REAL-TIME EMBEDDED COMPONENTS and SYSTEMS with LINUX and RTOS

Total Page:16

File Type:pdf, Size:1020Kb

REAL-TIME EMBEDDED COMPONENTS and SYSTEMS with LINUX and RTOS REAL-TIME EMBEDDED COMPONENTS AND SYSTEMS with LINUX and RTOS Sam Siewert John Pratt MERCURY LEARNING AND INFORMATION Dulles, Virginia Boston, Massachusetts New Delhi Copyright ©2016 by Mercury Learning And Information LLC. All rights reserved. This publication, portions of it, or any accompanying software may not be reproduced in any way, stored in a retrieval system of any type, or transmitted by any means, media, electronic display or mechanical display, including, but not limited to, photocopy, recording, Internet postings, or scanning, without prior permission in writing from the publisher. Publisher: David Pallai Mercury Learning and Information 22841 Quicksilver Drive Dulles, VA 20166 [email protected] www.merclearning.com (800) 232-0223 S. Siewert and J. Pratt. Real-Time Embedded Components and Systems with LINUX and RTOS. ISBN: 978-1-942270-04-1 The publisher recognizes and respects all marks used by companies, manufacturers, and developers as a means to distinguish their products. All brand names and product names mentioned in this book are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of service marks or trademarks, etc. is not an attempt to infringe on the property of others. Library of Congress Control Number: 2015944870 151617321 This book is printed on acid-free paper. Our titles are available for adoption, license, or bulk purchase by institutions, corporations, etc. For additional information, please contact the Customer Service Dept. at 800-232-0223(toll free). All of our titles are available in digital format at authorcloudware.com and other digital vendors. Companion fi les (fi gures and code listings) for this title are available by contacting [email protected]. The sole obligation of Mercury Learning and Information to the purchaser is to replace the disc, based on defective materials or faulty workmanship, but not based on the operation or functionality of the product. LICENSE, DISCLAIMER OF LIABILITY, AND LIMITED WARRANTY By purchasing or using this book (the “Work”), you agree that this license grants permission to use the contents contained herein, but does not give you the right of ownership to any of the textual content in the book or ownership to any of the information or products contained in it. This license does not permit uploading of the Work onto the Internet or on a network (of any kind) without the writ- ten consent of the Publisher. Duplication or dissemination of any text, code, simulations, images, etc. contained herein is limited to and subject to licensing terms for the respective products, and permission must be obtained from the Publisher or the owner of the content, etc., in order to reproduce or network any portion of the textual material (in any media) that is contained in the Work. Mercury Learning And Information (“MLI” or “the Publisher”) and any- one involved in the creation, writing, or production of the companion disc, ac- companying algorithms, code, or computer programs (“the software”), and any accompanying Web site or software of the Work, cannot and do not warrant the performance or results that might be obtained by using the contents of the Work. The author, developers, and the Publisher have used their best ef- forts to insure the accuracy and functionality of the textual material and/or pro- grams contained in this package; we, however, make no warranty of any kind, express or implied, regarding the performance of these contents or programs. The Work is sold “as is” without warranty (except for defective materials used in manufacturing the book or due to faulty workmanship). The author, developers, and the publisher of any accompanying content, and anyone involved in the composition, production, and manufacturing of this work will not be liable for damages of any kind arising out of the use of (or the inability to use) the algorithms, source code, computer programs, or textual material contained in this publication. This includes, but is not limited to, loss of revenue or profi t, or other incidental, physical, or consequential damages arising out of the use of this Work. The sole remedy in the event of a claim of any kind is expressly limited to re- placement of the book, and only at the discretion of the Publisher. The use of “implied warranty” and certain “exclusions” vary from state to state, and might not apply to the purchaser of this product. PREFACE This book is intended to provide the practicing engineer with the necessary background to apply real-time theory to the design of embedded components and systems in order to successfully field a real-time embedded system. The book also is intended to provide a senior-year undergraduate or first-year grad- uate student in electrical engineering, computer science, or related fields of study with a balance of fundamental theory, review of industry practice, and hands-on experience to prepare for a career in the real-time embedded system industries. Typical industries include aerospace, medical diagnostic and thera- peutic systems, telecommunications, automotive, robotics, industrial process control, media systems, computer gaming, and electronic entertainment, as well as multimedia applications for general-purpose computing. Real-time sys- tems have traditionally been fielded as hard real-time applications, such as digi- tal flight control systems, antilock braking systems, and missile guidance. More recently, however, intense interest in soft real-time systems has arisen due to the quickly growing market for real-time digital media services and systems. This updated edition adds three new chapters focused on key technology ad- vancements in embedded systems and with wider coverage of real-time archi- tectures. The overall focus remains the RTOS (Real-Time Operating System), but use of Linux for soft real-time, hybrid FPGA (Field Programmable Gate Array) architectures and advancements in multi-core system-on-chip (SoC), as well as software strategies for asymmetric and symmetric multiprocessing (AMP and SMP) relevant to real-time embedded systems, has been added. Specifically, a new Chapter 9 provides an overview of RTOS advancements, including AMP and SMP configurations, with a discussion of future directions for RTOS use in multi-core architectures, such as SoC. A new Chapter 10 is devoted to open source RTOS, with emphasis on FreeRTOS. A new Chapter 11 is focused on methods to integrate embedded Linux into real-time embed- ded systems, with emphasis on soft real-time requirements, methods to patch and improve the Linux kernel for predictable response, and finally best prac- tices for implementation of real-time services and applications that make use of POSIX real-time extensions in the 1003.1 2013 standard. The original Chapters 9, 10, and 11 have been preserved and are now Chapters 12 to 14, and Part III remains unchanged other than chapter renumbering to accommodate the insertion of the new chapters. xii • PREFACE John Pratt, a new co-author, has contributed extensively to this edition, with specific focus on FreeRTOS, and brings a unique perspective to this updated version with his commercial mobile embedded systems expertise. The new Linux examples and extended coverage of Linux in this edition are based upon a summer version of the course Real-Time Embedded Systems taught at the University of Colorado, Boulder, to offer an alternative to the tra- ditional fall course that has used the Wind River VxWorks RTOS. The summer course has emphasized the same hard and soft real-time theory, but practice has focused on using Linux to achieve predictable response for systems that require real-time, but where occasional missed deadlines are not catastrophic. For example, mobile digital media, augmented reality applications, computer vision and digital entertainment and interactive systems. While hard real-time mission critical systems are still a major concern, many emergent applications require predictable response and simply need to provide high-quality of ser- vice. The use of buffering and time stamps to work ahead and provide high- quality presentation of results is, for example, a method used in digital video encode, transport, and decode, where the systems software is not required to provide deterministic proven hard real-time processing, as has been the goal for the RTOS. Likewise, many systems today use best-effort or soft real-time embedded Linux configurations with coprocessors, either FPGA or ASIC (Ap- plication Specific Integrated Circuits), that provide guaranteed hard real-time processing with hardware state machines. Numerous improvements and corrections have been made to the original edition text to improve readability and clarity based on excellent feedback by many undergraduate and graduate students at the University of Colorado who have used the original edition text since August 2006. While it’s impossible to keep up with all the advancements related to real- time embedded systems, we hope the reader will find the new chapters and expanded example material included on the DVD a useful extension to tradi- tional cyclic executive and RTOS real-time system components and systems architecture. The expanded guidelines and strategies are intended to help the practicing engineer and to introduce advanced undergraduate and graduate students in computer and software engineering disciplines to design strategies and methods to tackle many of the challenges found in real-time embedded systems. This challenging engineering area continues to evolve
Recommended publications
  • Wind River Vxworks Platforms 3.8
    Wind River VxWorks Platforms 3.8 The market for secure, intelligent, Table of Contents Build System ................................ 24 connected devices is constantly expand- Command-Line Project Platforms Available in ing. Embedded devices are becoming and Build System .......................... 24 VxWorks Edition .................................2 more complex to meet market demands. Workbench Debugger .................. 24 New in VxWorks Platforms 3.8 ............2 Internet connectivity allows new levels of VxWorks Simulator ....................... 24 remote management but also calls for VxWorks Platforms Features ...............3 Workbench VxWorks Source increased levels of security. VxWorks Real-Time Operating Build Configuration ...................... 25 System ...........................................3 More powerful processors are being VxWorks 6.x Kernel Compatibility .............................3 considered to drive intelligence and Configurator ................................. 25 higher functionality into devices. Because State-of-the-Art Memory Host Shell ..................................... 25 Protection ..................................3 real-time and performance requirements Kernel Shell .................................. 25 are nonnegotiable, manufacturers are VxBus Framework ......................4 Run-Time Analysis Tools ............... 26 cautious about incorporating new Core Dump File Generation technologies into proven systems. To and Analysis ...............................4 System Viewer ........................
