skip to main content
10.1145/1435458.1435461acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

The role of virtualization in embedded systems

Published:01 April 2008Publication History

ABSTRACT

System virtualization, which enjoys immense popularity in the enterprise and personal computing spaces, is recently gaining significant interest in the embedded domain. Starting from a comparison of key characteristics of enterprise systems and embedded systems, we will examine the difference in motivation for the use of system virtual machines, and the resulting differences in the requirements for the technology. We find that these differences are quite substantial, and that virtualization is unable to meet the special requirements of embedded systems. Instead, more general operating-systems technologies are required, which support virtualization as a special case. We argue that high-performance microkernels, specifically L4, are a technology that provides a good match for the requirements of next-generation embedded systems.

References

  1. D. Elkaduwe, P. Derrin, and K. Elphinstone. Kernel design for isolation and assurance of physical memory. In 1st Workshop on Isolation and Integration in Embedded Systems, Glasgow, UK, Apr. 2008. ACM SIGOPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Elkaduwe, G. Klein, and K. Elphinstone. Verified protection model of the seL4 microkernel. Submitted for publication, Oct. 2007.Google ScholarGoogle Scholar
  3. K. Elphinstone, G. Klein, P. Derrin, T. Roscoe, and G. Heiser. Towards a practical, verified kernel. In Proceedings of the 11th Workshop on Hot Topics in Operating Systems, San Diego, CA, USA, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Google. What is Android? http://code.google.com/android/what-is-android.html, Nov. 2007.Google ScholarGoogle Scholar
  5. Green Hills Software. INTEGRITY real-time operating system. http://www.ghs.com/products/rtos/integrity.html.Google ScholarGoogle Scholar
  6. H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg, and J. Wolter. The performance of μ-kernel-based systems. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 66--77, St. Malo, France, Oct. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Härtig and M. Roitzsch. Ten years of research on L4-based real-time systems. In Proceedings of the 8th Real-Time Linux Workshop, Lanzhou, China, 2006.Google ScholarGoogle Scholar
  8. G. Heiser, K. Elphinstone, I. Kuz, G. Klein, and S. M. Petters. Towards trustworthy computing systems: Taking microkernels to the next level. ACM Operating Systems Review, 41(3), July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Hohmuth, M. Peter, H. Härtig, and J. S. Shapiro. Reducing TCB size by using untrusted components --- small kernels versus virtual-machine monitors. In Proceedings of the 11th SIGOPS European Workshop, Leuven, Belgium, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Information Assurance Directorate. U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, June 2007. Version 1.03. http://www.niap-ccevs.org/cc-scheme/pp/pp.cfm/id/pp_ skpp_hr_v1.03/.Google ScholarGoogle Scholar
  11. I. Kuz, Y. Liu, I. Gorton, and G. Heiser. CAmkES: A component model for secure microkernel-based embedded systems. Journal of Systems and Software Special Edition on Component-Based Software Engineering of Trustworthy Embedded Systems, 80(5):687--699, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Leslie, P. Chubb, N. Fitzroy-Dale, S. Götz, C. Gray, L. Macpherson, D. Potts, Y. R. Shen, K. Elphinstone, and G. Heiser. User-level device drivers: Achieved performance. Journal of Computer Science and Technology, 20(5):654--664, Sept. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  13. B. Leslie, N. FitzRoy-Dale, and G. Heiser. Encapsulated user-level device drivers in the Mungi operating system. In Proceedings of the Workshop on Object Systems and Software Architectures 2004, Victor Harbor, South Australia, Australia, Jan. 2004. http://www.cs.adelaide.edu.au/~wossa2004/HTML/.Google ScholarGoogle Scholar
  14. B. Leslie, C. van Schaik, and G. Heiser. Wombat: A portable user-mode Linux for embedded systems. In Proceedings of the 6th Linux. Conf. Au, Canberra, Apr. 2005.Google ScholarGoogle Scholar
  15. J. LeVasseur, V. Uhlig, J. Stoess, and S. Götz. Unmodified device driver reuse and improved system dependability via virtual machines. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, pages 17--30, San Francisco, CA, USA, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Liedtke. On μ-kernel construction. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pages 237--250, Copper Mountain, CO, USA, Dec. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. NTT DoCoMo and Intel Corp. Open and secure terminal initiative (OSTI) architecture specification. http://www.nttdocomo.co.jp/english/corporate/technology/osti/, Oct. 2006.Google ScholarGoogle Scholar
  18. QNX Software Systems. Neutrino realtime operating system. http://www.qnx.com/products/neutrino_rtos/.Google ScholarGoogle Scholar
  19. M. Rosenblum. The impact of virtualization on computing systems. Keynote address at USENIX Technical Conference, June 2007.Google ScholarGoogle Scholar
  20. J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63:1278--1308, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  21. L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: Three case studies. In Proceedings of the EuroSys Conference, pages 161--174, Leuven, Belgium, Apr. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. C. Snowdon, S. M. Petters, and G. Heiser. Accurate On-line Prediction of Processor and Memory Energy Usage Under Voltage Scaling. In Proceedings of the 7th International Conference on Embedded Software, Salzburg, Austria, Oct. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. C. Snowdon, S. Ruocco, and G. Heiser. Power Management and Dynamic Voltage Scaling: Myths and Facts. In Proceedings of the 2005 Workshop on Power Aware Real-time Computing, New Jersey, USA, Sept. 2005.Google ScholarGoogle Scholar
  24. J. Stoess, C. Lang, and F. Bellosa. Energy management for hypervisor-based virtual machines. In Proceedings of the 2007 Annual USENIX Technical Conference, Santa Clara, CA, USA, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. Szyperski. Component Software: Beyond Object-Oriented Programming. Addison-Wesley/ACM Press, Essex, England, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. A. Waldspurger. Memory resource management in VMware ESX server. In Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation, Boston, MA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The role of virtualization in embedded systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              IIES '08: Proceedings of the 1st workshop on Isolation and integration in embedded systems
              April 2008
              50 pages
              ISBN:9781605581262
              DOI:10.1145/1435458
              • Editors:
              • Michael Engel,
              • Olaf Spinczyk

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader