Blog

Open IMA: Running Third-Party OS on LYNX MOSA.ic™

Written by Lynx | Mar 19, 2026 6:39:30 PM

A Partitioned, Multi-OS Architecture with Peer Subjects  

Modern avionics systems increasingly require multiple operating environments running concurrently:

Many programs bring legacy RTOS investments (e.g., VxWorks®) that remain mission essential. Rather than forcing replacement, LYNX MOSA.ic enables a true multi-subject architecture, allowing multiple operating systems, including LynxElement®, LynxOS-178®, VxWorks®, Yocto-Linux®, and Zephyr®, to operate side by side within a partitioned system.

This approach reflects open IMA principles: preserving application portability, encouraging architectural openness, and avoiding vendor lock-in.

The key is not the individual OS.
The key is the supervisory partitioning layer beneath them.

 

Architectural Model  

In a MOSA.ic deployment, a separation kernel / hypervisor layer provides:

  • Time partitioning
  • Space partitioning
  • CPU core allocation
  • Device assignment
  • Controlled inter-subject communication

Above this layer, multiple subjects execute independently.

 

High-Level Architecture  

In this model:

  • LynxOS-178 is one subject
  • LynxElement is one subject
  • VxWorks, Yocto-Linux, Zephyr are peer subjects
  • All are equally isolated by the underlying partitioning layer

No subject can interfere with the resources allocated to another subject.

 

Role of LynxOS-178 in This Model  

LynxOS-178 typically serves high-assurance safety domains.

In a mixed-criticality configuration LynxOS-178:

  • Hosts safety-critical applications, including DAL A
  • Run in its own memory region
  • Supports multiple instances across multiple CPU cores
  • Operates independently of other RTOS domains

If another subject (e.g., Yocto-Linux) is modified, the LynxOS-178 partition remains unaffected, provided partition boundaries remain unchanged.

This approach model strengthens DO-178C system safety arguments and aligns with IMA and DO-297 best practices.

 

Role of LynxElement in This Model  

LynxElement may serve as a:

  • Secure services domain
  • Systems management partition
  • I/O consolidation domain
  • Gateway or middleware environment
  • Safety-critical isolation region for high-change components

LynxElement is not the supervisory hypervisor in this configuration. It runs as a peer subject under the same partitioning controls as the other RTOS instances.

This allows:

  • Independent lifecycle management
  • Controlled communication channels
  • Clear separation between safety and non-safety domains

 

Boot Flow in a Multi-Subject MOSA.ic System  

Step 1: Platform Initialization

Firmware initializes hardware and verifies system integrity.

Step 2: Separation Kernel / Hypervisor Loads

The partitioning layer becomes the most privileged software component.

It establishes:

  • Memory regions
  • Core allocation
  • Device mapping
  • Interrupt routing
  • Scheduling configuration

Step 3: Static Partition Configuration Applied

Example configuration:

Partition A: LynxOS-178
Cores: 0-1
Memory: 512 MB
Devices: ARINC 429, Flight I/O

Partition B: LynxElement
Core: 2
Memory: 256 MB
Devices: Ethernet, Storage

Partition C: VxWorks
Core: 3
Memory: 256 MB
Devices: Sensor Bus

Partition D: Yocto-Linux
Shared core windowed schedule
Memory: 256 MB
Devices: Display Controller

Step 4: Subject Launch

Each OS image is loaded into its assigned memory and executed.

From each subject’s perspective:

  • It owns its assigned cores/time window
  • It cannot access other memory
  • It cannot modify global configuration

Isolation is enforced by hardware and hypervisor policy.

 

Time and Space Partitioning  

Space Partitioning

  • Fixed physical memory allocation
  • No dynamic cross-access
  • IOMMU-protected DMA
  • Device ownership statically defined

Time Partitioning

Depending on system design:

  • Dedicated core model (strong isolation)
  • Static cyclic scheduling model (IMA-style)

This prevents timing interference across subjects.

 

Inter-Subject Communication  

Subjects may communicate only through defined channels such as:

  • Configured shared memory buffers
  • Message queues mediated by the hypervisor
  • Virtualized network interfaces
  • Health monitoring signals

Example:

[LynxOS-178] <---- shared memory ----> [LynxElement]

[LynxElement] <---- message channel ----> [Yocto-Linux]

All communication paths are:

  • Declared at configuration time
  • Access-controlled
  • Size- and rate-limited
  • Deterministic

DO-178C Considerations (High-Level)

This peer-subject model supports certification objectives through:

Clear Isolation Boundaries

Safety-critical software (e.g., in LynxOS-178) is protected from lower-criticality domains.

 

Change Containment

Changes inside a Yocto-Linux or Zephyr partition do not propagate into the LynxOS-178 partition unless shared interfaces are modified.

 

Deterministic Scheduling

Static configuration supports timing analysis and worst-case execution validation.

 

Configuration Control

Partition definitions are part of the certified baseline.

The separation kernel provides the enforcement mechanism; each RTOS remains responsible for its internal certification scope.

 

Why This Matters for MOSA

MOSA is not about replacing operating systems. It is about enabling controlled coexistence.

This architecture allows:

  • LynxOS-178 for high-assurance domains
  • LynxElement for modular integration
  • VxWorks for legacy subsystems
  • Yocto-Linux for displays
  • Zephyr for embedded peripherals

All within one deterministic, policy-driven framework.

 

The Architectural Principle

The value of MOSA.ic is not that it dictates which RTOS you must use.

It ensures that:

  • No single RTOS decision locks the entire platform
  • Domains remain isolated
  • Hardware refresh is manageable
  • Certification scope remains bounded
  • Third-party software can be integrated safely

The operating systems are peers.

The architecture is the authority.

Want to learn more about how Lynx can help you? Connect with us.