    [Show full text]
  • Wind River Linux Subscription and Services Offerings
    WIND RIVER LINUX SUBSCRIPTION AND SERVICES OFFERINGS The industry’s most advanced embedded Linux development platform, with a comprehensive suite of products, tools, and lifecycle services to help our customers build and support intelligent edge devices Wind River® Linux enables you to build and deploy robust, reliable, and secure Linux-based edge devices and systems without the risk and development effort associated with roll-your-own (RYO) in-house efforts. Let Wind River keep your code base up to date, track and fix defects, apply security patches, customize your runtime to adhere to strict market specifications and certifications, facilitate your IP and export compliance, and significantly reduce your costs. Wind River is the global leader in the embedded software industry, with decades of expertise, more than 15 years as an active contributor and committed champion of open source, and a proven track record of helping customers build and deploy use case–optimized devices and systems. Wind River Linux is running on hundreds of millions of deployed devices worldwide, and the Wind River Linux suite of products and services offers you a high degree of confidence and flexibility to prototype, develop, and move to real deployment. Table 1. Comparison of Wind River Linux Delivery Release Options Freely Available Long Term Support (LTS) Continuous Delivery (CD) Annually, with Annually, with predictable Rolling Ongoing, with every-3-weeks Frequency community Cumulative Patch Layer (RCPL) cadence release cadence maintenance 3 weeks, until next
    [Show full text]
  • WIND RIVER INTELLIGENT DEVICE PLATFORM XT the Foundation for Building Devices That Connect to the Internet of Things
    WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but Wind River® has been providing the intelligence that powers interconnected, automated systems for decades. Wind River Intelligent Device Platform XT is a scalable, sustainable, and secure development environment that simplifies the development, integration, and deployment of IoT gateways. It is based on Wind River industry-leading operating systems, which are standards-compliant and fully tested, as well as Wind River development tools. The platform provides device security, smart connectivity, rich network options, and device management; and it includes ready-to-use components built exclusively for developing IoT gateway applications. Intelligent Device Platform XT provides outstanding software and expertise to fuel the rapid innovation and deployment of safe, secure, and reliable intel- ligent devices through more efficient development cycles, standards-based data connec- tions, and intuitive management tools. CONNECTIVITY TOOLS ZigBee Bluetooth WWAN VPN MQTT Cloud Connector Wi MANAGEMENT nd River Integrated Development Environment T Secure Updates OMA DM, TR-069 Device Authentication Web Interface Application Signing API OpenJDK Lua VM SQLite OSGi To SECURITY ol TCG Standards Role Based Access Control Integrity Monitoring Signed Software ool s WIND RIVER OPERATING ENVIRONMENTS Trusted Secure Boot Wind River Intelligent Device Operating Platform Feature Environment Base Figure 1: Wind River Intelligent Device Platform architecture Product Note INNOVATORS START HERE. WIND RIVER INTELLIGENT DEVICE PLATFORM XT INTEL, MCAFEE, AND WIND RIVER, BETTER TOGETHER Intelligent Device Platform XT is part of Intel® Gateway Solutions for Internet of Things (IoT), a family of platforms that enables companies to seamlessly interconnect indus- trial devices and other systems into a system of systems.
    [Show full text]
  • Wind River Simics
    ™ AN INTEL COMPANY WIND RIVER SIMICS Electronic systems are becoming increasingly complex, with more hardware, more software, and more connectivity. Today’s systems are software intensive, using multiple processor architectures and running complex, multilayered software stacks. With an increasing empha- sis on smart and connected systems, complexity in software and hardware is unavoidable. With more connections comes additional security risk, which needs to be tested thoroughly. Compounding the challenge is the fact that developers have turned to DevOps and con- tinuous development practices to meet customer and company expectations for quick deliveries. Such methodologies rely on fast iterations for test, feedback, and deployment. Collaborative and cross-functional teams need tools to communicate and share a common development baseline. Wind River® Simics® allows developers to have on-demand access to any target system at any time. It enables more efficient collaboration between developers and quality assurance teams. Simics provides an automation API, enabling organizations to reap the business ben- efits of DevOps and continuous development practices to create and deliver better, more secure software, faster—even for complex, embedded, connected, and large IoT systems. DEVELOP SOFTWARE IN A VIRTUAL ENVIRONMENT Simics provides the access, automation, and collaboration required to enable DevOps and continuous development practices. By using virtual platforms and simulation, soft- ware developers can decouple their work from physical hardware and its limitations during development. Access to virtual hardware allows developers to do continuous integration and automated testing much sooner in the development cycle—even before the hardware design is finalized—as well as perform both testing and debugging during design and pro- totyping phases.
    [Show full text]
  • Wind River Customer Support Services
    ™ WIND RIVER CUSTOMER SUPPORT SERVICES At Wind River®, we understand the challenges of developing leading-edge, reliable sys- tems that leverage the latest hardware technology. Our award-winning team is here to assist you with support services that fit your needs and your budget. WIND RIVER E-SUPPORT Wind River e-Support provides continuous access to the Wind River Support Network, a single online source for interactive self-help that includes: • Wind River Knowledge Library – Wind River product documentation in PDF and searchable HTML versions – Product-specific information, including bug reports, FAQs, security advisories, and configuration notes – Application notes, technical tips, and sample code on handling common problems • Wind River Knowledge Forum, an interactive question-and-answer forum providing help from Wind River experts • Software upgrades, updates, cumulative patches, and board support packages • An email and Web-based notification system for problem reports and patches WIND RIVER ENTERPRISE SUPPORT Not all challenges can be resolved with knowledge alone—sometimes you need an expert who can consider your unique environment and help solve problems with one-on-one interactions. Wind River Enterprise Support offers the following benefits: • Live assistance from experts, with no limit on the number of issues raised • Over 150 experienced engineers averaging more than 10 years of device software experience • Six major support centers and 21 additional support hubs worldwide, providing access to people with the right knowledge in a convenient time zone • A convenient online utility for submitting, tracking, and monitoring technical support requests • All the benefits of Wind River e-Support WIND RIVER PREMIUM PROJECT SUPPORT For critical projects with sensitive deadlines, you need a support team who understands your unique environment, your application, and your hardware.
    [Show full text]
  • Star Lab Whitepaper
    10 Properties of Secure Embedded Systems Protecting Can’t-Fail Embedded Systems from Tampering, Reverse Engineering, and Other Cyber Attacks www.windriver.com It’s Not a Fair Fight… When attacking an embedded system, it takes only “When tasked one vulnerability to lead to an exploit. with securing an embedded When tasked with securing an embedded system, you (the system, you (the defender) must be prepared to protect against every possible vulnerability. Overlook a single opening and the attacker may find it, defender) must take control, steal your secrets, and create an exploit for others to be prepared to use anytime, anywhere. protect against Worse yet, that same attacker may use an initial compromised every possible device to pivot from one exploited subsystem to another, causing further damage to your network, mission, and reputation. vulnerability.” This white paper covers the most important security design principles that, if adhered to, give you a fighting chance against any attacker who seeks to gain unauthorized access, reverse engineer, steal sensitive information, or otherwise tamper with your embedded system. The beauty of these 10 principles is that they can be layered together into a cohesive set of countermeasures that achieve a multiplicative effect, making device exploitation significantly difficult and costly for the attacker. Data at Rest Protection Your applications, configurations, and data aren't Using certified safe if they're not protected at rest. Period. and/or industry standard crypto You can protect your applications and data at rest in one of two algorithms such ways: as AES, RSA, 1. Prevent the attacker from ever gaining access to this information in the first place ECC, or SHA will 2.
    [Show full text]
  • Partner Directory Wind River Partner Program
    PARTNER DIRECTORY WIND RIVER PARTNER PROGRAM The Internet of Things (IoT), cloud computing, and Network Functions Virtualization are but some of the market forces at play today. These forces impact Wind River® customers in markets ranging from aerospace and defense to consumer, networking to automotive, and industrial to medical. The Wind River® edge-to-cloud portfolio of products is ideally suited to address the emerging needs of IoT, from the secure and managed intelligent devices at the edge to the gateway, into the critical network infrastructure, and up into the cloud. Wind River offers cross-architecture support. We are proud to partner with leading companies across various industries to help our mutual customers ease integration challenges; shorten development times; and provide greater functionality to their devices, systems, and networks for building IoT. With more than 200 members and still growing, Wind River has one of the embedded software industry’s largest ecosystems to complement its comprehensive portfolio. Please use this guide as a resource to identify companies that can help with your development across markets. For updates, browse our online Partner Directory. 2 | Partner Program Guide MARKET FOCUS For an alphabetical listing of all members of the *Clavister ..................................................37 Wind River Partner Program, please see the Cloudera ...................................................37 Partner Index on page 139. *Dell ..........................................................45 *EnterpriseWeb
    [Show full text]
  • FREQUENTLY ASKED QUESTIONS Wind River Linux 9 Download
    ™ AN INTEL COMPANY FREQUENTLY ASKED QUESTIONS Wind River Linux 9 Download Q1. What is Wind River® Linux? A1. Wind River Linux is the leader for building outstanding open source embedded products, ensuring customers work with the latest code from the most important open source efforts and most recent technologies. Wind River Linux embraces and extends open source, delivering real-time security monitoring, predictable updates, and legal compliance into open source. Q2. What do I get with this product download? A2. With this product download you get a snapshot of the latest Yocto Project release (Yocto Project 2.2), product templates, which are layers with specific recipes designed to simplify the addition of product features, and all of the board support packages (BSPs) included with the Yocto Project 2.2 release. Q3. What steps do I need to take to download the product? A3. Complete the form and get access to the Wind River GitHub repository that hosts the source code for the product. Q4. How do I install the product? A4. In the Quick Start guide you will find the steps to install the product. It contains instruc- tions on how to create a platform project and build your own Wind River Linux distribu- tion, as well as system requirements details. For more information, please refer to the product documentation. Q5. Do I need to provide any credit card information? A5. No. Access to Wind River Linux 9 is free. Q6. Is Internet access required for Wind River Linux? A6. Yes. Q7. How do I know my hardware can run Wind River Linux? A7.
    [Show full text]
  • Open Network Virtualization with SDN And
    HIGH PERFORMANCE, OPEN STANDARD VIRTUALIZATION WITH NFV AND SDN A Joint Hardware and Software Platform for Next-Generation NFV and SDN Deployments By John DiGiglio, Software Product Marketing, Intel Corporation Davide Ricci, Product Line Manager, Wind River INNOVATORS START HERE. HIGH PERFORMANCE, OPEN STANDARD VIRTUALIZATION WITH NFV AND SDN EXECUTIVE SUMMARY With exploding traffic creating unprecedented demands on networks, service providers are looking for equipment that delivers greater agility and economics to address con- stantly changing market requirements. In response, the industry has begun to develop more interoperable solutions per the principles outlined by software defined networking (SDN) and a complementary initiative, network functions virtualization (NFV). At the heart of these two approaches is the decoupling of network functions from hardware through abstraction. The end result: Software workloads will no longer be tied to a particular hardware platform, allowing them to be controlled centrally and deployed dynamically throughout the network as needed. Moreover, network functions can be consolidated onto standard, high-volume servers, switches, and storage, further reducing time-to- market and costs for network operators. This paper describes hardware and software ingredients addressing network equipment platform needs for NFV and SDN, and details how they could be used in a Cloud Radio Access Network (C-RAN) and other use cases. The solutions presented in this paper— designed to achieve real-time, deterministic performance
    [Show full text]
  • Digging Inside the Vxworks OS and Firmware the Holistic Security
    Digging Inside the VxWorks OS and Firmware The Holistic Security Aditya K Sood (0kn0ck) SecNiche Security Labs (http://www.secniche.org) Email: adi ks [at] secniche.org 1 Contents 1 Acknowledgement 3 2 Abstract 4 3 Introduction 5 4 Architectural Overview 6 5 Fault Management 7 5.1 Protection Domains, Sybsystems and Isolation . 7 5.2 Understanding OMS and AMS . 7 6 Virtualization - Embedded Hypervisor 8 6.1 Hypervisor and Virtual Board Security . 8 7 VxWorks OS Security Model and Fallacies 9 7.1 Stack Overflow Detection and Protection . 9 7.2 VxWorks Network Stack . 9 7.3 VxWorks and The SSL Game . 10 7.4 Firewalling VxWorks . 10 7.5 VxWorks Debugging Interface . 11 7.6 Weak Password Encryption Algorithm . 13 7.7 NDP Information Disclosure . 13 8 Design of VxWork 5.x - Firmware 13 8.1 VxWorks Firmware Generic Structure . 14 9 VxWorks Firmware Security Analysis 15 9.1 Hacking Boot Sequence Program (BSP) . 15 9.2 VxWorks Firmware Killer . 16 9.3 Services and Port Layout . 18 9.4 Factory Default Passwords . 18 9.5 Config.bin - Inappropriate Encryption . 19 10 Embedded Devices - Truth about Security 20 10.1 Embedded Private Keys - HTTPS Communication . 20 10.2 Firmware Checksum Algorithms . 20 10.3 Insecure Web Interfaces . 20 10.4 Unpatched Firmware and Obsolete Versions . 20 11 Future Work 21 12 Conclusion 21 13 References 22 2 1 Acknowledgement I sincerely thank my friends and security researchers for sharing thoughts over the VxWorks. • Jeremy Collake (Bitsum) • Edgar Barbosa (COSEINC) • Luciano Natafrancesco (Netifera) In addition, I would also like to thank HD Moore for finding vulnerabilities in VxWorks OS.
