SPACE AND TIME PARTITIONING WITH HARDWARE SUPPORT FOR SPACE APPLICATIONS
|
|
|
- Sandra Dixon
- 9 years ago
- Views:
Transcription
1 SPACE AND TIME PARTITIONING WITH HARDWARE SUPPORT FOR SPACE APPLICATIONS S. Pinto 1, A. Tavares 1, and S. Montenegro 2 1 Centro Algoritmi, Universidade do Minho, Guimaraes, Portugal 2 Aerospace Information and Technology, Universität Würzburg, Germany ABSTRACT Complex and critical systems like airplanes and spacecraft implement a very fast growing amount of functions. Typically, those systems were implemented with fully federated architectures, but the number and complexity of desired functions of todays systems led aerospace industry to follow another strategy. Integrated Modular Avionics (IMA) arose as an attractive approach for consolidation, by combining several applications into one single generic computing resource. Current approach goes towards higher integration provided by space and time partitioning (STP) of system virtualization. The problem is existent virtualization solutions are not ready to fully provide what the future of aerospace are demanding: performance, flexibility, safety, security while simultaneously containing Size, Weight, Power and Cost (SWaP-C). This work describes a real time hypervisor for space applications assisted by commercial off-the-shell (COTS) hardware. ARM TrustZone technology is exploited to implement a secure virtualization solution with low overhead and low memory footprint. This is demonstrated by running multiple guest partitions of operating system on a Xilinx Zynq platform. Key words: Space and Time Partition; Virtualization; TrustZone; Real-Time; Embedded Systems; ARM. 1. INTRODUCTION The market of complex and critical systems like cars, airplanes and spacecraft have experienced unprecedented growth over the last few years and is expected to continue growing exponentially for the foreseeable future [1]. The number and complexity of desired functions evolved in such a way that fully federated architectures, where each function is implemented in its own embedded controller, become completely impracticable. Naturally, industries rapidly tried to find other alternatives, and aeronautics pioneering the shift from traditional federated architectures to an IMA [2] architecture. By combining several applications into one generic powerful computing resource, they were able to get a reduction on SWaP-C. As space domain typically shares the same basic needs of aeronautics, they rapidly concluded that IMA strategy could be spun-in to the space domain. The problem was that the use of generic platforms altogether with several COTS-based components with different criticality and from several suppliers, imposed integration challenges namely in terms of reusability and safety. The introduction of STP [3, 4] for separation of concerns between functionally independent software components was the solution to achieve higher level of integration, while maintaining the robustness of federated architectures. By containing and/or isolating faults, STP approach eliminates the need to re-validate unmodified applications on an IMA system, because the guaranteed isolation it provides limits re-certification efforts only at the partition level. Virtualization technology has been used as an implementation technique to provide STP. Over the last few years several works have been proposed in the aerospace domain [5, 6, 7, 8, 9, 10, 11, 12]. Some of them following a (software-based) full-virtualization approach, while others implementing para-virtualization. Between both approaches there is a trade-off between flexibility and performance: full-virtualization incurs in a higher performance cost, while para-virtualization incurs in a higher design cost. Apart from performance and flexibility, safety and, more recently, security became important requirements that are driving the development of current and next generation of safety-critical systems. Research and industry focused so their attention on providing hardware support to assist and secure virtualization from the outset. Intel, ARM and Imagination/MIPS introduced their own COTS technologies, and naturally several hardware-based solutions have been proposed [13, 14, 15, 16, 17], although none of them specifically designed for the aerospace domain. Among existent COTS technologies, ARM TrustZone [18] is gaining particular attention due to the ubiquitous presence of TrustZone-enabled processors in the embedded sector. The problem is existent TrustZone-based solutions [13, 14, 16] not only fail in providing ability for running an arbitrary number of partitions (they mainly rely on a dual-os configuration), but also they (i.e., TrustZonebased solutions) were not designed taking into considera-
2 tion the real time requirements of safety-critical systems. Our work goes beyond state-of-art presenting a secure virtualization solution assisted by COTS hardware. A distinctive aspect of our hypervisor is the use of ARM TrustZone technology to assist and secure real-time virtualization for space. This is demonstrated by running several unmodified OS partitions on a hybrid Xilinx ZC702 platform with really low overhead and low memory footprint. Furthermore, with the recent announcement of ARM about their decision to introduce TrustZone technology in all Cortex-M and Cortex-R processors series, we strongly believe this solution as more than an isolated implementation for a specific platform. From our point of view, it will also provide the foundation to drive next generation virtualization solutions for middle and low-end space applications (e.g., small satellites). Flash Flash Flash CPU SRAM AMBA Interconnect