SlideShare a Scribd company logo
1 of 38
Lars Kurth
Community Manager, Xen Project
Chairman, Xen Project Advisory Board
lars_kurth
Consolidation
Reduce cost, size, weight and power consumption
Reduce development costs: platform independence
Security and Safety
Support mixed criticality compositions
(Apps with differing safety, security & real-time requirements)
Safety Certification of the Hypervisor
Embedded Requirements
Minimal IRQ latency
Low or 0 scheduling overhead
Drivers for special I/O devices
Flexible architecture
OpenXT, SecureView
(desktop, laptops, tablets)
Defense Applications
Defense Applications Xenon Hypervisor family, Magrana Server, …
First time formal methods were applied on a Xen fork
Cloud Computing Amazon Web Services, Tencent, Alibaba Cloud, `
IBM SoftLayer, Rackspace, …
Server Virtualization
Linux Distros, Citrix Hypervisor, Huawei UVP, XCP-ng
ARLX/Virtuosity OA, Bromium
uXen, Crucible Hypervisor
Various Safety Standards
Embedded Defense /
Security Applications
Embedded/
Automotive Virtuosity, XILINX Xen Zynq, Perseus,
GlobalLogic Nautilus, EPAM Fusion
General purpose desktop and mobile Virtualization
XenClient, NxTop, Neosphere, Samsung, Qubes OS
2012 Xenon Separation VMM family, CC EAL5+
Fork of cut down version of Xen Project used by the US military.
Certified to CC EAL 5+ (Semiformally Designed and Tested which has some similarity to safety
standards). Tracks upstream and maintained with an effort of 1.5 man years per year
2012
2012
Xenon Separation VMM family, CC EAL5+
DornerWorks ARLX
DO-178 Level A packages, IEC 62304,
ISO 26262, MILS EAL, ARINC 653
Support for commercial and FOSS guest OSes
OpenGroup FACE certified
Virtuosity OA
Future Airborne Capability Environment (FACE™)
defines the software computing environment and interfaces designed to support the development of
portable components across the general-purpose, safety, and security profiles. FACE uses
industry standards for distributed communications, programming languages, graphics, operating
systems, and other areas as appropriate.
2012
2012
2016
Xenon Separation VMM family, CC EAL5+
DornerWorks ARLX
DO-178 with some level A packages, IEC 62304,
ISO 26262, MILS EAL, ARINC 653
Star Lab Crucible
OpenGroup FACE certified
Virtuosity OA
Secure embedded virtualization platform for
security-critical operational environments, including
aerospace & defense, industrial, transportation, and telecommunications
2012
2012
2016
2015
Xenon Separation VMM family, CC EAL5+
DornerWorks ARLX
DO-178 Level A packages, IEC 62304,
ISO 26262, MILS EAL, ARINC 653
Star Lab Crucible
Xilinx: Petalinux with Xen
OpenGroup FACE certified
Virtuosity OA
1st Xen distro for embedded with additional functionality
Currently NO safety certification support
2012
2016
2015
2017
DornerWorks ARLX
DO-178 Level A packages, IEC 62304,
ISO 26262, MILS EAL, ARINC 653
Star Lab Crucible
GlobalLogic
EPAM
OpenGroup FACE certified
Virtuosity OA
2015 Xilinx: Petalinux with Xen
1st Xen based stack for automotive
No safety certification
2nd generation Xen based stack for
automotive. No safety certification, but working
with community and industry on progressing
safety
2016:
EPAM and Renesas funded a study by HORIBA MIRA to assess
whether it is possible to safety certify a subset of the Xen Project
Answer: possible
From 2015 – today:
Close functional gaps, real-time capability, reducing code-size
and create reference implementations (EPAM, XILINX)
Answer: suitable platform for some use-cases
Number of gaps to be a general purpose platform still worked on
All is open source, but not all is upstreamed in Xen
Schedulers: ARINC, RTDS, Null and other real-time support
Laid the foundation for embedded use-cases and use of Xen as a partitioning HV
Low latency and real-time support
A minimal Xen on Arm Configuration
< 50 KSLOC of code for a specific HW environment
PV drivers (and in future virtio drivers) and GPU mediation for rich IO
Available in various upstreams
OP-TEE virtualization support
