peter Palensky Dr.techn. Wolfgang Kastner Vienna, 1st October, 2015 Mag. Dipl.-Ing. Friedrich Praus Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Mag. Dipl.-Ing. Friedrich Praus Hallergasse 11/29, A-1110 Wien Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwen- deten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 1. Oktober 2015 Friedrich Praus v Kurzfassung Die zunehmende Integration von heterogenen Gebäudeautomationssystemen ermöglicht gesteigerten Komfort, Energieeffizienz, verbessertes Gebäudemanagement, Nachhaltig- keit sowie erweiterte Anwendungsgebiete, wie beispielsweise “Active Assisted Living” Szenarien. Diese Smart Homes und Gebäude sind heutzutage als dezentrale Systeme rea- lisiert, in denen eingebettete Geräte Prozessdaten über ein Netzwerk austauschen.
    [Show full text]
  • Android Cours 1 : Introduction `Aandroid / Android Studio
    Android Cours 1 : Introduction `aAndroid / Android Studio Damien MASSON [email protected] http://www.esiee.fr/~massond 21 f´evrier2017 R´ef´erences https://developer.android.com (Incontournable !) https://openclassrooms.com/courses/ creez-des-applications-pour-android/ Un tutoriel en fran¸caisassez complet et plut^ot`ajour... 2/52 Qu'est-ce qu'Android ? PME am´ericaine,Android Incorporated, cr´e´eeen 2003, rachet´eepar Google en 2005 OS lanc´een 2007 En 2015, Android est le syst`emed'exploitation mobile le plus utilis´edans le monde (>80%) 3/52 Qu'est-ce qu'Android ? Cinq couches distinctes : 1 le noyau Linux avec les pilotes ; 2 des biblioth`equeslogicielles telles que WebKit/Blink, OpenGL ES, SQLite ou FreeType ; 3 un environnement d'ex´ecutionet des biblioth`equespermettant d'ex´ecuterdes programmes pr´evuspour la plate-forme Java ; 4 un framework { kit de d´eveloppement d'applications ; 4/52 Android et la plateforme Java Jusqu'`asa version 4.4, Android comporte une machine virtuelle nomm´eeDalvik Le bytecode de Dalvik est diff´erentde celui de la machine virtuelle Java de Oracle (JVM) le processus de construction d'une application est diff´erent Code Java (.java) ! bytecode Java (.class/.jar) ! bytecode Dalvik (.dex) ! interpr´et´e L'ensemble de la biblioth`equestandard d'Android ressemble `a J2SE (Java Standard Edition) de la plateforme Java. La principale diff´erenceest que les biblioth`equesd'interface graphique AWT et Swing sont remplac´eespar des biblioth`equesd'Android. 5/52 Android Runtime (ART) A` partir de la version 5.0 (2014), l'environnement d'ex´ecution ART (Android RunTime) remplace la machine virtuelle Dalvik.
    [Show full text]
  • Jamaicavm 8.1 — User Manual
    JamaicaVM 8.1 — User Manual Java Technology for Critical Embedded Systems aicas GmbH 2 JamaicaVM 8.1 — User Manual: Java Technology for Critical Embedded Systems JamaicaVM 8.1, Release 1. Published May 31, 2017. c 2001–2017 aicas GmbH, Karlsruhe. All rights reserved. No licenses, expressed or implied, are granted with respect to any of the technology described in this publication. aicas GmbH retains all intellectual property rights associated with the technology described in this publication. This publication is intended to assist application developers to develop applications only for the Jamaica Virtual Machine. Every effort has been made to ensure that the information in this publication is accurate. aicas GmbH is not responsible for printing or clerical errors. Although the information herein is provided with good faith, the supplier gives neither warranty nor guarantee that the information is correct or that the results described are obtainable under end-user conditions. aicas GmbH phone +49 721 663 968-0 Emmy-Noether-Straße 9 fax +49 721 663 968-99 76131 Karlsruhe email [email protected] Germany web http://www.aicas.com aicas incorporated phone +1 203 359 5705 6 Landmark Square, Suite 400 Stamford CT 06901 email [email protected] USA web http://www.aicas.com aicas GmbH phone +33 1 4997 1762 9 Allee de l’Arche fax +33 1 4997 1700 92671 Paris La Defense email [email protected] France web http://www.aicas.com This product includes software developed by IAIK of Graz University of Technology. This software is based in part on the work of the Independent JPEG Group.