Secure World Non-Secure Peripherals (non-secure) DMA Non-Secure World Figure 1. TrustZone hardware architecture Secure Peripherals 2. RELATED WORK The idea beyond implementation of STP through virtualization in the aerospace domain is not new, and the first attempts to start exploiting this technology were proposed some years ago. XtratuM [5] [6] was one of the first well known hypervisors implemented to meet the safety critical requirements of aerospace domain. Implemented in its original form [5] as a Loadable Kernel Module (LKM) for x86 architectures, it naturally evolved to be independent and bootable. The result was XtratuM 2.0 [6], a type 1 (bare-metal) hypervisor which employes para-virtualization techniques and a strong effort in redesign to be closer to the ARINC- 653 standard. XtratuM was ported to reference platforms for the spatial sector like LEON2 and LEON3, and recently it was extended with multicore support under the MultiPARTES project [7]. Steven VanderLeest start by developing an early prototype of an ARINC 653 implementation using the virtualization technology of the open source Xen hypervisor along with a Linux-based domain/partition OS [8]. The hypervisor, called as ARLX (ARINC 653 Real-time Linux on Xen) [9], was later extended with more safety and security capabilities, basically by applying formal analysis techniques as well as certification. A distinctive aspect of ARLX was its innovative approach to multicore processors, by scheduling the I/O system partition in one core and all the guest partitions on remaining cores. More recently, in [19] Steven VanderLeest (with cooperation of Big Players like Xilinx, Mentor Graphics and Lynx Software) introduced some ideas of how to address the future of avionics. He basically proposes the use of what we almost have already implemented: secure virtualization deployed on heterogenous multicore platforms (HMP). He conducted his discussion around the Xilinx Zynq Ultrascale+. Hyunwoo Joe et al. [10] presented a prototype of a type 2 (hosted) full-virtualized hypervisor with kernel-level AR- INC 653 partitioning. The hypervisor was implemented as an extension to the embedded Linux kernel with some parts located into the kernel while others implemented as system processes. Several optimization techniques were used to alleviate the trap-and-emulate overhead, however despite those efforts the prototype still showed a considerable performance degradation. Authors promoted reusability in detriment of performance, in order to not modify certified flight software from previous missions. The hypervisor was the first known implementation targeting dual-core LEON4-based platforms. RodosVisor [11, 12], developed by Tavares et al., is a bare-metal hypervisor supporting both full and paravirtualization, alongside with real-time capabilities. The hypervisor is able to execute several applications according to the IMA model, running on a Xilinx FPGA board with built-in PowerPC core. It is an ARINC 653 quasicompliant hypervisor, since it implements ARINC 653 services but, not strictly following the APIs standard. A distinctive aspect of RodosVisor is its object-oriented approach and the possibility of customization using generative programming techniques. There are also other relevant academic and commercial virtualization solutions, and Gu and Zhao [20] survey a number of them for a variety of embedded domains (not just for aerospace). They basically review hypervisors based on Xen, the Kernel-based Virtual Machine (KVM) and L4. Several works trying to make use of COTS-hardware to assist virtualization have been proposed [14, 15, 16, 17], but none of them was specifically designed for the aerospace domain. 3. ARM TRUSTZONE TrustZone technology refers to security extensions available in all ARM Application-processors (Cortex-A) since ARMv6 architecture. These hardware security extensions virtualize a physical core as two virtual cores, providing two completely separated execution environments:
3 Monitor mode Kernel mode User mode the secure and the non-secure worlds (Fig. 1). An extra 33rd bit - the NS (Non-Secure) bit - indicates in which world the processor is currently executing. To switch between the secure and the non-secure world, a special new secure processor mode, called monitor mode, was introduced. To enter in the monitor mode, a new privileged instruction was also specified - SMC (Secure Monitor Call). The monitor mode can also be enabled by configuring it to handle interrupts and exceptions in the secure side. The memory infrastructure can be also partitioned into distinct memory regions, each of which can be configured to be used in either worlds or both. The processor provides also two virtual Memory Management Units (MMUs), and isolation is still available at the cache-level. The AXI (Advanced extensible Interface) system bus carries extra control signals to restrict access on the main system bus, which enables TrustZone architecture to secure also peripherals. The Generic Interrupt Controller (GIC) supports both secure and non-secure prioritized interrupt sources. 