Both in Xen and in OP-TEE
Dom0less Xen
For now: allows booting VM’s without interaction with Dom0, but Dom0 still exists
2020: an architecture without a Dom0 and/or an RTOS as Dom0
Schedulers: ARINC, RTDS, Null and other real-time support
Laid the foundation for embedded use-cases and use of Xen as a partitioning HV
Low latency and real-time support
A minimal Xen on Arm Configuration
< 50 KSLOC of code for a specific HW environment
PV drivers (and in future virtio drivers) and GPU mediation for rich IO
Available in various upstreams
OP-TEE virtualization support
Both in Xen and in OP-TEE
Dom0less Xen
For now: allows booting VM’s without interaction with Dom0, but Dom0 still exists
2020: an architecture without a Dom0 and/or an RTOS as Dom0
Key Point:
Xen on Arm, turned out to be a great open
source hypervisor for embedded and
mixed-criticality use-cases
Despite having been designed for servers!
FreeRTOS / SafeRTOS
FreeRTOS-compatible alternatives from Wittenstein
SafeRTOS: proprietary FreeRTOS-rewrite complying with IEC 61508
SIL2LinuxMP
Can Linux be Safety certified? Obstacles, tools and processes
LF Projects with an ambition to become ”easy to certify”
ACRN
AGL – Virtualization may make achieving key AGL UCs easier
ELISA Project – Develop tools and processes
Xen Project
Zephyr
Each with different history, cultures and problems that have to be overcome
Community Challenges
Funding
Can FOSS SW be used for Functional Safety?
Yes, but there are many barriers
Requires major changes to the software
Requires tools, infrastructure and expertise
Requires changes in how FOSS projects work
Until recently: assumption was that the two worlds cannot work together
Level Requirements Application Cost with Experience
DAL E The software must exist Infotainment
Failure is a minor inconvenience
0.11 hour / SLOC
DAL D High-Level Docs/Tests Instruments
Failure can be mitigated by operator
0.13 hour / SLOC
DAL C Low-Level Docs/Unit Tests,
Statement Coverage, and
Code/Data Coupling
Analysis
0.20 hour / SLOC
DAL B Branch Coverage Engine Control
Failure could kill someone without
warning
0.40 hour / SLOC
DAL A Source to Object Analysis
and MC/DC Coverage
0.67 hour / SLOC
Credit/Source: Dornerworks / XPDS14 - Xen and the Art of Certification.pdf
Level Requirements Application Cost with Experience
DAL E The software must exist Infotainment
Failure is a minor inconvenience
0.11 hour / SLOC
DAL D High-Level Docs/Tests Instruments
Failure can be mitigated by operator
0.13 hour / SLOC
DAL C Low-Level Docs/Unit Tests,
Statement Coverage, and
Code/Data Coupling
Analysis
0.20 hour / SLOC
DAL B Branch Coverage Engine Control
Failure could kill someone without
warning
0.40 hour / SLOC
DAL A Source to Object Analysis
and MC/DC Coverage
0.67 hour / SLOC
Credit/Source: Dornerworks / XPDS14 - Xen and the Art of Certification.pdf
3-4 times as much
without experience
0
10
20
30
40
50
60
70
30 KSLOC 50 KSLOC 100 KSLOC 200 KSLOC
Cost in man years
DAL C
DAL B
DAL A
Already investment in
the order of
20-30 man years
on functionality
An investment of 10-15
man years for
safety is not
outlandish
Examples of Xen based embedded products
With some support for safety standards in proprietary spin-offs
Expertise in ecosystem that covers Xen and Safety
Primarily for hire: too small to fund speculatively
Reference implementations with safety in mind
EPAM Stack (automotive), XILINX Stack
Another similar effort in progress elsewhere (generic safety case)
Some limited adoption in niche use-cases today
In a non-safety context
In safety contexts where safety can be isolated in progress
Want to be in a position where upstream and vendors
interested in safety certification collaborate with the goal of
making Xen more cheaply safety certifiable
With buy-in and support from multiple vendors
Don’t want to be at the bleeding edge of this, but just behind
Such that we can benefit from ELISA and other projects such as Zephyr
Xen Hypervisor (≤ 50 KSLOC)
Dom 0
CPU
VM 1 VM 2VM 3