    [Show full text]
  • Partner Directory Wind River Partner Program
    PARTNER DIRECTORY WIND RIVER PARTNER PROGRAM The Internet of Things (IoT), cloud computing, and Network Functions Virtualization are but some of the market forces at play today. These forces impact Wind River® customers in markets ranging from aerospace and defense to consumer, networking to automotive, and industrial to medical. The Wind River® edge-to-cloud portfolio of products is ideally suited to address the emerging needs of IoT, from the secure and managed intelligent devices at the edge to the gateway, into the critical network infrastructure, and up into the cloud. Wind River offers cross-architecture support. We are proud to partner with leading companies across various industries to help our mutual customers ease integration challenges; shorten development times; and provide greater functionality to their devices, systems, and networks for building IoT. With more than 200 members and still growing, Wind River has one of the embedded software industry’s largest ecosystems to complement its comprehensive portfolio. Please use this guide as a resource to identify companies that can help with your development across markets. For updates, browse our online Partner Directory. 2 | Partner Program Guide MARKET FOCUS For an alphabetical listing of all members of the *Clavister ..................................................37 Wind River Partner Program, please see the Cloudera ...................................................37 Partner Index on page 139. *Dell ..........................................................45 *EnterpriseWeb
    [Show full text]
  • Actor-Oriented Programming for Resource Constrained Multiprocessor Networks on Chip
    Actor-Oriented Programming for Resource Constrained Multiprocessor Networks on Chip Gary J. Plumbridge PhD University of York Computer Science August 2015 for Ellie Abstract Multiprocessor Networks on Chip (MPNoCs) are an attractive architecture for inte- grated circuits as they can benefit from the improved performance of ever smaller tran- sistors but are not severely constrained by the poor performance of global on-chip wires. As the number of processors increases it becomes ever more expensive to provide co- herent shared memory but this is a foundational assumption of thread-level parallelism. Threaded models of concurrency cannot efficiently address architectures where shared memory is not coherent or does not exist. In this thesis an extended actor oriented programming model is proposed to en- able the design of complex and general purpose software for highly parallel and de- centralised multiprocessor architectures. This model requires the encapsulation of an execution context and state into isolated Machines which may only initiate communica- tion with one another via explicitly named channels. An emphasis on message passing and strong isolation of computation encourages application structures that are congru- ent with the nature of non-shared memory multiprocessors, and the model also avoids creating dependences on specific hardware topologies. A realisation of the model called Machine Java is presented to demonstrate the ap- plicability of the model to a general purpose programming language. Applications designed with this framework are shown to be capable of scaling to large numbers of processors and remain independent of the hardware targets. Through the use of an efficient compilation technique, Machine Java is demonstrated to be portable across sev- eral architectures and viable even in the highly constrained context of an FPGA hosted MPNoC.
    [Show full text]
  • Smart Dynamic Software Components Enabling Decision Support in Machine-To-Machine Networks
    IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 3, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 www.IJCSI.org 540 Smart dynamic software components enabling decision support in Machine-to-machine networks Alexander Dannies1*, Javier Palafox-Albarrán1, Walter Lang1 and Reiner Jedermann1 1 Institute for Microsensors, -actuators and -systems, University of Bremen Bremen, Bremen, Germany technologies more ubiquitous, devices have to collect Abstract information from a high number of devices distributed in The future Internet of Things will be extended by machine-to- the environment. For such a detailed supervision CRN are machine communication technologies in order to include sensor rather disadvantageous for the following reasons: information. The overwhelming amount of data will require autonomous decision making processes which are directly Communication costs have to be kept as low as executed at the location where data is generated or measured. An possible. intelligent sensor system needs to be able to adapt to new parameters in its surrounding unknown at the time of deployment. Network protocols have to be optimized for In our paper we show that Java enables software updates on transmission of small packets of sensor data mobile devices and also that it is possible to run algorithms consuming as little energy as possible instead of required for decision making processes on wireless sensor enabling global communication. platforms based on Java. Keywords: Machine-to-Machine communication, Internet of In many applications, such as the monitoring Things, autonomous logistics, Java, dynamic updates, OSGi. inside large buildings or rural regions, the supervised area will not be fully covered by the CRN of an external operator.
