Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Warning
titleNotice

This table is now somewhat outdated and not used to drive the work any longer. 
Please review the working document for the up to date status, or the JIRA kanban view which is used for planning the content.
NOTE: All the project's JIRA tickets are public but the  JIRA kanban view  for can only be viewed when logged in (This is a JIRA limitation we cannot change)
Therefore to participate in the planning of AVPS development we suggest you request a login by selecting "Sign Up" in the JIRA login page

The key challenge for defining a shared virtual platform definition is to first identify the various device driver types such a platform must provide, and to evaluate if existing work so far (e.g. VIRTIO) covers what the automotive industry needs: 

...

(Virtual) DeviceExplanation

Champion
+ interested people

Completeness / Applicability evaluation

(tick) (warning) (error)

Comments and discussionSpec completeInclude in draft 1

Ticket to track completion

Block StorageFlash/Disk/persistent storage

Kai

(tick)

Included also automotive persistence requirements.


(tick) ready for reviewYes
Network

Access to (shared) physical ethernet

and guest-to-guest communication


(tick)

Think about writing info how to share a physical network in practice

(Create bridge between virtual device and physical)

(tick)

(warning) vsock should be moved to separate section?  Agreed.

(warning) WiFi seems to be not well covered.  Shall we wait on including it?



Yes
(warning) except WiFi - leave comment that it is work in progress)




ConsoleText terminal inputGunnar

(tick)


(tick) ready for review

Yes

Jira
serverJIRA
serverId121ddff2-c571-320f-9e4d-d5b9371533bd
keyHV-9

cryptoAccess to cryptographic services
(hardware accelerated)

(tick) With new features, it is enough.
We also added some

Now includes:

  • RNG - OK. just clean up discussion text.
    TEE (tick)
    RPMB - open question, leave it as WIP in draft.
    Crypto acceleration (blue star) new text is OK for draft.

(tick) ready for review

Discussion part needs cleanup

Yes
GPUGraphics hardwareMatti/Dmitry

See GPU Summary Graphics Virtualization, VIRTIO GPU Operation Highlights pages

(tick) Draft spec – requirements written

(warning) Uncertainty (and lots of ongoing development) around 3D APIs - Vulkan progress, etc.

See GPU SummaryGraphics Virtualization page

and requirements in spec draft

(blue star) Still a moving target (3D).  This is reflected in specification


(tick) 2D

3D:  Proposal: include a discussion but requirements are not in Draft.

Dmitry Morozov please finish according to this.

3D requirements that are not accepted upstream were dropped.

Check status of EDID introduction.


InputTraditionally keyboard/mouse/etc
- for automotive = expanded?
MattiMatti

Now part of VIRTIO 1.1

Mouse/touch events may need to remap coordinates in combined virtual systems but interface may still not be affected by this.


(error)Yes
vsockCommunication between guest (VM)
and host (hypervisor)

(tick)Covered in networking chapter - to be put in its own (sub)chapter.

(tick) ready for review


Yes

Filesystem

9pfs and other

9P = protocol to expose host (hypervisor)
file systems to the guest. FS=filesystem.
Gunnar

Completeness: Protocol: (tick), VIRTIO spec: (warning) (see comment)

Need in Embedded/Automotive: (tick) None? Can we find a use-case?

Applicability(tick) For what it does, seems ok. But might not be really needed and therefore "not applicable". Is there something else/more needed?

Links: Virtio 1.0 spec : {PCI-9P, 9P device type}.
Kernel support: Xen/Linux 4.12+ FE driver
Xen implementation details

A note on its documentation/definition not being very precise

A set of man pages seemingly defining P9? intro, others

QEMU instruction how to set up a VirtFS (P9).
Example/info how to natively mount a 9P network filesystem,
Source code for 9pfs FUSE driver

(tick) ready for review

(cut down chapter, should be OK)


(question) OK to have such a verbose chapter?  Maybe some more work...


Yes
vIOMMU

IOMMU coordinates of DMA devices'
connection to memory.

Dmitry

See IOMMU Summary page

Applicability:

(tick) Limit guest devices' scope to access system memory during DMA

(tick) Enable scatter-gather accesses due to remapping (DMA buffers do not need to be physically-contiguous)

(question) Nested virtualization. Any use-cases for automotive?
(tick) Group conclusion: Not needed nested virtualization - however there are still two levels because applications in guest are used to set up IOMMU (protection between applications) and then the VMs themselves are another level.   These levels drive the need for a virtualized IOMMU layer (and/or hardware support for the same)

ARM is actively working on the specification, more features are coming.