CPU
Dom0less VMs loaded by uBoot
and booted by Xen (not Dom0),
pinned to a CPU via the Null
scheduler and I/O handled by
device assignment
Dom0 completes boot after VM 1
and VM 2. Static set-up
CPU
VM 1 VM 2
CPU
Xen Hypervisor
Ongoing work to fully implement
true Dom0less for small systems
• Shared memory and interrupts for VM-to-
VM communications
• PV frontends/backends drivers for Dom0-
less VMs
Dom0less initial safety certification
scope
25
Mix Safety Digital Cockpit
In-Vehicle Computer
Picked MISRA C as an example, because …
it is representative of the type of community problems that you should
expect if you look at safety certification
Subset required by most safety standards
10 Mandatory, 111 Required and 38 Advisory rules
Required rules depend on certification level can be deviated from
Justifications of deviations would have to be signed off by an assessor
Partnership with Perforce: access to QA Verify providing
selected community members to results on Xen snapshots
Goal: Experiment and Learn
Picked hardest and controversial rules to see what
would happen!
We did not expect to succeed !
MISRA C spec is proprietary
Rule text cannot be copied into a posted patch series ➜
lack of clarity, lack of rationale: leading to unnecessary debate
CI set-up does not allow upfront verification of fixes:
Primarily a consequence of what we were offered for free
Either: commit without knowing a fix worked
Or: The developer would have to buy the tool
Interactions w compilers, HW, assembly code problematic
Ended up with 11 iterations and man weeks of review effort
Some rules will create a flame-war if there is a single argumentative
maintainer
E.g. MISRA C:2012, 15.7
"if ... else if" constructs should end with "else" clause
if (x == 0) {
doSomething();
} else if (x == 1) {
doSomethingElse();
} else {
error();
/* or justification why no action is taken */
}
Possibility of MISRA C Deviations encourage arguments
Deviations: justification of a class or instance of non-compliance
Deviation Permits: previously approved deviations for a use-case
It’s all a bit like like “legal precedent” in common law legal systems:
an expert (assessor) is needed to advise the project on a case-by-case basis
Community Scalability
Code review process encourages too much discussion, if there is no up-front
plan on how to approach a disruptive set of changes
Fix: A priori agreed strategy and plan on how to approach this
2 day workshop in March 2019 with 25 attendees – keep it small
Community Reps and Support
Project leadership team (except for 2)
Kate Stewart as observer /
advisor
Vendors with investment in Xen
Vendors with product interest
Safety Assessors
Create a understanding between the community and industry
Terminology, Concepts, etc.
How safety certification works: look at different standards, routes, requirements
Explain assets and processes
Establish community “red lines”
Principles the community can agree to or would object to
What level of change would be acceptable
Identify potential obstacles
Establish whether Xen Project is safety certifiable
If so, create a candidate set of feasible certification routes
Establish a rough action plan on how to progress
Split development model with an open and a closed part
Everything that is valuable to the wider community ideally in the open part,
e.g. documentation, some tests, traceability, automation and infrastructure,….
Everything that creates code churn if it wasn’t open as much as possible:
e.g. coding standards (MISRA)
Changes to the development workflow have to be kept minimal
There must be a benefit the community (including for common code)
Otherwise the community wont carry
There are long-term implications for the community
Make-up, scalability, decision making, conflicts – need to be managed
No new barriers for contributors can be introduced
Yes:
But assumes lightweight processes and automation in community
Similar to challenges using Agile in a safety context
Picture by Lars Kurth