4. HYPERVISOR RTZVisor (Real Time TrustZone-assisted Hypervisor) is a bare-metal hypervisor carefully designed to meet the specific requirements of real time space applications. Exploiting COTS ARM TrustZone technology, it is possible to implement strong spatial and temporal isolation between guests. All data structures and hardware resources are pre-defined and configured at design time, and devices and interrupts can be directly managed by specific guest partitions. Exceptions and errors are managed through a special component called Health Monitor, which is able to recover guests from undefined states. Fig. 2 depicts the complete system architecture: RTZVisor runs in the most privileged mode of the secure world side, i.e., monitor mode, and has the highest privilege of execution; unmodified guest OSes can be encapsulated between the secure and non-secure world side - the active guest partition runs in the non-secure world side, while inactive guest partitions are preserved in the secure world side; for active guest the RTOS runs in the kernel mode, while RT applications run in user mode CPU TrustZone technology virtualizes each physical CPU into two virtual CPUs: one for the secure world and other for the non-secure world. Between both worlds there are an extensive list of banked registers. Typically, existent TrustZone-based solutions implement only dual-os support, where each guest is running in a different world. In this particular case, the virtual CPU support is guaranteed by the hardware itself and therefore each world has its own virtual hard-processor. Our system is completely different. Since it is able to support an arbitrary number of guest partitions, all of Non-Secure World Application Level A Guest 0 (active) Application Level B Guest 1 (inactive) Hypervisor Secure World... TrustZone-enabled SoC Figure 2. System Architecture Application Level C Guest x (inactive) them executed from the non-secure side (once at a time), dictating the sharing of the same virtual hard-processor, supported by software. For that reason, the virtual softprocessor state (vcpu) of each guest should be preserved. This virtual soft-processor state includes the core registers for all processor modes (vcore), the CP15 registers (vcp15) and some registers of the GIC (vgic), encompassing a total of 55 registers. RTZVisor offers as many vcpus as the hardware provides, but only a oneto-one mapping between vcpu, guest and real CPU is supported Memory Traditional hardware-assisted memory virtualization relies on Memory Management Unit (MMU) support for 2- level address translation, mapping guest virtual to guest physical addresses and then guest physical to host physical addresses. This MMU feature is a key feature to run unmodified guest OSes, and also to implement isolation between them. TrustZone-enabled system on chips (SoCs) only has MMU support for single-level address translation. Nevertheless, they provide a component called TrustZone Address-Space Controller (TZASC) which allows partition of memory into different segments. This memory segmentation feature can be exploited to guarantee strong spatial isolation between guests, basically by dynamically changing the security state of their memory segments. Only the guest partition currently running in the non-secure side should have its own memory segment configured as non-secure, and the remaining memory as secure. If the running guest tries to access a secure memory region (belonging to an inactive guest partition or either the hypervisor), an exception is automatically triggered and redirected to the hypervisor. Since only one guest can run at a time, there is no possibility of the inactive guests (belonging momentously to the secure side) to change the state of another guest.
4 0x x03FFFFFF 0x x0BFFFFFF 0x x13FFFFFF 0x x1BFFFFFF 0x xFFFFFFFF Hypervisor Guest 0 Guest 1 Guest x Guest 0 [S] Used Memory Unused Memory Guest 1 Figure 3. System memory Guest x [NS] Used Memory No memory 4.4. Devices TrustZone technology allows devices to be (statically or dynamically) configured as secure or non-secure. This hardware feature allows the partition of devices between both worlds while enforcing isolation at the device level. RTZVisor implements device virtualization adopting a pass-through policy, which means devices are managed directly by guest partitions. To ensure strong isolation between them, devices are not shared between guests and are assigned to respective partitions at design time. To achieve this strong isolation at device level, devices assigned to guest partitions are dynamically configured as non-secure or secure, depending on its state (active or inactive). This guarantees an active guest cannot compromise the state of a device belonging to another guest, and if an active guest partition tries to access a secure device then an exception will be automatically triggered and handled by RTZVisor. Devices assigned to the hypervisor itself (e.g., Hypervisor timer) are always configured as secure and can never be directly accessed by any guest. Memory segments can be configured with a specific granularity, which is implementation defined, depending on the vendor. In the hardware under which our system was deployed, Xilinx ZC702, memory regions can be configured with a granularity of, which mean for a memory of 1GB it is possible to isolate a total of 15 guest partitions (one memory segment is for the hypervisor itself). Our system relies on the TZASC to implement isolation between guests, and MMU supporting only single-level address translation. It means that guests have to know the physical memory segment they can use in the system, requiring relocation and consequent recompilation of the guest OS. Fig. 3 depicts the memory setup and respective secure/non-secure mappings, for a virtualized system consisting in the hypervisor and three guest partitions. In this specific configuration, the hypervisor uses the first memory segment (0x x03FFFFFF), and has access to all memory. Guest-0 uses the third memory segment, and is only allowed to access one non-secure memory segment (0x x0BFFFFFF); Guest-1/x are mapped the same way, but within their respective memory segment Scheduler RTZVisor implements a cyclic scheduling policy, to ensure one guest partition cannot use the processor for longer than its defined CPU quantum. The time of each slot can be different for each guest, depending on its criticality classification, and is configured at design time. By adopting a variable time slot strategy instead of a multiple fixed approach, the hypervisor interference is minimized and it is ensured higher performance and deterministic execution, because guest is only interrupted when the complete slot is over Interrupts In TrustZone-enabled SoCs, the GIC supports the coexistence of secure and non-secure interrupt sources. It allows also the configuration of secure interrupts with a higher priority than the non-secure interrupts, and has several configuration models that allow to assign IRQs and FIQs to secure or non-secure interrupt sources. RTZVisor configure interrupts of secure devices as FIQs, and interrupts of non-secure devices as IRQs. Secure interrupts are redirected to the hypervisor, while non-secure interrupts are redirected to the active guest (without hypervisor interference). When a guest partition is under execution, only the interrupts managed by this guest are enabled, which minimizes inter-partition interferences through hardware. Interrupts of inactive guest partitions are momentaneously configured as secure, but disabled. This mean the interrupt is pending in the distributor, but is not forwarded to the interface. As soon as the respective guest become active, the interrupt will be then processed. The prioritization of secure interrupts avoid active guest partition to perform a denial-of-service attack against the secure side (hypervisor) Time Temporal isolation in virtualized systems is typically achieved using two levels of timing: the hypervisor level and the guest level. For the guest level, hypervisors typically provide timing services which allow guests to have notion of virtual or real time. For mission critical real time systems, where time-responsiveness plays a critical role, guest partitions have necessarily to keep track of the wall-clock time.
5 Table 1. Health monitoring events and actions Hypervisor Guest Event name pre-def. action pre-def. action Guest triggered DATA ABORT Reboot PREF ABORT Reboot UNDEF INST Reboot Hypervisor triggered MEM VIOL Log Reboot DEV VIOL Log Reboot NO GUESTS Reset RTZVisor implements also two levels of timing: it has internal clocks for managing the hypervisor time, and internal clocks for managing the guest partitions time. The timers dedicated to the hypervisor are configured as secure devices, i.e., they have higher privilege of execution than the timers dedicated to the active guest. This means that despite of what is happening in the active guest, if an interrupt of a timer belonging to the hypervisor is triggered, the hypervisor takes control of the system. Whenever the active guest is executing, the timers belonging to the guest are directly managed and updated by the guest on each interrupt. The problem is how to deal and handle time of inactive guests. For inactive guests the hypervisor implements a virtual tickless timekeeping mechanism based on a time-base unit that measures the passage of time. Therefore, when a guest is rescheduled, its internal clocks and related data structures are updated with the time elapsed since its previous execution Health Monitor The Health Monitor (HM) component is the module responsible for detecting and reacting to anomalous events and faults. Although at an early stage of development, once an error or fault is detected, RTZVisor reacts to the error providing a simple set of predefined actions. The complete list of events and pre-defined actions can be seen in Tab. 1. For example, at the hypervisor level, if a guest tries to access a portion of memory outside its boundaries, the hypervisor detects and registers the space violation and immediately reboots the guest. 5. EVALUATION Our solution was evaluated on a Xilinx ZC702 board targeting a dual ARM Cortex-A9 running at 600MHz. In spite of using a multicore hardware architecture, the current implementation only supports a single-core config- Table 2. Memory footprint results (bytes).text.data.bss Total Hypervisor Table 3. Context-switch evaluation (microseconds) Context-switch operation Time (µs) Timer interrupt management Save vcore context Scheduler vgic context-switch Time management Memory configuration Restore vcore context TOTAL uration. During our evaluation, MMU, data and instruction cache and branch prediction (BP) support for guests were disabled. We focused on the following metrics: (i) memory footprint, (ii) context-switch time and (iii) performance Memory footprint To access memory footprint results we used the size tool of ARM Xilinx Toolchain. Tab. 2 presents the collected measurements, where boot code and drivers were not take into consideration. As it can be seen, the memory overhead introduced by the hypervisor - and in fact the trusted computing base (TCB) of the system - is really small, i.e., around 6KB. The main reasons behind this low memory footprint are (i) the hardware support of TrustZone technology for virtualization and (ii) the careful design and static configuration of each hypervisor component Context switch To evaluate the guest context switch time we used the Performance Monitor Unit (PMU) component. To measure the time consumed by each internal activity of the context-switch operation, breakpoints were added at the beginning and end of each code portion to be measured. Results were gathered in clock cycles and converted to microseconds accordingly to the processor frequency (600MHz). Each value represents an average of ten collected samples.
