1 / 36

ELN5622 Embedded Systems Class 8 Spring, 2003

ELN5622 Embedded Systems Class 8 Spring, 2003. Aaron Itskovich itskovich@rogers.com. Overview. Operating Systems vs. Executives Real-Time Operating Systems Desirable Attributes Examples. Operating Systems vs. Executives. Desktop Systems General purpose Deep functionality

lyle-holman
Télécharger la présentation

ELN5622 Embedded Systems Class 8 Spring, 2003

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ELN5622Embedded SystemsClass 8Spring, 2003 Aaron Itskovichitskovich@rogers.com

  2. Overview • Operating Systems vs. Executives • Real-Time Operating Systems • Desirable Attributes • Examples

  3. Operating Systems vs. Executives • Desktop Systems • General purpose • Deep functionality • Generous resources • Multiple I/O channels • Embedded Systems • Special purpose • Limited functionality • Limited resources • Single I/O channel

  4. Operating Systems vs. Executives (cont.) • So, why do we need an OS? • Well, we don't, always • But... • The natural decomposition of a system might involve multiple tasks (threads) • Abstracting-out hardware dependencies allows us to run on multiple or one processors without or with small changes in application software • Fast embedded processors are getting cheap

  5. Operating Systems vs. Executives (cont.)

  6. Real-Time Operating Systems • A Real-Time OS (RTOS) means: • Upper-bound on response time to external events • e.g., interrupts, timer • Fast context switch time • Hard real-time • Missed deadline causes system malfunction (e.g., plane crashes, assembly line stops) • Soft real-time • Missed deadline causes system degradation (Not so bad for example might drop a few frames of video)

  7. Real-Time Operating Systems (cont.) • Preemptable kernel • Longest path through the kernel is short • Interrupts are not disabled for a long time • POSIX • Portable Operating System Interface (Unix) • Standard API for real-time Oss • Process • Unit of resource allocation • Thread • Unit of scheduling

  8. Context Switches • Pseudo-Parallelism • Threads run concurrently • Steps: • Choose a thread to run • Save current context (PC, registers, MMU info) • Load new context • Run • A context switch between sibling threads is cheaper than for non-sibling threads

  9. Running 2 3 Ready 1 Waiting 4 Scheduling • Meeting deadlines requires preemption • FIFO scheduling • Round-robin scheduling • Preemptive-priority scheduling 1: Preempted 2: Scheduled 3: Wait (e.g., I/O) 4: Signal (e.g., I/O complete)

  10. FIFO Scheduling • Thread runs until it voluntarily gives up CPU • Cooperative scheduling • To do I/O

  11. ProcessBurst Time P0 7 P1 15 P2 6 P3 3 FIFO Scheduling (cont.) P0 P1 P2 P3 0 7 22 28 31

  12. Round-Robin Scheduling • Each thread runs for a given timeslice • CPU does a context switch after timeslice expires • Fair scheduling policy

  13. ProcessArrival TimeBurst Time P0 0 7 P1 1 15 P2 2 6 P3 3 3 Round-Robin Scheduling (cont.) P0 P1 P2 P3 P0 P1 P2 P1 0 4 8 12 15 18 22 24 31 *Assume timeslice = 4

  14. 0 P1 P4 1 P5 2 P3 P0 P2 ... 63 Pidle Preemptive-Priority Scheduling • Each thread has a priority • OS guarantees highest priority thread always runs • OS takes CPU from a running, lower-priority thread

  15. ProcessArrival TimeBurst Time Priority P0 0 7 3 P1 1 15 4 P2 2 6 1 P3 3 3 2 Preemptive-Priority Scheduling (cont.) P0 P2 P3 P0 P1 0 2 8 11 16 31

  16. Measures of OS Performance • The main measures of OS performance • Size of OS footprint • Interrupt latency • Context switch time • Hardware supported • Memory protection support

  17. Interrupt Occurs Interrupt Handler Runs Interrupt Handler Finishes Interrupted Process Continues Execution time Til Tiret Tint Til Interrupt Latency Tint Interrupt Processing Time Tiret Interrupt Termination Time Measures of OS Performance (cont.) • Interrupt service time