More Related Content

What's hot

Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project VirtualisationThe Linux Foundation
 
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMXPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMThe Linux Foundation
 
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...The Linux Foundation
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Novell
 
System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022Stefano Stabellini
 
Virtualization Architecture & KVM
Virtualization Architecture & KVMVirtualization Architecture & KVM
Virtualization Architecture & KVMPradeep Kumar
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationThe Linux Foundation
 
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...Andrei Kholodnyi
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptxRiyaBatool
 
Linux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBLinux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBshimosawa
 
Using eBPF for High-Performance Networking in Cilium
Using eBPF for High-Performance Networking in CiliumUsing eBPF for High-Performance Networking in Cilium
Using eBPF for High-Performance Networking in CiliumScyllaDB
 
Part 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module ProgrammingPart 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module ProgrammingTushar B Kute
 
Bare-Metal Hypervisor as a Platform for Innovation
Bare-Metal Hypervisor as a Platform for InnovationBare-Metal Hypervisor as a Platform for Innovation
Bare-Metal Hypervisor as a Platform for InnovationThe Linux Foundation
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device driversHoucheng Lin
 

What's hot (20)

Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project Virtualisation
 
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMXPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
 
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)
 
Xen Debugging
Xen DebuggingXen Debugging
Xen Debugging
 
System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022
 
Virtualization Architecture & KVM
Virtualization Architecture & KVMVirtualization Architecture & KVM
Virtualization Architecture & KVM
 
Review of QNX
Review of QNXReview of QNX
Review of QNX
 
Embedded Hypervisor for ARM
Embedded Hypervisor for ARMEmbedded Hypervisor for ARM
Embedded Hypervisor for ARM
 
LFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen AutomotiveLFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen Automotive
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using Virtualization
 
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
Linux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBLinux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKB
 
Linux dma engine
Linux dma engineLinux dma engine
Linux dma engine
 
Using eBPF for High-Performance Networking in Cilium
Using eBPF for High-Performance Networking in CiliumUsing eBPF for High-Performance Networking in Cilium
Using eBPF for High-Performance Networking in Cilium
 
Part 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module ProgrammingPart 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module Programming
 
Bare-Metal Hypervisor as a Platform for Innovation
Bare-Metal Hypervisor as a Platform for InnovationBare-Metal Hypervisor as a Platform for Innovation
Bare-Metal Hypervisor as a Platform for Innovation
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device drivers
 
Xen Memory Management
Xen Memory ManagementXen Memory Management
Xen Memory Management
 

Similar to OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challenges to Institutionalise Changes Required for Safety Certification - Lars Kurth, The Xen Project

2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov UpdateThe Linux Foundation
 
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, CitrixLCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, CitrixThe Linux Foundation
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edgeJohn Archer
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Why and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud futureWhy and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud futureStefan van Oirschot
 
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...Codemotion
 
CoreOS and cloud provider integration: simple cloud-init example at Exoscale
CoreOS and cloud provider integration: simple cloud-init example at ExoscaleCoreOS and cloud provider integration: simple cloud-init example at Exoscale
CoreOS and cloud provider integration: simple cloud-init example at ExoscaleAntoine COETSIER
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneThe Linux Foundation
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationVEDLIoT Project
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Affordable trustworthy-systems
Affordable trustworthy-systemsAffordable trustworthy-systems
Affordable trustworthy-systemsmicrokerneldude
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...Edge AI and Vision Alliance
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDays Riga
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...Docker, Inc.
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC Technologies
 
Resume_Achhar_Kalia
Resume_Achhar_KaliaResume_Achhar_Kalia
Resume_Achhar_KaliaAchhar Kalia
 

Similar to OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challenges to Institutionalise Changes Required for Safety Certification - Lars Kurth, The Xen Project (20)

2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, CitrixLCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Why and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud futureWhy and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud future
 
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
 
CoreOS and cloud provider integration: simple cloud-init example at Exoscale
CoreOS and cloud provider integration: simple cloud-init example at ExoscaleCoreOS and cloud provider integration: simple cloud-init example at Exoscale
CoreOS and cloud provider integration: simple cloud-init example at Exoscale
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zone
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentation
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
1 App,
1 App, 1 App,
1 App,
 
Affordable trustworthy-systems
Affordable trustworthy-systemsAffordable trustworthy-systems
Affordable trustworthy-systems
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...
“Khronos Group Standards: Powering the Future of Embedded Vision,” a Presenta...
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_Complete
 
Resume_Achhar_Kalia
Resume_Achhar_KaliaResume_Achhar_Kalia
Resume_Achhar_Kalia
 

More from The Linux Foundation

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleThe Linux Foundation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderThe Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEThe Linux Foundation
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityThe Linux Foundation
 

More from The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
 

Recently uploaded

如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一avy6anjnd
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证62qaf0hi
 
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...nirzagarg
 
Electronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxElectronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxmohamedAabdeltwab
 
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一fhjlokjhi
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一qh1ao5mm
 