Nested virtualization? The use of Linux Containers inside a VM was mentioned. That in itself is not really nested virtualization. Namespace-based containers, is just a kernel feature providing separation independent of a hypervisor. However, Kata Containers is an approach to tie Linux containers into a hypervisor layer, making them "fully" virtualized. A theoretical situation arises that involves the use of Kata Containers on a Linux system that itself already runs in a VM. That might constitute an example of nested virtualization, but it was decided that this is not a mainstream idea, possibly not supported or feasible, and in each case likely more trouble than it is worth. "Flattening" the virtualization approach so that all units still run on one hypervisor is a likely outcome. Further research into partitioning methods is likely but for now this falls outside of a mainstream automotive virtual platform definition. We highlighted that Linux containers in their normal namespace based implementation are already a very useful system partition tool and it can be trivially applied also if the Linux kernel runs in a VM.

(warning)  Chapter has been written.

(warning) Xen working on more secure implementation (memory visibility problem, security of VIRTIO approach) - want to keep this open requirement wise to have flexibility.

(warning) Latest proposal to VIRTIO was close to go in but withdrawn to address final comments.


But:

Need a group review of text (verbose) and consider the comments here on the left. 

And also  VIRTIO parts have not been merged to official spec version.

(error) Not final

Include discussion and what we have learned.

TBD.
Dmitry Morozov Artem Mygaiev

Requirements to be removed? 






Audio
Matti

 (warning)  VIRTIO proposal is being discussed - still pending 2019-09-25

Some info on Linux/Xen code here:
HVWS: Xen input and experience on Audio, Display, Input and TEE

Artem Mygaiev - can this comment be removed?  Should it affect the spec?



(warning) Information is quite complete.  and good understanding written.  Needs cleanup to become a proper chapter

Requirement set is NOT ready (merged).

(blue star) Leave comment and/or discussion and future outlook but not requirement.


Sensors

Automotive sensors:


Artem

(error)  Not covered by VIRTIO specifically.
Considering SCMI over VIRTIO as a future standard.


Artem proposed that Systems Control Management Interface (SCMI) protocol as a flexible and an appropriate abstraction for sensors. It is also appropriate for controlling power-management and related things. The hardware access implementation is according to ARM offloaded to a "Systems Control Processor" but this is a virtual concept. It could be a dedicated core in some cases, perhaps in others not. EPAM/Xen tried out putting code in ARM-TF, to act as this SCP.

SCMI destined (?) to become a ARM-wide standard in a currently fragmented reality.

Presentation attached (PDF)

Upper protocol defined, but could imagine different lower transport. One mailbox-style transport is kind-of defined by ARM spec? Discussion if VIRTIO transport would be appropriate. A "SCMI device" type added to VIRTIO?

Challenges:

  • Current situation in ARM is fragmented with many overlapping unique APIs across chip vendors.
  • Is this doable also on x86, and is it likely to be adopted?
  • Discuss applicability beyond "sensors" and where boundaries are drawn.

Reference:

What about PINCTRL, and handling the many multiplexed pins in a modern SoC. Any remaining need for lower-level protocols for accessing/virtualizing hardware?



CPUs/SoCs have "internal" sensors too. Relating to temperature and power mgmt. Some internal control tweaks for power management (core frequency / voltage) are like tiny internal actuators. Virtual access to those? Same or different APIs?


Some OS have requirements that must be met by "platform" - eg. Android requires orientation sensor.


(warning) Good work done. 

Split out GPIO to separate chapter. 

Placeholder also for describing HW passthrough (in general)

All 3 need another review and cleanup to be complete.

(warning) Consider platform requirement for sensors that must exist (for Android etc.)

No requirements possible in draft spec.
Possibly some of discussion and future outlook...

Media Acceleration (VPUP, IPU, CODEC)Hardware support for codec/processing

Artem

→ Dmitry

(warning)  Proposal to VIRTIO might come (OpenSynergy)


VPU
= "AI" CPU optimized for visual recognition



Gunnar AnderssonPlease check status - in VIRTIO mailing list...

(error) Not ready in time.  Placeholder referencing currrent proposals.

coprocessors and other
dedicated hardware features

Abstraction of SoC specifics
DSPs
Tensor processors

(error)  Not really in VIRTIO scope

Matti: virtualize functions, not devices.

Gunnar: Analysis might extract some functions out of these...


(error) (not sure yet if we expect to cover it)(error)
USB



Example Assigning Host USB device to a Guest VM in KVM, here:

https://www.linux-kvm.org/page/USB_Host_Device_Assigned_to_Guest


Which use cases do we want to address?

