Summary
In this chapter, you were given a short introduction to PREEMPT_RT and other alternative solutions for real-time problems of the Linux kernel. We also explored a number of tools and applications that can be used for related real-time activities. However, this presentation would not be complete without references made to the Yocto Project with regards not only to the recipes of the PREEMPT_RT Linux kernel, but also to meta-realtime
layer applications. Developing an application suitable for a new context was also a concern, so this problem was tackled in the Linux real-time applications section. In the end, I hope that I was able to present a complete picture of this subject through links that were provided throughout the chapter to stir the curiosity of the reader.
In the next chapter, a short explanation of meta-security
and meta-selinux
layers will be given and a broader picture of the security requirements of the Linux ecosystem in general and the Yocto Project in particular, will...