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一8jg9cqy
 
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...Dipal Arora
 
Call Girls Kolkata +910000000000 call me Independent Escort Service Bengal
Call Girls Kolkata +910000000000 call me Independent Escort Service BengalCall Girls Kolkata +910000000000 call me Independent Escort Service Bengal
Call Girls Kolkata +910000000000 call me Independent Escort Service BengalCall Girls Mumbai
 
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...Call Girls Mumbai
 
❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdf❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdfvershagrag
 
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's WhyIs Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's WhyBavarium Autoworks
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best ServiceMarathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...vershagrag
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样wsppdmt
 
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...gragfaguni
 

Recently uploaded (20)

如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
 
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
 
Electronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxElectronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptx
 
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
 
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一
如何办理加拿大麦克马斯特大学毕业证(McMaste 毕业证书)毕业证成绩单原版一比一
 
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
 
Call Girls Kolkata +910000000000 call me Independent Escort Service Bengal
Call Girls Kolkata +910000000000 call me Independent Escort Service BengalCall Girls Kolkata +910000000000 call me Independent Escort Service Bengal
Call Girls Kolkata +910000000000 call me Independent Escort Service Bengal
 
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
 
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...
Call Girls In Delhi, Website Rent Mr Avishek {bookkdreamgirl@gmail.com} Escor...
 
❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdf❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdf
 
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's WhyIs Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
 
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best ServiceMarathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
 
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
 

OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challenges to Institutionalise Changes Required for Safety Certification - Lars Kurth, The Xen Project