•USB 2.0 (EHCI controller)
•USB 3.0 (xHCI controllers will replace ECHI)
•USB C
•Host only
•Device Classes:

  • Mass storage. Enable use of USB device with volume provider
  • Communications (e.g. serial, Ethernet)
  • Human interface (e.g. keyboard, mouse)

•On-The-Go (system can function as both USB host and USB device)
•Hot-plug (partial support):

  • Static configuration of device “tree”. A device can be plugged into a port. Dynamically detect device type.
  • Device tree cannot grow dynamically, i.e. cannot plug in a hub

(warning) Needs update – see minutes.


(error) placeholder for future

Other Serial devices?

... and LIN bus




(error) VIRTIO applicability needs analysis

(error) Spec chapter needs to be written.

LIN-bus:

  • Source code for linux-lin driver (for Linux, not necessarily virtual environment):
  • Paper by Czech Technical University & Volkswagen Group Research:
    LIN based on SocketCAN → 1. OSADL article, 2. paper (PDF).
    • The paper concludes that LIN data frames are similar enough to CAN frames that it can reuse CAN software infrastructure (such as the SocketCAN standard). LIN is a serial bus, implemented with a UARTs, and therefore standard UART device drivers would be used. For virtual environments, we can rely on the same conclusions, and therefore refer to the answer given for CAN.
    • On the other hand, LIN is most popular for its simplicity / low cost (even lower than CAN) and used in very simple ECUs or to/from input devices like switches, knobs and buttons. On the larger CPU it is likely to be run by a separate dedicated microcontroller, or at least small on-chip CPU core. Therefore it can often be considered out-of-scope for the CPU that implements virtualization.

UARTs are normally passed through (VM has access to memory mapped hardware) or forwarded (hardware access is done by HV and some abstract interface provided to the VMs) = virtio-console standard.

SBSA specifies some access to UART but it seems tailored for debugging.

Virtio console starts too late.  What about early access for logging boot issues.  There is an early driver for console (in Linux) - uses configuration registers as a FIFO, output only.   Something nicer is desired.

PL011 = ARM fast model UART controller, reference implementation in versatile-express.  Provided in RPi and some other hw and virtual platforms.  

Unknown User (anup)  seems to have added emergency-write standard to the VIRTIO spec?  Follow up with Anup.



(error) TODO


LIN should not be mentioned in spec.
Comment on implementation later after analysis.

Fold discussion into console chapter.

(warning) Uncertain what parts are specified and implemented (in VIRTIO and Linux)




(tick) Cover this in console chapter

emergency-write / early debugging could be left out if we are not done with it.




CAN

(error)


virtio-can: VIRTIO-based CAN driver(error) Decide opinion and write chapter

(warning) Possible, no firm standard.  No specification - just an example driver implementation.

Unknown User (anup) - can we summarize again?


Time Sensitive Networks

Nikola (TSN)

Need new volunteer to complete it, perhaps from GHS?

The required features are not present in the network virtio devices as of virtio 1.0.


(warning) Is this → applicable enough to move into specification as requirements? --> 

Must have requirements:

  • IEEE 802.1AS compatible egress and ingress timestamps on ethernet frames available in the virtio consumer OS

Good to have:

General architectural considerations:

  • What if there is more than one consumer of the IEEE 802.1AS defined network timebase on the same system?
(error)

(warning) Comment on the possibility of implementing TSN is not prevented, (even without a virtual interface standard)

Need some more confirmation



Bluetooth

OpenSynergy with BT experience ?

(error) Not in VIRTIO scope



Virtualization of BT hardware might not be required.  However, commenting on various system designs seems appropriate.

Example: There exists an interface for virtualized audio device (virtio-sound), but Bluetooth is also an audio device (among other things...)  What does this mean for how to build an architecture that (for example) uses both virtualization for audio, and bluetooth technologies.

(star) Write at least a Discussions chapter.
It is an important topic, common topic.

The HCI interface is the likely level of passthrough or virtualization.  The VM should have access to HCI since it can then implement standard Bluetooth stacks on top of it.

Not ready in time for first draft.

(tick) Must be mentioned, at least a comment and future plan.


Memory Balloon Device
Gunnar(tick) In VIRTIO.  Applicability to automative is questionable.

(warning) May be partly applicable - I could write something here to get us started. - Gunnar

RAM device is being discussed as a better solution later on.
Proprietary protocols.


(error) TODO(warning) Not strictly necessary in the first draft version

Random Number Generator




(tick)Covered in the Crypto chapter.(tick)(tick)
Watchdog

Very important for embedded systems... Let's see what is there and what we need to do.


SBSA has a generic interface, it should be the closest one.

Aim for simple interface.

Avoid VIRTIO/virt-queue type solution...

http://infocenter.arm.com/help/topic/com.arm.doc.den0029c/Server_Base_System_Architecture_v6_0_ARM_DEN_0029C_SBSA_6_0.pdf

(error)  Write chapter.
Adam Lackorzynski


(tick) Want to include

(warning) TODO


...