<div class='slidealt'>Experience kvm <a title='virtualization for embedded heterogeneous arm core platforms' href='/en/products'>virtualization extensions</a></div> <div class='slidealt'>Benefit from custom <a title='kvm on arm services full virtualization' href='/en/services'>virtualization services</a></div> <div class='slidealt'>KVM on ARMv7 and ARMv8 <a title='kvm-on-arm open source smu extensions' href='/en/solutions/guides/vfio-on-arm/'>IOMMU full virtualization</a></div> <div class='slidealt'>Virtualization research projects <a title='ARM multicore kvm open source' href='/en/research'>in cloud and embedded systems</a></div> <div class='slidealt'>Virtualization solutions for heterogeneous <a title='ARMv7-ARMv8 virtualization open source solutions' href='/en/solutions'>ARM multicore systems</a></div>

Virtual Open Systems Newsletter

Edition of September 2018

In this edition, Virtual Open Systems highlights some of its most recent development activities related to its mixed-criticality virtualization product software stack to strengthen its product offer for automotive, Edge & Cloud computing. In addition, the most recent news about the company dissemination are described, together with its latest research and innovation projects news and the leading activity in the AGL Automotive Grade Linux EG-Virt virtualization working group.

  • Product release: VOSySmonitor v2.5.0 - ISO-26262 certified
  • Mixed-critical virtualization: VOSySmcs, mixed-criticality graphic support
  • Edge & Cloud Trusted Computing features: EdgeVIM OpenStack extensions
  • Open Source automotive virtualization: Latest VOSyS AGL EG-VIRT activity
  • Leading the innovation: Integration of cutting-edge cloud technologies
  • Computation acceleration: OpenCL inside VMs and containers

Enabling mixed-criticality in Automotive, IoT edge node, Industry-4.0

Product release: VOSySmonitor v2.5.0 - ISO 26262 certified

VOSYSmonitor, an optimized high performance software monitor layer for ARMv7/ARMv8-A systems

Virtual Open Systems is glad to announce the new release v2.5.0 (ASIL-C - ISO 26262 certified) of its virtualization product dedicated to mixed-criticality automotive systems called VOSySmonitor. This technology enables the consolidation of several applications (e.g., Linux-KVM along with a Real-Time Operating System), with different safety levels on a single heterogeneous multi-cores platform. By leveraging on ARM TrustZone, VOSySmonitor provides a system-wide security approach that ensures the best freedom from interference for the safety critical partition than any conventional and commercial virtualization solution. VOSySmonitor has been developed as a Safety Element out of Context (SEooC) through the application of V cycle fully compliant with the ASIL-C requirements of the ISO 26262 standard. The integration of VOSySmonitor into a system developed according to the ISO 26262 is supported by a Qualification Kit. It includes a Safety Manual that describes how to use and integrate VOSySmonitor safely in the system as well as provides evidence of compliance with the ISO 26262 (ASIL-C) standard and a verification report of the development process, tool confidence analysis and test results.

Mixed-critical virtualization: VOSySmcs, mixed-criticality graphic support

VOSySmcs, innovative, scalable and open automotive mixed-criticality virtualization software stack

VOSySmcs consists of a full fledged software stack to support a modern generation of car virtual cockpit where the In-Vehicle Infotainment (IVI) system and the Instrument Digital Cluster are consolidated and interact on a single platform. Indeed, traditional gauges and lamps are replaced by digital screens offering opportunities for new functions and interactivity. Vehicle information, entertainment, navigation, camera/video and device connectivity are being combined into displays. However, this different information does not have the same level of criticality and the consolidation of mixed-critical applications represent a real challenge. In this context, VOSySmcs includes a mixed-criticality graphic support that enables the integration of safety-critical and non-critical information on a single display, while providing rendering guarantees for the safety-critical output. In addition, VOSySmcs supports GPU virtualization in order to provide hardware acceleration capacity for the Virtual Machines running in the non-critical partition such as Linux, Android, etc.

Edge & Cloud Trusted computing features: EdgeVIM Open Stack extensions

VOSYS IoT is the end-to-end IoT software stack enabling processing of IoT applications with different level of safety criticality

Virtual Open Systems adds trusted computing extensions based on VOSySmonitor in NFV, Edge and Cloud Computing environments. The objective is to add virtualized Trusted Platform Module (TPM) functions to VNFs and enable remote attestation at the Virtualized Infrastructure Manager (VIMs) layer. After an extensive VIM solutions benchmark resulted in the scientific publication presented at the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2018 (BMSB 2018), Virtual Open Systems selected Open Stack as reference solution for the development of specific Trusted Computing extensions called EdgeVIM. This technology is integrated in the H2020 5GCity architecture, as detailed in the guest blogpost Smart cities applications security and trust through edge computing virtualization.

Open Source automotive virtualization: Latest VOSyS AGL EG-VIRT activity

VOSySmcs, innovative, secure and open automotive virtualization software stack

Virtual Open Systems leads the worldwide open source efforts to bring virtualization in automotive through the Automotive Grade Linux (AGL) Virtualization Expert Group (EG-VIRT). During the last Automotive Linux Summit, held in Tokyo in June 2018, the Automotive Grade Linux EG-Virt software defined connected car white paper has been officially published. This document, edited by Virtual Open Systems with the support by the AGL community, presents the benefits of the virtualization in the automotive market and its use cases, requirements and solutions. The impact of this work on the automotive market and on the overall open source community has been disseminated in the guest blog post Automotive open source virtualization: Bringing open source virtualization in AGL published on the Embedded Computing Design website.

Leading the innovation: integration of cutting-edge cloud technologies

dredbox, a disaggregated recursive datacenter in a box

Expected to be completed by the end of 2018, the dReDBox H2020 research project is at the integration stage. Virtual Open Systems is an active participant of this effort, particularly with regards to QEMU-KVM virtualization layer enhancements, such as the dynamic VM memory resizing enabling runtime guest RAM regulation, the inter-VM memory sharing to allow multiple VMs, hosted on different compute nodes, to share disaggregated memory buffers that are not locally attached to the compute node. Furthermore, leveraging the physical disaggregation, VM migration becomes a very lightweight operation as moving guests between different compute nodes does not imply heavy copies of data, but remapping operations; such evolution brings a new grade of achievable server consolidation levels. At last, an example of disaggregated device will also be included in the final demonstrator, showcasing how the disaggregated memory can be used to disaggregate a block device.

Computation acceleration: OpenCL inside VMs and containers

Computation acceleration: OpenCL inside VMs and containers

As part of the ExaNoDe H2020 research project, Virtual Open Systems develops a software API remoting solution for OpenCL. OpenCL is an open standard maintained by the Khronos Group, used for offloading computation tasks into accelerators, such as GPUs and FPGAs. Software API remoting is a para-virtualization technique that allows accessing a host native library from the inside of a virtual machines. It operates by intercepting API function calls from the application in the guest system, and forwarding them to a helper process on the host through the use of shared memory pages. API remoting for containers can be achieved similarly, by replacing the host-to-VM communication layer (based on Virtio) with Linux inter-process communication mechanisms. To comply with the high performance requirements of OpenCL usage, it is important to reduce as much as possible the overhead of the API remoting layer. Hence, the work has focused on passing the data buffers (that may account for several gigabytes of memory) with zero copies, that to guest physical pages lookup and remapping.

Further information and Contact