  • 1. Lars Kurth Community Manager, Xen Project Chairman, Xen Project Advisory Board lars_kurth
  • 2.
  • 3. Consolidation Reduce cost, size, weight and power consumption Reduce development costs: platform independence Security and Safety Support mixed criticality compositions (Apps with differing safety, security & real-time requirements) Safety Certification of the Hypervisor Embedded Requirements Minimal IRQ latency Low or 0 scheduling overhead Drivers for special I/O devices Flexible architecture
  • 4.
  • 5. OpenXT, SecureView (desktop, laptops, tablets) Defense Applications Defense Applications Xenon Hypervisor family, Magrana Server, … First time formal methods were applied on a Xen fork Cloud Computing Amazon Web Services, Tencent, Alibaba Cloud, ` IBM SoftLayer, Rackspace, … Server Virtualization Linux Distros, Citrix Hypervisor, Huawei UVP, XCP-ng ARLX/Virtuosity OA, Bromium uXen, Crucible Hypervisor Various Safety Standards Embedded Defense / Security Applications Embedded/ Automotive Virtuosity, XILINX Xen Zynq, Perseus, GlobalLogic Nautilus, EPAM Fusion General purpose desktop and mobile Virtualization XenClient, NxTop, Neosphere, Samsung, Qubes OS
  • 6. 2012 Xenon Separation VMM family, CC EAL5+ Fork of cut down version of Xen Project used by the US military. Certified to CC EAL 5+ (Semiformally Designed and Tested which has some similarity to safety standards). Tracks upstream and maintained with an effort of 1.5 man years per year
  • 7. 2012 2012 Xenon Separation VMM family, CC EAL5+ DornerWorks ARLX DO-178 Level A packages, IEC 62304, ISO 26262, MILS EAL, ARINC 653 Support for commercial and FOSS guest OSes OpenGroup FACE certified Virtuosity OA Future Airborne Capability Environment (FACE™) defines the software computing environment and interfaces designed to support the development of portable components across the general-purpose, safety, and security profiles. FACE uses industry standards for distributed communications, programming languages, graphics, operating systems, and other areas as appropriate.
  • 8. 2012 2012 2016 Xenon Separation VMM family, CC EAL5+ DornerWorks ARLX DO-178 with some level A packages, IEC 62304, ISO 26262, MILS EAL, ARINC 653 Star Lab Crucible OpenGroup FACE certified Virtuosity OA Secure embedded virtualization platform for security-critical operational environments, including aerospace & defense, industrial, transportation, and telecommunications
  • 9. 2012 2012 2016 2015 Xenon Separation VMM family, CC EAL5+ DornerWorks ARLX DO-178 Level A packages, IEC 62304, ISO 26262, MILS EAL, ARINC 653 Star Lab Crucible Xilinx: Petalinux with Xen OpenGroup FACE certified Virtuosity OA 1st Xen distro for embedded with additional functionality Currently NO safety certification support
  • 10. 2012 2016 2015 2017 DornerWorks ARLX DO-178 Level A packages, IEC 62304, ISO 26262, MILS EAL, ARINC 653 Star Lab Crucible GlobalLogic EPAM OpenGroup FACE certified Virtuosity OA 2015 Xilinx: Petalinux with Xen 1st Xen based stack for automotive No safety certification 2nd generation Xen based stack for automotive. No safety certification, but working with community and industry on progressing safety
  • 11. 2016: EPAM and Renesas funded a study by HORIBA MIRA to assess whether it is possible to safety certify a subset of the Xen Project Answer: possible From 2015 – today: Close functional gaps, real-time capability, reducing code-size and create reference implementations (EPAM, XILINX) Answer: suitable platform for some use-cases Number of gaps to be a general purpose platform still worked on All is open source, but not all is upstreamed in Xen
  • 12.
  • 13. Schedulers: ARINC, RTDS, Null and other real-time support Laid the foundation for embedded use-cases and use of Xen as a partitioning HV Low latency and real-time support A minimal Xen on Arm Configuration < 50 KSLOC of code for a specific HW environment PV drivers (and in future virtio drivers) and GPU mediation for rich IO Available in various upstreams OP-TEE virtualization support Both in Xen and in OP-TEE Dom0less Xen For now: allows booting VM’s without interaction with Dom0, but Dom0 still exists 2020: an architecture without a Dom0 and/or an RTOS as Dom0
  • 14. Schedulers: ARINC, RTDS, Null and other real-time support Laid the foundation for embedded use-cases and use of Xen as a partitioning HV Low latency and real-time support A minimal Xen on Arm Configuration < 50 KSLOC of code for a specific HW environment PV drivers (and in future virtio drivers) and GPU mediation for rich IO Available in various upstreams OP-TEE virtualization support Both in Xen and in OP-TEE Dom0less Xen For now: allows booting VM’s without interaction with Dom0, but Dom0 still exists 2020: an architecture without a Dom0 and/or an RTOS as Dom0 Key Point: Xen on Arm, turned out to be a great open source hypervisor for embedded and mixed-criticality use-cases Despite having been designed for servers!
  • 15.
  • 16. FreeRTOS / SafeRTOS FreeRTOS-compatible alternatives from Wittenstein SafeRTOS: proprietary FreeRTOS-rewrite complying with IEC 61508 SIL2LinuxMP Can Linux be Safety certified? Obstacles, tools and processes LF Projects with an ambition to become ”easy to certify” ACRN AGL – Virtualization may make achieving key AGL UCs easier ELISA Project – Develop tools and processes Xen Project Zephyr Each with different history, cultures and problems that have to be overcome
  • 17. Community Challenges Funding Can FOSS SW be used for Functional Safety? Yes, but there are many barriers Requires major changes to the software Requires tools, infrastructure and expertise Requires changes in how FOSS projects work Until recently: assumption was that the two worlds cannot work together
  • 18. Level Requirements Application Cost with Experience DAL E The software must exist Infotainment Failure is a minor inconvenience 0.11 hour / SLOC DAL D High-Level Docs/Tests Instruments Failure can be mitigated by operator 0.13 hour / SLOC DAL C Low-Level Docs/Unit Tests, Statement Coverage, and Code/Data Coupling Analysis 0.20 hour / SLOC DAL B Branch Coverage Engine Control Failure could kill someone without warning 0.40 hour / SLOC DAL A Source to Object Analysis and MC/DC Coverage 0.67 hour / SLOC Credit/Source: Dornerworks / XPDS14 - Xen and the Art of Certification.pdf
