VOSySmonitoRV: a mixed-criticality solution on Linux-capable RISC-V platforms

11/03/2021
by   Flavia Caforio, et al.
0

Embedded systems are pervasively used in many fields nowadays. In mixed-criticality environments (automotive, industry 4.0, drones, etc.) they need to run real-time applications with certain time and safety constraints alongside a rich operating system (OS). This is usually possible thanks to virtualization techniques, that leverage on hardware virtualization extensions on the machine. However, these hardware extensions might not cope with the security and safety requirements of the specific use case, and additionally, they might not always be available. A notable example is the emerging RISC-V architecture, that is today gaining a lot of traction in the mixed criticality field, but that do not offer today hardware virtualization extensions. In this paper VOSySmonitoRV is proposed as a mixed-criticality solution for RISC-V systems. VOSySmonitoRVallows the co-execution of two or more operating systems in a secure and isolated manner by running in the highest privileged machine level. A specific benchmark, measuring the interrupt latency and context switch time is done to assess the system performance in mixed criticality systems.

READ FULL TEXT

page 1

page 2

page 3

research
10/11/2018

T-Visor: A Hypervisor for Mixed Criticality Embedded Real-time System with Hardware Virtualization Support

Recently, embedded systems have not only requirements for hard real-time...
research
08/30/2022

Ærø: A Platform Architecture for Mixed-Criticality Airborne Systems

Real-time embedded platforms with resource constraints can take the bene...
research
08/31/2012

A Hardware Time Manager Implementation for the Xenomai Real-Time Kernel of Embedded Linux

Nowadays, the use of embedded operating systems in different embedded pr...
research
05/19/2017

Look Mum, no VM Exits! (Almost)

Multi-core CPUs are a standard component in many modern embedded systems...
research
05/18/2019

Methodically Defeating Nintendo Switch Security

We explain, step by step, how we strategically circumvented the Nintendo...
research
06/10/2010

Perbandingan Shell Unix

Is it possible for an Information Technology [IT] product to be both mat...
research
09/05/2022

RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0

Orchestration systems are becoming a key component to automatically mana...

Please sign up or login with your details

Forgot password? Click here to reset