    [Show full text]
  • Interrupt Handlers in Java
    Downloaded from orbit.dtu.dk on: Oct 06, 2021 Interrupt Handlers in Java Korsholm, Stephan; Schoeberl, Martin; Ravn, Anders P. Published in: Proceedings of the 11th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2008) Link to article, DOI: 10.1109/ISORC.2008.68 Publication date: 2008 Document Version Early version, also known as pre-print Link back to DTU Orbit Citation (APA): Korsholm, S., Schoeberl, M., & Ravn, A. P. (2008). Interrupt Handlers in Java. In Proceedings of the 11th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2008) (pp. 453-457) https://doi.org/10.1109/ISORC.2008.68 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Interrupt Handlers in Java Stephan Korsholm Martin Schoeberl Department of Computer Science Institute of Computer Engineering Aalborg University DK-9220 Aalborg Vienna University of Technology, Austria [email protected] [email protected] Anders P.
    [Show full text]
  • Concurrent Compaction Using a Field Pinning Protocol
    Concurrent Compaction using a Field Pinning Protocol Erik Osterlund¨ Welf Lowe¨ Linnaeus University, Sweden Linnaeus University, Sweden [email protected] [email protected] Abstract objects and relocate them, i.e., perform compaction. Then Compaction of memory in long running systems has always the unused memory (garbage) is reclaimed. been important. The latency of compaction increases in to- We distinguish logical objects from their physical mem- day’s systems with high memory demands and large heaps. ory locations referred to as cells; a fragmented heap memory To deal with this problem, we present a lock-free protocol al- region is called from-space, a continuous heap memory re- gion is called to-space.1 lowing for copying concurrent with the application running, 2 which reduces the latencies of compaction radically. It pro- There are two different actors in GC. The garbage col- vides theoretical progress guarantees for copying and appli- lector(s) and the mutator(s). The garbage collector finds live cation threads without making it practically infeasible, with objects by scanning the stacks and globals for references to performance overheads of 15% on average. The algorithm root objects, identifies other live objects by computing the paves the way for a future lock-free Garbage Collector. transitive closure of these roots, and determines the con- demned set of potential objects for relocation. The garbage Categories and Subject Descriptors D.3.4 [Programming collector compacts memory by relocating live objects of the Languages]: Processors—memory management, garbage condemned set: it copies the payload of cells in from-space collection; D.1.3 [Programming Techniques]: Concurrent to cells in to-space and then remaps incoming references, Programming—parallel programming i.e., updates them to refer to the to-space cell.