  • 19. Level Requirements Application Cost with Experience DAL E The software must exist Infotainment Failure is a minor inconvenience 0.11 hour / SLOC DAL D High-Level Docs/Tests Instruments Failure can be mitigated by operator 0.13 hour / SLOC DAL C Low-Level Docs/Unit Tests, Statement Coverage, and Code/Data Coupling Analysis 0.20 hour / SLOC DAL B Branch Coverage Engine Control Failure could kill someone without warning 0.40 hour / SLOC DAL A Source to Object Analysis and MC/DC Coverage 0.67 hour / SLOC Credit/Source: Dornerworks / XPDS14 - Xen and the Art of Certification.pdf 3-4 times as much without experience
  • 20. 0 10 20 30 40 50 60 70 30 KSLOC 50 KSLOC 100 KSLOC 200 KSLOC Cost in man years DAL C DAL B DAL A Already investment in the order of 20-30 man years on functionality An investment of 10-15 man years for safety is not outlandish
  • 21. Examples of Xen based embedded products With some support for safety standards in proprietary spin-offs Expertise in ecosystem that covers Xen and Safety Primarily for hire: too small to fund speculatively Reference implementations with safety in mind EPAM Stack (automotive), XILINX Stack Another similar effort in progress elsewhere (generic safety case) Some limited adoption in niche use-cases today In a non-safety context In safety contexts where safety can be isolated in progress
  • 22. Want to be in a position where upstream and vendors interested in safety certification collaborate with the goal of making Xen more cheaply safety certifiable With buy-in and support from multiple vendors Don’t want to be at the bleeding edge of this, but just behind Such that we can benefit from ELISA and other projects such as Zephyr
  • 23.
  • 24. Xen Hypervisor (≤ 50 KSLOC) Dom 0 CPU VM 1 VM 2VM 3 CPU Dom0less VMs loaded by uBoot and booted by Xen (not Dom0), pinned to a CPU via the Null scheduler and I/O handled by device assignment Dom0 completes boot after VM 1 and VM 2. Static set-up CPU VM 1 VM 2 CPU Xen Hypervisor Ongoing work to fully implement true Dom0less for small systems • Shared memory and interrupts for VM-to- VM communications • PV frontends/backends drivers for Dom0- less VMs Dom0less initial safety certification scope
  • 25. 25 Mix Safety Digital Cockpit In-Vehicle Computer
  • 26. Picked MISRA C as an example, because … it is representative of the type of community problems that you should expect if you look at safety certification
  • 27. Subset required by most safety standards 10 Mandatory, 111 Required and 38 Advisory rules Required rules depend on certification level can be deviated from Justifications of deviations would have to be signed off by an assessor Partnership with Perforce: access to QA Verify providing selected community members to results on Xen snapshots Goal: Experiment and Learn
  • 28. Picked hardest and controversial rules to see what would happen! We did not expect to succeed !
  • 29. MISRA C spec is proprietary Rule text cannot be copied into a posted patch series ➜ lack of clarity, lack of rationale: leading to unnecessary debate CI set-up does not allow upfront verification of fixes: Primarily a consequence of what we were offered for free Either: commit without knowing a fix worked Or: The developer would have to buy the tool Interactions w compilers, HW, assembly code problematic Ended up with 11 iterations and man weeks of review effort
  • 30. Some rules will create a flame-war if there is a single argumentative maintainer E.g. MISRA C:2012, 15.7 "if ... else if" constructs should end with "else" clause if (x == 0) { doSomething(); } else if (x == 1) { doSomethingElse(); } else { error(); /* or justification why no action is taken */ }
  • 31. Possibility of MISRA C Deviations encourage arguments Deviations: justification of a class or instance of non-compliance Deviation Permits: previously approved deviations for a use-case It’s all a bit like like “legal precedent” in common law legal systems: an expert (assessor) is needed to advise the project on a case-by-case basis Community Scalability Code review process encourages too much discussion, if there is no up-front plan on how to approach a disruptive set of changes Fix: A priori agreed strategy and plan on how to approach this
  • 32.
  • 33. 2 day workshop in March 2019 with 25 attendees – keep it small Community Reps and Support Project leadership team (except for 2) Kate Stewart as observer / advisor Vendors with investment in Xen Vendors with product interest Safety Assessors
  • 34. Create a understanding between the community and industry Terminology, Concepts, etc. How safety certification works: look at different standards, routes, requirements Explain assets and processes Establish community “red lines” Principles the community can agree to or would object to What level of change would be acceptable Identify potential obstacles Establish whether Xen Project is safety certifiable If so, create a candidate set of feasible certification routes Establish a rough action plan on how to progress
  • 35. Split development model with an open and a closed part Everything that is valuable to the wider community ideally in the open part, e.g. documentation, some tests, traceability, automation and infrastructure,…. Everything that creates code churn if it wasn’t open as much as possible: e.g. coding standards (MISRA) Changes to the development workflow have to be kept minimal There must be a benefit the community (including for common code) Otherwise the community wont carry There are long-term implications for the community Make-up, scalability, decision making, conflicts – need to be managed No new barriers for contributors can be introduced
  • 36. Yes: But assumes lightweight processes and automation in community Similar to challenges using Agile in a safety context
  • 37.