6 Message Synchronization Table 4. Correlation between guest-switching rate and performance Performance Interrupt Preemption Interrupt Rate (ms) Perf. (%) Preemptive Scheduling Cooperative Scheduling Performance N- TZ- Figure 4. Thread-Metric benchmarks results The list of activities as well as the measured time are presented in Tab. 3. As it can be seen, the activities which present higher consuming time are the virtual GIC context-switch and the time management. In both cases, there is a chance to optimize those operations, because our current solution is more focused on generalization instead of particularization. This mean that contextswitch operation was implemented to be as much OSindependent as possible, and such a design decision directly and negatively impact interrupt and time management. We are completely sure that if we redesign those parts to just fit with, the impact on performance will be significantly smaller Performance The Thread-Metric Benchmark Suite consists of a set of benchmarks specific to evaluate RTOSes performance. The suite comprises 7 benchmarks, evaluating the most common RTOS services and interrupt processing: cooperative scheduling; preemptive scheduling; interrupt processing; interrupt preemption processing; synchronization processing; message processing; and memory allocation. For each benchmark the score represents the RTOS impact on the running application, where higher scores correspond to a smaller impact. For the first part of the experiment, RTZVisor was configured with a 10 milliseconds guest-switching rate. The system was set to run one single guest partition, and the hypervisor scheduler was forced to reschedule the same guest, so that results can translate the full overhead of the complete guest-switching operation. We ran benchmarks in the native version of and compared them against the virtualized version. Fig. 4 presents the achieved results, corresponding to the normalized values of an average of 100 collected samples for each bench- mark. From the experiments it is clear that the virtualized version of only presents a very small performance degradation when compared with its native execution, i.e., <1%. In the second part of the experiment, we evaluated how the guest-switching rate correlates with guest performance. To measure the influence of guest-switching rate in the performance loss, we repeated the experiments for a rate within a time window between 1 millisecond to 100 milliseconds. Tab. 4 shows the achieved results, where each column corresponds to the average performance of the measured results for the 6 benchmarks. As it can be seen, the performance of the virtualized range from 91.7% to 99.9%, respectively. 6. CONCLUSION Complexity of modern safety-critical systems is growing at a frenetic rate. To accompany this trend, aeronautics and space industries are shifting from full federated architectures to an IMA approach. Virtualization technology has been used as an implementation technique to provide STP, but existent virtualization solutions for space are not ready to fully tackle the upcoming challenges of aerospace industry. This paper describes a real time hypervisor for space applications assisted by COTS hardware. The system was deployed on a commercial Xilinx ZC702 board, demonstrating how it is possible to host an arbitrary number of guest OSes on the non-secure world side of TrustZoneenabled processors. The secure hypervisor is flexible enough to run unmodified guest OSes at higher performance, while guaranteeing strong isolation between guests. Our evaluation demonstrated virtualized OSes run with more than 99% performance for a 10 milliseconds guest-switching rate. The reduced TCB size of RTZVisor decreases also effort for certification. Our solution makes use of several technologies needed for the demanding challenges of future aerospace applications: secure virtualization deployed under hybrid platforms. Research roadmap will focus on three main directions. First, we will explore Xilinx Zynq Ultrascale+ to extend our solution for hybrid HMP. HMP are considered as the next generation multicore platforms, and they are being seen as the only path for adequate functionality consoli-
7 dation and timing predictability. From another perspective, we will also explore the TrustZone technology of the new (ARMv8) Cortex-M and Cortex-R processors series to develop virtualization solutions for middle and lowend space applications. With the current trend of small satellites going viral, this technology can potentially impact the way those satellites are being built. Finally, and essentially because complexity is becoming impracticable to be manually managed, another part of our investigation will tackle the development of mechanisms and tools to assist design automation. We have already some on-going experiments around the development of Domain Specific Languages (DSL) to help in the configuration, customization and code generation of RTZVisor. ACKNOWLEDGMENTS This work has been supported by FCT - Fundação para a Ciência e Tecnologia - (grant