    [Show full text]
  • Vxworks ® Programmer’S Guide
    VxWorks ® Programmer’s Guide 5.4 Edition 1 An ISO 9001 Registered Company Copyright 1984 – 1999 Wind River Systems, Inc. ALL RIGHTS RESERVED. No part of this publication may be copied in any form, by photocopy, microfilm, retrieval system, or by any other means now known or hereafter invented without the prior written permission of Wind River Systems, Inc. VxWorks, IxWorks, Wind River Systems, the Wind River Systems logo, wind, and Embedded Internet are registered trademarks of Wind River Systems, Inc. CrossWind, Tornado, VxMP, VxSim, VxVMI, WindC++, WindConfig, Wind Foundation Classes, WindNet, WindPower, WindSh, and WindView are trademarks of Wind River Systems, Inc. All other trademarks used in this document are the property of their respective owners. Corporate Headquarters Europe Japan Wind River Systems, Inc. Wind River Systems, S.A.R.L. Wind River Systems Japan 1010 Atlantic Avenue 19, Avenue de Norvège Pola Ebisu Bldg. 11F Alameda, CA 94501-1153 Immeuble B4, Bâtiment 3 3-9-19 Higashi USA Z.A. de Courtaboeuf 1 Shibuya-ku 91953 Les Ulis Cédex Tokyo 150 FRANCE JAPAN toll free (US): 800/545-WIND telephone: 510/748-4100 telephone: 33-1-60-92-63-00 telephone: 81-3-5467-5900 facsimile: 510/749-2010 facsimile: 33-1-60-92-63-15 facsimile: 81-3-5467-5877 CUSTOMER SUPPORT Telephone E-mail Fax Corporate: 800/872-4977 toll free, U.S. & Canada [email protected] 510/749-2164 510/748-4100 direct Europe: 33-1-69-07-78-78 [email protected] 33-1-69-07-08-26 Japan: 011-81-3-5467-5900 [email protected] 011-81-3-5467-5877 If you purchased your Wind River Systems product from a distributor, please contact your distributor to determine how to reach your technical support organization.
    [Show full text]
  • Wind River Linux Release Notes, 5.0.1
    Wind River Linux Release Notes, 5.0.1 Wind River® Linux RELEASE NOTES 5.0.1 Copyright © 2013 Wind River Systems, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without the prior written permission of Wind River Systems, Inc. Wind River, Tornado, and VxWorks are registered trademarks of Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc. Any third-party trademarks referenced are the property of their respective owners. For further information regarding Wind River trademarks, please see: www.windriver.com/company/terms/trademark.html This product may include software licensed to Wind River by third parties. Relevant notices (if any) are provided in your product installation at one of the following locations: installDir/product_name/3rd_party_licensor_notice.pdf installDir/legal-notices/ Wind River may refer to third-party documentation by listing publications or providing links to third-party Web sites for informational purposes. Wind River accepts no responsibility for the information provided in such third-party documentation. Corporate Headquarters Wind River 500 Wind River Way Alameda, CA 94501-1153 U.S.A. Toll free (U.S.A.): 800-545-WIND Telephone: 510-748-4100 Facsimile: 510-749-2010 For additional contact information, see the Wind River Web site: www.windriver.com For information on how to contact Customer Support, see: www.windriver.com/support Wind River Linux Release Notes 5.0.1 4 Apr 13 Contents 1 Overview ...................................................................................................... 1 1.1 Introduction ...................................................................................................................... 1 1.2 Navigating these Release Notes ................................................................................... 1 1.3 Features ............................................................................................................................
    [Show full text]