Editor's Notes

  1. Disclosures: I am not a safety expert Also, I work for Citrix which has no stake in safety and embedded at all, and I am working with others on the safety side of Xen with the goal of supporting the community I am giving a high level overview today, and more details at a second talk on Friday. So some of the detail in this talk will be lacking.
  2. So the first question to ask is why to virtualize embedded systems at all And there we will look at Consolidation, Security and Safety and Special Requirements for Embedded Systems
  3. 1: Consolidation is all about reducing cost – both from a HW development and SW development perspective On the SW side, virtualization allows you to develop SW against an abstraction which reduces porting effort and makes you less dependent on particular hardware vendors. In many cases it is also about reducing size, weight and power consumption Security is also a key issue and virtualization provides mechanisms to sandbox different functions of your system in different VMs. And for many market segments safety certification is critical In addition, there are also a lot of extra requirement needed for some embedded use-cases, which I will cover in the talk.
  4. Radar / Satellite pic
  5. Aircraft carriers, radars, etc.
  6. Xenon Familiy: Developed and used by the US military Were able to create a cut down version of Xen certified to CC EAL 5 (Semiformally Designed and Tested which has some similarity to safety standards) Were able to track upstream and maintain with an effort of 1.5 man years per year
  7. Came out of a number of research grants that were funded by the US government and also by vendors such as XILINX who saw potential for virtualization in embedded
  8. 15mins
  9. Skim through this quickly!
  10. 16 mins
  11. IMPORTANT: Figures based on a study on top of Xen funded via “US Navy Small Business Innovative Research (SBIR)“ grant
  12. Key point here is that the assumption here is for a one-off-certification of a Xen Project based branch It is also important to note that automotive certification is similar enough to DO-178b to use these figures as a baseline
  13. 20 mins DAL B / DAL C is equivalent to ASIL B - aka certification we are looking for example for instrument clusters
  14. (aka Xen is not or not fully safety certified) I know 3 examples
  15. Much faster startup times total ~= xen + domU Enable true Dom0-less configurations Excellent for small systems Easier to certify Lower Complexity No need for the Xen tools Does not require Yocto, just cross-build Xen No need for Xen support in Dom0-less VMs, no need for CONFIG_XEN Cons: No monitoring and restarting DomUs without Dom0 No PV frontends/backends without Dom0
  16. Common theme Several ECUs in the car Left: One acting as a gateway / one as an application/cloud server – Evolution of a Telematik Control Unit [Fleet management, User behavior Insurance, …] Right: Digital cockpit: Cluster + IVI … possibly ADAS, etc.
  17. 28 mins
  18. 28 mins
  19. Another problem which surfaced is the impact of CODE CHURN and how that impacts the project’s capability to backport security fixes. So there is a VERY GOOD and logical case against minimizing churn
  20. Let’s for example say that 1000 MISRA issues have to be fixed That it takes on average 2 hours to create a fix and 4 hours to do perform a review That would mean that a contributor would spend 1 MAN YEAR creating fixes And established community members would spend 2 MAN YEARS reviewing the code That are 2 MAN YEARS not spent on other things, which may be equally as important for the whole community So the question then becomes how the code review burden can be minimized without affecting quality And whether this burden can be shifted to newcomers within the community
  21. 30 minutes
  22. Code churn is difficult: poses a fundamental unresolvable conflict which requires making a case-by-case priority call a) NOT upstreaming creates burden for vendors who want to safety certify b) Upstreaming increases the cost of upstream to maintain supported releases and security fixes What is interesting though is that in the last 2 years, as a community we had to deal with a similar set of trade-offs when you look at mitigations for side-channel attacks