SFRH/BD/91530/2012 and UID/CEC/00319/2013) and also by Space Agency of the German Aerospace Center (DLR) with federal funds of the German Federal Ministry of Economics and Technology (BMWi) under 50RM1203. REFERENCES [1] Abella J. et al., Towards Improved Survivability in Safety-critical Systems, Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS), Athens, Greece, [2] RTCS, DO-297: Integrated Modular Avionics (IMA) Development Guidance and Certification Considerations, Washington DC, USA, [3] Diniz N. et al., ARINC 653 in Space, Proceedings of the Data Systems in Aerospace (DASIA), Edinburgh, Scotland, [4] Windsor J. et al, Time and space partitioning in spacecraft avionics, Proceedings of the 3rd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), California, USA, [5] Masmano, M. et al., An overview of the XtratuM nanokernel, Proceedings of the Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT), Palma de Mallorca, Spain, [6] Crespo A. et al., XtratuM an Open Source Hypervisor for TSP Embedded Systems in Aerospace, Proceedings of the Data Systems in Aerospace (DASIA), Istanbul, Turkey, [7] Crespo, A. et al., Multicore partitioned systems based on hypervisor, Preprints of the 19th World Congress - The International Federation of Automatic Control, Cape Town, South Africa, [8] VanderLeest S.H., ARINC 653 hypervisor, Proceedings of the 29th IEEE/AIAA Digital Avionics Systems Conference (DASC), Utah, USA, [9] VanderLeest, S.H. et al., A safe & secure arinc 653 hypervisor, Proceedings of the 32nd IEEE/AIAA Digital Avionics Systems Conference (DASC), New York, USA, [10] Joe H. et al., Full virtualizing micro hypervisor for spacecraft flight computer, Proceedings of the 31st IEEE/AIAA Digital Avionics Systems Conference (DASC), Virginia, USA, [11] Tavares A. et al., RodosVisor - an Object-Oriented and Customizable Hypervisor: The CPU Virtualization, Embedded Systems, Computational Intelligence and Telematics in Control, No. 1, [12] Tavares A. et al., Rodosvisor - An ARINC 653 quasi-compliant hypervisor: CPU, memory and I/O virtualization, Proceedings of the 17th IEEE Conference on Emerging Technologies & Factory Automation (ETFA), Krakow, Poland, [13] Cereia M. et al., Virtual machines for distributed real-time systems, Computer Standards & Interfaces 31.1, [14] Sangorrin D. et al., Dual operating system architecture for real-time embedded systems, Proceedings of the 6th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OS- PERT), Brussels, Belgium, [15] Varanasi P. et al., Hardware-supported virtualization on ARM, Proceedings of the Second Asia-Pacific Workshop on Systems, Shanghai, China, [16] Pinto S. et al., Towards a Lightweight Embedded Virtualization Architecture Exploiting ARM Trust- Zone, Proceedings of the 20th IEEE Conference on in Emerging Technologies & Factory Automation (ETFA), Barcelona, Spain, [17] Moratelli C. et al., Full-Virtualization on MIPSbased MPSOCs embedded platforms with real-time support, Proceedings of the 27th Symposium on Integrated Circuits and Systems Design (SBCCI), Aracaju, Brazil, [18] ARM, ARM Security Technology - Building a Secure System using TrustZone Technology, Technical Report PRD29-GENC C, [19] VanderLeest S.H. et al., MPSoC hypervisor: The safe & secure future of avionics, Proceedings of the 34th IEEE/AIAA Digital Avionics Systems Conference (DASC), Prague, Czech Republic, [20] Gu, Z. et al., A State-of-the-Art Survey on Real- Time Issues in Embedded Systems Virtualization, Journal of Software Engineering and Applications, pp , 2012.
XtratuM hypervisor redesign for LEON4 multicore processor
XtratuM hypervisor redesign for LEON4 multicore processor E.Carrascosa, M.Masmano, P.Balbastre and A.Crespo Universidad Politécnica de Valencia, Spain Outline Motivation/Introduction XtratuM hypervisor
Multicore partitioned systems based on hypervisor
Preprints of the 19th World Congress The International Federation of Automatic Control Multicore partitioned systems based on hypervisor A. Crespo M. Masmano J. Coronel S. Peiró P. Balbastre J. Simó Universitat
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)
Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis ([email protected]) Institute of Computer Science (ICS) Foundation
Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics
Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics Juan Zamorano, Juan A. de la Puente Universidad Politécnica de Madrid (UPM) E-28040 Madrid, Spain [email protected],
Hardware accelerated Virtualization in the ARM Cortex Processors
Hardware accelerated Virtualization in the ARM Cortex Processors John Goodacre Director, Program Management ARM Processor Division ARM Ltd. Cambridge UK 2nd November 2010 Sponsored by: & & New Capabilities
XtratuM: a Hypervisor for Safety Critical Embedded Systems
XtratuM: a Hypervisor for Safety Critical Embedded Systems M. Masmano, I. Ripoll, and A. Crespo Instituto de Informática Industrial, Universidad Politécnica de Valencia (Spain) {mmasmano, iripoll, alfons}@ai2.upv.es
Leveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
