A Partitioned, Multi-OS Architecture with Peer Subjects
Modern avionics systems increasingly require multiple operating environments running concurrently:
Many programs bring legacy RTOS investments (e.g., VxWorks®) that remain mission essential. Rather than forcing replacement, LYNX MOSA.ic ™ enables a true multi-subject architecture, allowing multiple operating systems, including LynxElement®, LynxOS-178®, VxWorks®, Yocto-Linux®, and Zephyr®, to operate side by side within a partitioned system.
This approach reflects open IMA principles: preserving application portability, encouraging architectural openness, and avoiding vendor lock-in.
The key is not the individual OS.
The key is the supervisory partitioning layer beneath them.
Architectural Model
In a MOSA.ic deployment, a separation kernel / hypervisor layer provides:
Above this layer, multiple subjects execute independently.
In this model:
No subject can interfere with the resources allocated to another subject.
Role of LynxOS-178 in This Model
LynxOS-178 typically serves high-assurance safety domains.
In a mixed-criticality configuration LynxOS-178:
If another subject (e.g., Yocto-Linux) is modified, the LynxOS-178 partition remains unaffected, provided partition boundaries remain unchanged.
This approach model strengthens DO-178C system safety arguments and aligns with IMA and DO-297 best practices.
Role of LynxElement in This Model
LynxElement may serve as a:
LynxElement is not the supervisory hypervisor in this configuration. It runs as a peer subject under the same partitioning controls as the other RTOS instances.
This allows:
Boot Flow in a Multi-Subject MOSA.ic System
Step 1: Platform Initialization
Firmware initializes hardware and verifies system integrity.
Step 2: Separation Kernel / Hypervisor Loads
The partitioning layer becomes the most privileged software component.
It establishes:
Step 3: Static Partition Configuration Applied
Example configuration:
Partition A: LynxOS-178
Cores: 0-1
Memory: 512 MB
Devices: ARINC 429, Flight I/O
Partition B: LynxElement
Core: 2
Memory: 256 MB
Devices: Ethernet, Storage
Partition C: VxWorks
Core: 3
Memory: 256 MB
Devices: Sensor Bus
Partition D: Yocto-Linux
Shared core windowed schedule
Memory: 256 MB
Devices: Display Controller
Step 4: Subject Launch
Each OS image is loaded into its assigned memory and executed.
From each subject’s perspective:
Isolation is enforced by hardware and hypervisor policy.
Time and Space Partitioning
Space Partitioning
Time Partitioning
Depending on system design:
This prevents timing interference across subjects.
Inter-Subject Communication
Subjects may communicate only through defined channels such as:
Example:
[LynxOS-178] <---- shared memory ----> [LynxElement]
[LynxElement] <---- message channel ----> [Yocto-Linux]
All communication paths are:
DO-178C Considerations (High-Level)
This peer-subject model supports certification objectives through:
Clear Isolation Boundaries
Safety-critical software (e.g., in LynxOS-178) is protected from lower-criticality domains.
Change Containment
Changes inside a Yocto-Linux or Zephyr partition do not propagate into the LynxOS-178 partition unless shared interfaces are modified.
Deterministic Scheduling
Static configuration supports timing analysis and worst-case execution validation.
Configuration Control
Partition definitions are part of the certified baseline.
The separation kernel provides the enforcement mechanism; each RTOS remains responsible for its internal certification scope.
Why This Matters for MOSA
MOSA is not about replacing operating systems. It is about enabling controlled coexistence.
All within one deterministic, policy-driven framework.
The Architectural Principle
The value of MOSA.ic is not that it dictates which RTOS you must use.
It ensures that:
The operating systems are peers.
The architecture is the authority.
Want to learn more about how Lynx can help you? Connect with us.