    [Show full text]
  • Cooperative Framework for Open Real-Time Systems
    Departamento de Engenharia Informática Instituto Superior de Engenharia do Porto Cooperative Framework for Open Real-Time Systems Cláudio Roberto Ribeiro Maia Dissertação para a obtenção do Grau de Mestre em Engenharia Informática Área de especialização em Arquitectura, Sistemas e Redes Orientador Professor Doutor Luís Miguel Pinho Nogueira Júri Presidente: Professora Doutora Maria de Fátima Coutinho Rodrigues, Professora Coordenadora no Departamento de Engenharia Informática do Instituto Superior de Engenharia do Porto Vogais: Professor Doutor Alexandre Manuel Tavares Bragança, Professor Adjunto no Departamento de Engenharia Informática do Instituto Superior de Engenharia do Porto Professor Doutor Luís Miguel Pinho Nogueira, Professor Adjunto no Departamento de Engenharia Informática do Instituto Superior de Engenharia do Porto Porto, Fevereiro de 2011 ACKNOWLEDGEMENTS Since this project started back in October 2009, many people contributed by sharing experiences, guid- ance, knowledge and wisdom. In order to show my respect and gratitude to them, I would like to take this opportunity to do it. First of all, I would like to thank all the people at ISEP that in some way provided me with their support. More specifically, my school collegues for keeping me sane, the teachers for clarifying me with all sort of answers, the security guards for opening the doors during the night, the cleaning ladies for their warmful "Good mornings" and the remaining people to whom I have spoken and discussed about many different topics. I would also like to thank CISTER Research Centre for the opportunity of working in the CooperatES (Cooperative Embedded Systems) project (PTDC/EIA/71624/2006), which was the main driver to the MSc work presented in this document.
    [Show full text]
  • Java on Bare Metal with the Fiji VM
    Real Time Java on resource-constrained platforms with Fiji VM Filip Pizlo Lukasz Ziarek Jan Vitek Department of Computer Science, Purdue University, W. Lafayette, IN, 47909 Fiji Systems, LLC, Indianapolis, IN 46202. E-mail: {fil,luke,jan}@fiji-systems.com Abstract 3. A survey of limitations Java virtual machines face when tar- Real-time Java is quickly emerging as a platform for building geting hard real-time systems. We discuss our previous experi- safety-critical embedded systems. The real-time variants of Java, ence embedding Java virtual machines and identify six key goals including [8, 15], are attractive alternatives to Ada and C since state-of-the-art virtual machines should address to be better suited they provide a cleaner, simpler, and safer programming model. for hard real-time and mission critical application domains. Unfortunately, current real-time Java implementations have trouble 4. A concise description of the Fiji VM compiler and runtime scaling down to very hard real-time embedded settings, where system. We describe the unique features of the Fiji VM compiler memory is scarce and processing power is limited. In this paper, we and runtime system and their implementation. We address each of describe the architecture of the Fiji VM, which enables vanilla Java the six goals in the implementation and design of the Fiji VM. applications to run in very hard environments, including booting on bare hardware with only very rudimentary operating system 5. A performance comparison between the Fiji VM and state-of- support. We also show that our minimalistic approach delivers the-art, server-class Java VMs.
    [Show full text]
  • Efficient Compilation of .NET Programs for Embedded Systems
    Journal of Object Technology Published by AITO — Association Internationale pour les Technologies Objets, c JOT 2011 Online at http://www.jot.fm. Efficient Compilation of .NET Programs for Embedded Systems Olivier Sallenaveab Roland Ducournaub a. Cortus S.A., Montpellier, France http://www.cortus.com b. LIRMM — CNRS and Université Montpellier 2, France http://www.lirmm.fr Abstract Compiling under the closed-world assumption (CWA) has been shown to be an appropriate way for implementing object-oriented lan- guages such as Java on low-end embedded systems. In this paper, we ex- plore the implications of using whole program optimizations such as Rapid Type Analysis (RTA) and coloring on programs targeting the .Net infras- tructure. We extended RTA so that it takes into account .Net specific features such as (i) array covariance, a language feature also supported in Java, (ii) generics, whose specifications in .Net impacts type analysis and (iii) delegates, which encapsulate methods within objects. We also use an intraprocedural control flow analysis in addition to RTA . We eval- uated the optimizations that we implemented on programs written in C#. Preliminary results show a noticeable reduction of the code size, class hi- erarchy and polymorphism of the programs we optimize. Array covariance is safe in almost all cases, and some delegate calls can be implemented as direct calls. Keywords array covariance, closed-world assumption, delegate, late bind- ing, subtype test, type analysis 1 Introduction High-end embedded systems such as mobile phones have widely adopted object- oriented languages like Java. Object-oriented programming offers code reuse through inheritance and more reliable designs, which improves the productivity in software development.
    [Show full text]