Title: XtratuM: a Hypervisor for Safety Critical Embedded Systems. Authors:M. Masmano, I. Ripoll, A. Crespo and J.J. Metge
Title: XtratuM: a Hypervisor for Safety Critical Embedded Systems. Authors:M. Masmano, I. Ripoll, A. Crespo and J.J. Metge Affiliation: Instituto de Informática Industrial, Universidad Politécnica de Valencia,
A hypervisor approach with real-time support to the MIPS M5150 processor
ISQED Wednesday March 4, 2015 Session 5B A hypervisor approach with real-time support to the MIPS M5150 processor Authors: Samir Zampiva ([email protected]) Carlos Moratelli ([email protected])
Memory Isolation in Many-Core Embedded Systems
Memory Isolation in Many-Core Embedded Systems Juan Zamorano and Juan A. de la Puente Universidad Politécnica de Madrid (UPM), Abstract. The current approach to developing mixed-criticality systems is
Flight Processor Virtualization
National Aeronautics and Space Administration Flight Processor Virtualization Alan Cudmore / Code 582 9/11/2013 www.nasa.gov 1 Agenda Introduction to Virtualization Benefits of Virtualization for Satellite
VtRES 2013. Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC. ESRG Embedded Systems Research Group
Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC VtRES 2013 P. Garcia, T. Gomes, F. Salgado, J. Monteiro, A. Tavares Summary 1. Current landscape in 2. Embedded
Prototype of Light-weight Hypervisor for ARM Server Virtualization
36 Int'l Conf. Embedded Systems and Applications ESA'15 Prototype of Light-weight Hypervisor for ARM Server Virtualization Young-Woo Jung, Song-Woo Sok, Gains Zulfa Santoso, Jung-Sub Shin, and Hag-Young
Sierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
XTRATUM: AN OPEN SOURCE HYPERVISOR FOR TSP EMBEDDED SYSTEMS IN AEROSPACE
XTRATUM: AN OPEN SOURCE HYPERVISOR FOR TSP EMBEDDED SYSTEMS IN AEROSPACE A. Crespo 1, I. Ripoll 1, M. Masmano 1, P. Arberet 2, and J.J. Metge 2 1 Instituto de Informática Industrial, Universidad Politécnica
Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.
Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.
Architecture of the Kernel-based Virtual Machine (KVM)
Corporate Technology Architecture of the Kernel-based Virtual Machine (KVM) Jan Kiszka, Siemens AG, CT T DE IT 1 Corporate Competence Center Embedded Linux [email protected] Copyright Siemens AG 2010.
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel
CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring 2009 - Instructors McDaniel and Enck 1 2 Embedded Systems
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
High Performance or Cycle Accuracy?
CHIP DESIGN High Performance or Cycle Accuracy? You can have both! Bill Neifert, Carbon Design Systems Rob Kaye, ARM ATC-100 AGENDA Modelling 101 & Programmer s View (PV) Models Cycle Accurate Models Bringing
Applying Multi-core and Virtualization to Industrial and Safety-Related Applications
White Paper Wind River Hypervisor and Operating Systems Intel Processors for Embedded Computing Applying Multi-core and Virtualization to Industrial and Safety-Related Applications Multi-core and virtualization
PikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow
PikeOS: Multi-Core RTOS for IMA Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow Contents Multi Core Overview Hardware Considerations Multi Core Software Design Certification Consideratins PikeOS Multi-Core
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
KVM/ARM: Experiences Building the Linux ARM Hypervisor
KVM/ARM: Experiences Building the Linux ARM Hypervisor Christoffer Dall and Jason Nieh {cdall, nieh}@cs.columbia.edu Department of Computer Science, Columbia University Technical Report CUCS-010-13 April
Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation
Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation Industrial controllers and HMIs today mostly lack protective functions for their IT and network
Experience with the integration of distribution middleware into partitioned systems
Experience with the integration of distribution middleware into partitioned systems Héctor Pérez Tijero ([email protected]) J. Javier Gutiérrez García ([email protected]) Computers and Real-Time Group,
EECatalog SPECIAL FEATURE
Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
ARM VIRTUALIZATION FOR THE MASSES. Christoffer Dall <[email protected]> <[email protected]>
ARM VIRTUALIZATION FOR THE MASSES Christoffer Dall ARM Smartphones Smartphones Tablets Tablets ARM Servers But now also... But now also... ARM Servers
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,
KVM in Embedded Requirements, Experiences, Open Challenges
Corporate Technology KVM in Embedded Requirements, Experiences, Open Challenges Jan Kiszka, Siemens AG Corporate Competence Center Embedded Linux [email protected] Copyright Siemens AG 2009. All rights
XtratuM for LEON3: an Open Source Hypervisor for High Integrity Systems
XtratuM for LEON3: an Open Source Hypervisor for High Integrity Systems Miguel Masmano, Ismael Ripoll, Alfons Crespo and Salvador Peiro Instituto de Informática Industrial. Universidad Politécnica de Valencia.