  18. Measures of OS Performance (cont.) • Context switch time • QNX Neutrino Processor Speed (MHz) Context Switch (µsec) 7400 G4 PowerPC 460 0.6 R527X MIPS 166 2.3 AMD-K-1 555 0.6 SH-4 200 1.9 SA-1110 StrongARM 207 1.8

  19. Communicating processes • Despite process abstraction, different computations (processes) sometimes want to communicate. • Communication can increase the modularity and robustness of programs • (one process for each action, theapplication can continue if one of the sub processes fails)

  20. Communicating processes (cont) • Shared memory as a way of communication between processes • processes all have access to a shared are of memory where one process can change a vari-able that can be seen by all other processes. • How to deal with racing conditions?

  21. Race conditions • An atomic action is an indivisible action - an action taken by a process than cannot be interrupted by a context switch. When accesses to a shared variable are not atomic, call it a race condition.

  22. Race condition example shared int x =3; process_1 () { x =x +1; print x; } process_2 () { x =x +1; print x; } Note that although x = x +1looks like one statement, itprobably compiles into at least 2 andprobably three machine instructions. A likely translation is: LOAD r1<-x ADD r1+1->r1 STORE r1->x

  23. Race condition example(cont) If the program is controlling radiation therapy,maybe somebody's life at risk.

  24. Critical section • Only code that is manipulating shared data needsto worry about them. • Sections of code thatare accessing shared data are called critical sections or critical regions • Ensure that only oneprocess is ever executing code in the critical section (Mutual exclusion – Mutex)

  25. Mutual exclusion Simple and Wrong int flag; void enter_region(int process) { while ( flag == 1 ); flag = 1; } void leave_region(int process) { flag = 0; }

  26. Alteration int turn; void enter_region(int process) { while ( turn != process ) ; } void leave_region(int process) { int other = 1 - process; turn = other; }

  27. Dekker’s Algorithm int favored_process; int interested[2]; void enter_region(int process) { int other = 1-process; interested[process] = TRUE; while ( interested[other] ) { if ( favored_process == other ) { interested[process] = FALSE; while ( favored_process == other ); interested[process] = TRUE; } } } void leave_region(int process) { int other = 1 - process; favored_process = other; interested[process] = FALSE; }

  28. Hardware assistance • Disable interrupts • Breaks process isolation • Turning off interrupts for any period of time is extremely hazardous. • test-and-set instruction, which makes testinga flag and resetting it’s value an atomic action.

  29. Resource contention and resource access control • Resources, Resource Access, and How Things Can Go Wrong: • The Mars Pathfinder Incident • Resources, Critical Sections, Blocking • Priority Inversion, Deadlocks • Nonpreemptive Critical Sections • Priority Inheritance Protocol • Priority Ceiling

  30. Mars Pathfinder Incident • Landing on July 4, 1997 • “experiences software glitches” • Pathfinder experiences repeated Resetsafter starting gathering of metrologicaldata. • Resets generated by watchdog process. • Timing overruns caused by priorityinversion.

  31. Priority inversion

  32. How to solve priority inversion • Priority inheritance • Priority Inheritance means that when a thread waits on a mutex owned by a lower priority thread, the priority of the owner is increased to that of the waiter. • Ceiling protocol • Priority Ceiling means that while a thread owns the mutex it runs at a priority higher than any other thread that may acquire the mutex • A beneficial feature of the priority ceiling solution is that tasks can share resources simply by changing their priorities, thus eliminating the need for semaphores

  33. Deadlock • In case you are using more than one mutex you can get deadlock

  34. Mailboxes • Known Memory Location with Key • Post - write to the location • Pend- read from the location • Scheduler allows Post and Pend operations • If no key in the mailbox, the task blocks • Accept or Check operation - don’t block if no key • Scheduler checks for keys and unblocks tasks • Mailbox Interruptmay force this (no busy waiting)

  35. Links • Embedded Operating System Links: http://www.vxworks.com/ http://www.qnx.com/ http://www.lynxos.com/ http://www.embedded-linux.org/ http://www.embeddedlinux.com/ http://www.mentor.com/embedded/vrtxos/

  36. Lab • Load the “echo” program to the evaluation board.

More Related