The Linux/Ia64 Project: Kernel Design and Status Update
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
“Embedded Linux Development Made Easier” User's Manual
\Embedded Linux development made easier" User's manual Version: 2.10.2 August 4, 2009 About Evidence S.r.l. Evidence is a company operating in the field of software for embedded real-time systems. It started in 2002 as a spin-off company of the Real-Time Systems (ReTiS) Lab of the Scuola Superiore Sant'Anna (Pisa, Italy). Today, Evidence is a dynamic company having collaborations in the field of electronics, telecommunications, automotives, and industrial automation. People at Evidence are experts in the domain of embedded and real-time systems, with a deep knowledge on the design and specification flow of embedded software, especially for the embedded market. Besides providing consultancy services, Evidence also provides: BSPs based on Linux for embedded devices, evaluation boards featuring most innovative 8, 16 and 32-bit microcontrollers for the embedded market, development tools for making embedded software development easier, and tools for the schedulability analysis of real-time tasks running on your final product. Contact Info Evidence Srl, Via Carducci 64/A Localit´aGhezzano 56010 S.Giuliano Terme PISA Italy Tel: +39 050 99 11 224 Fax: +39 050 99 10 812 For more information about Evidence products, please send an e-mail to the follow- ing address: [email protected]. Other information about the Evidence product line can be found at the Evidence web site at: http://www.evidence.eu.com. This document is Copyright 2005-2009 Evidence S.r.l. Information and images contained within this document are copyright and the property of Evidence S.r.l. All trademarks are hereby acknowledged to be the properties of their respective owners. -
Virtual Square Users, Programmers & Developers Guide Renzo Davoli, Michael Goldweber Editors Contributions By
Virtual Square Users, Programmers & Developers Guide Renzo Davoli, Michael Goldweber Editors Contributions by: Diego Billi, Federica Cenacchi, Renzo Davoli, Ludovico Gardenghi, Andrea Gasparini, Michael Goldweber The Virtual Square Team 2 Copyright c 2008 Renzo Davoli, Michael Golweber and the Virtual Square. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being the Introduction, with the Front-Cover Texts being the Title Page with the Logo (recto of this page) and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Introduction Virtual Square is a container of projects about virtuality. The word “virtual” has been overused and misused, everything related to computers and networks sounds virtual. Computer Science define abstractions and interfaces. These two key con- cepts are strictly related. An abstraction defines the semantics of operations while an interface is the syntax required to access the operations defined by the abstraction. Programs and human users use interfaces to ask for the actions defined by an abstraction. Virtuality means providing equivalent abstractions, providing the same in- terface, such that the users (programs or humans) can effectively use the virtual abstraction instead of the real one. For example, a file system is an abstraction providing an application pro- gramming interface (API) composed by several calls like open, read, close. A virtual file system is an abstraction providing the same interface, such that the programs using the file system can use the virtual file system too. -
Compression-Friendly Encoding for LLVM Intermediate Representation
Aalto University School of Science Degree Programme of Computer Science and Engineering Timo Lindfors Compression-friendly Encoding for LLVM Intermediate Representation Master's Thesis Espoo, May 8, 2014 Supervisor: Professor Heikki Saikkonen Instructor: Vesa Hirvisalo D.Sc. (Tech.) Aalto University School of Science ABSTRACT OF Degree Programme of Computer Science and Engineering MASTER'S THESIS Author: Timo Lindfors Title: Compression-friendly Encoding for LLVM Intermediate Representation Date: May 8, 2014 Pages: 68 + 9 Professorship: Software technology Code: T-106 Supervisor: Professor Heikki Saikkonen Instructor: Vesa Hirvisalo D.Sc. (Tech.) Distributing software in compiler intermediate representation (IR) instead of na- tive code offers new possibilities for optimization. When IR for the whole pro- gram and its dependencies is available at the target system we can use simple but effective install-time optimizations such as constant propagation across li- brary boundaries. Since we know the exact CPU instruction set we can also generate code that optimally matches the target system. Finally, we can execute the software using a just-in-time compiling (JIT) interpreter that can benefit from locally generated profiling information. Unfortunately the bitcode format that is used to encode the IR of the popular LLVM compiler takes more space than native code. This is mostly because it has been designed to be seekable to allow execution of code without having to read the whole bitcode file. Seekability is a useful property but it is not needed in a software distribution format. Bitcode is also bit oriented which confuses most byte oriented compression tools. We present a new compression-friendly wire format for the LLVM IR. -
Mondrix: Memory Isolation for Linux Using Mondriaan Memory Protection
Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection Emmett Witchel Junghwan Rhee Krste Asanovic´ ∗ Department of Computer School of Electrical and MIT Computer Science and Sciences Computer Engineering Artificial Intelligence University of Texas at Austin Purdue University Laboratory Austin TX 78712 West Lafayette, Indiana 47907 Cambridge, MA 02139 [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION This paper presents the design and an evaluation of Mondrix, a Reliability and security are quickly becoming users’ biggest con- version of the Linux kernel with Mondriaan Memory Protection cerns due to the increasing reliance on computers in all areas of so- (MMP). MMP is a combination of hardware and software that pro- ciety. Operating systems written in unsafe languages are efficient, vides efficient fine-grained memory protection between multiple but they crash too often and are susceptible to malicious attacks. protection domains sharing a linear address space. Mondrix uses Crashes and security breaches incur large costs in lost productivity MMP to enforce isolation between kernel modules which helps de- and increased system administration overhead. Many of these in- tect bugs, limits their damage, and improves kernel robustness and cidents could be reduced in severity or even avoided, if a fault in a maintainability. During development, MMP exposed two kernel single software module was caught before it propagated throughout bugs in common, heavily-tested code, and during fault injection the system. Faults often lead to illegal memory accesses, and wild experiments, it prevented three of five file system corruptions. writes can cause further modules to fail. Memory isolation, which The Mondrix implementation demonstrates how MMP can bring forbids one software module from reading or writing another mod- memory isolation to modules that already exist in a large software ule’s memory without permission, is therefore a crucial component application. -
Enhancing the Monitoring of Real-Time Performance in Linux
Master of Science Thesis Enhancing the Monitoring of Real-Time Performance in Linux Author: Nima Asadi [email protected] Supervisor: Mehrdad Saadatmand Examiner: Mikael Sj¨odin [email protected] [email protected] Sweden, April 2014 This thesis is dedicated to my parents for their constant love, support and encouragement Acknowledgements I would like to thank my supervisor Mehrdad Saadatmand for his guidance and help during the helpful discussions that we had in our meetings. Furthermore, I would like to express my thankfulness to Mikael Sj¨odinfor his help in publishing a scientific paper based on this thesis work with his comments and feedback. Also, I want to thank Nima Moghaddami Khalilzad for his very insightful advice on the design and modification of the real-time module. ii Abstract There is a growing trend in applying Linux operating system in the domain of embedded systems. This is due to the important features that Linux benefits from, such as being open source, its light weight compared to other major operating systems, its adaptability to different platforms, and its more stable performance speed. However, there are up- grades that still need to be done in order to use Linux for real-time purposes. A number of different approaches have been suggested in order to improve Linux's performance in real-time environment. Nevertheless, proposing a correct-by-construction system is very difficult in real-time environment, mainly due to the complexity and unpredictability of them. Thus, run-time monitoring can be a helpful approach in order to provide the user with data regarding to the actual timing behavior of the system which can be used for analysis and modification of it. -
Improved Kernel Security Through Code Validation, Diversification, and Minimization Dannie Michael Stanley Purdue University
Purdue University Purdue e-Pubs Open Access Dissertations Theses and Dissertations Fall 2013 Improved Kernel Security Through Code Validation, Diversification, and Minimization Dannie Michael Stanley Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_dissertations Part of the Computer Sciences Commons Recommended Citation Stanley, Dannie Michael, "Improved Kernel Security Through Code Validation, Diversification, and Minimization" (2013). Open Access Dissertations. 44. https://docs.lib.purdue.edu/open_access_dissertations/44 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School ETD Form 9 (Revised 12/07) PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Dannie Michael Stanley Entitled Improved Kernel Security Through Code Validation, Diversification, and Minimization Doctor of Philosophy For the degree of Is approved by the final examining committee: Eugene H. Spafford Chair Dongyan Xu Samuel Liles Sonia Fahmy To the best of my knowledge and as understood by the student in the Research Integrity and Copyright Disclaimer (Graduate School Form 20), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy on Integrity in Research” and the use of copyrighted material. Approved by Major Professor(s): ____________________________________Eugene H. Spafford _______________Dongyan Xu _____________________ Approved by: Sunil Prabhakar / William J. Gorman 12/02/2013 Head of the Graduate Program Date IMPROVED KERNEL SECURITY THROUGH CODE VALIDATION, DIVERSIFICATION, AND MINIMIZATION A Dissertation Submitted to the Faculty of Purdue University by Dannie M. Stanley In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2013 Purdue University West Lafayette, Indiana ii To my wife, my parents, and my children.