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations
DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
HIPEAC 2015. Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture
HIPEAC 2015 Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture University of Siegen Roman Obermaisser Overview Mixed-Criticality Systems Modular
Real-Time Virtualization How Crazy Are We?
Siemens Corporate Technology October 2014 Real-Time Virtualization How Crazy Are We? Image: Marcus Quigmire, licensed under CC BY 2.0 Unrestricted Siemens AG 2014. All rights reserved Real-Time Systems
PROCESSOR VIRTUALIZATION ON EMBEDDED LINUX SYSTEMS
PROCESSOR VIRTUALIZATION ON EMBEDDED LINUX SYSTEMS Geoffrey Papaux, Daniel Gachet, and Wolfram Luithardt Institute of Smart and Secured Systems (isis), University of Applied Sciences and Arts Western Switzerland
Embedded Development Tools
Embedded Development Tools Software Development Tools by ARM ARM tools enable developers to get the best from their ARM technology-based systems. Whether implementing an ARM processor-based SoC, writing
Solution Guide Parallels Virtualization for Linux
Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to
Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
Real-time processing the basis for PC Control
Beckhoff real-time kernels for DOS, Windows, Embedded OS and multi-core CPUs Real-time processing the basis for PC Control Beckhoff employs Microsoft operating systems for its PCbased control technology.
Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG
1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features
Which ARM Cortex Core Is Right for Your Application: A, R or M?
Which ARM Cortex Core Is Right for Your Application: A, R or M? Introduction The ARM Cortex series of cores encompasses a very wide range of scalable performance options offering designers a great deal
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
Achieving Real-Time Performance on a Virtualized Industrial Control Platform
White Paper Virtualization Technology Industrial Automation Achieving Real-Time Performance on a Virtualized Introduction Good for many applications down to the 100 microsecond cycle time range A mainstay
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
The Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Models For Modeling and Measuring the Performance of a Xen Virtual Server
Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time
Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time Oliver Bruder National Instruments Switzerland oliver.bruder@ Embedded Product Design Surveys 66% Product designs complete over budget
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
Real-time KVM from the ground up
Real-time KVM from the ground up KVM Forum 2015 Rik van Riel Red Hat Real-time KVM What is real time? Hardware pitfalls Realtime preempt Linux kernel patch set KVM & qemu pitfalls KVM configuration Scheduling
Mixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser
Workshop on "Challenges in Mixed Criticality, Real-time, and Reliability in Networked Complex Embedded Systems" Mixed-Criticality: Integration of Different Models of Computation University of Siegen, Roman
Intel Embedded Virtualization Manager
White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
Real-Time Operating Systems for MPSoCs
Real-Time Operating Systems for MPSoCs Hiroyuki Tomiyama Graduate School of Information Science Nagoya University http://member.acm.org/~hiroyuki MPSoC 2009 1 Contributors Hiroaki Takada Director and Professor
Performance tuning Xen
Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor
KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor Christoffer Dall Department of Computer Science Columbia University [email protected] Jason Nieh Department of Compouter Science Columbia
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
Proteus, a hybrid Virtualization Platform for Embedded Systems
Proteus, a hybrid Virtualization Platform for Embedded Systems Dipl.-Inf. Daniel Baldin and Dipl.-Inf. Timo Kerstan Heinz-Nixdorf-Institute University of Paderborn 33102 Paderborn, Germany [email protected]
Boeing B-777. 29.1 Introduction. 29.2 Background. Michael J. Morgan
29 Boeing B-777 Michael J. Morgan Honeywell 29.1 Introduction 29.2 Background 29.3 Boeing 777 Airplane Information Management System (AIMS) 29.4 Cabinet Architecture Overview 29.5 Backplane Bus 29.6 Maintenance
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
Design and Implementation of the Heterogeneous Multikernel Operating System
223 Design and Implementation of the Heterogeneous Multikernel Operating System Yauhen KLIMIANKOU Department of Computer Systems and Networks, Belarusian State University of Informatics and Radioelectronics,
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Introduction to the NI Real-Time Hypervisor
Introduction to the NI Real-Time Hypervisor 1 Agenda 1) NI Real-Time Hypervisor overview 2) Basics of virtualization technology 3) Configuring and using Real-Time Hypervisor systems 4) Performance and
ARINC 653. An Avionics Standard for Safe, Partitioned Systems
ARINC 653 An Avionics Standard for Safe, Partitioned Systems 1 Courtesy of Wind River Inc. 2008 IEEE-CS Seminar June 4 th, 2008 Agenda Aerospace Trends IMA vs. Federated ARINC 653 Main concepts Safety
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
