Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of mixed criticality Linux systems using the Jailhouse hypervisor in this informative conference talk. Discover how to run safety-critical and non-critical applications simultaneously on a single SoC through static partitioning of hardware resources. Learn from the presenters' experiences in porting a safety and real-time critical application as a Jailhouse guest, showcasing a novel approach for mixed-criticality applications with real-time requirements while maintaining Linux benefits. Examine a practical demonstration of a multicopter platform running a real-time critical flight stack in an isolated Jailhouse guest, proving the hypervisor's suitability for safety-critical systems. Gain insights into current hardware limitations, undesired behaviors, and potential workarounds. Delve into topics such as device assignment, clocking, memory mapping, DMA challenges, latency, overhead, device drivers, and hardware misbehavior. Understand the implications for power controls, hypervisor control, and critical cell privileges, as well as the process of porting to different architectures.
Syllabus
Intro
Whats coming next
Mixed criticality systems
Classical approach
Octocopter
Critical World
Our Approach
Assigning Devices
Clocks
Memory Mapping
Clocking
Missing DMA
Novia
Jailhouse latency
Jailhouse overhead
Page size
Overhead
Memory Map
Clock Reset Controllers
Device Drivers
Hardware Misbehaviour
Conclusion
Influence
Power Controls
Shared Pass
Hypervisor Control
Hypervisors
Critical vs Uncritical
Critical Cell Privileges
Porting to a different architecture
Taught by
Linux Foundation