Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for protecting the memory occupied by a real-time operating system under a multi-system

A technology of real-time operating system and general operating system, which is applied in the direction of memory system, instrument, electrical digital data processing, etc., and can solve the problem of unsmooth program execution, memory availability, affecting program reliability, system robustness, real-time performance, and increasing system complexity and other issues to achieve the effect of memory isolation, simple operation, and low memory overhead

Active Publication Date: 2016-06-08
ZHEJIANG UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims at increasing the memory protection function in the prior art, which will affect the reliability of the program, the robustness of the system, and the embedded real-time performance, and will increase the complexity of the system, resulting in unsmooth program execution and the generation of available space in the memory, etc. , provides a method for protecting the memory occupied by the real-time operating system under multiple systems, isolates the virtual address spaces used by the real-time operating system and the common operating system, and provides protection for the real-time operating system without increasing the complexity of the system. memory usage protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for protecting the memory occupied by a real-time operating system under a multi-system
  • A method for protecting the memory occupied by a real-time operating system under a multi-system
  • A method for protecting the memory occupied by a real-time operating system under a multi-system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] This implementation mode further elaborates on the technical solution of the present invention by taking Android and SmartOSEKOS simultaneously running on an ARM dual-core processor as an example.

[0023] The overall operating environment of this embodiment is as follows:

[0024] Two operating systems, Android and SmartOSEKOS, respectively run on the two cores of the hardware platform based on the ARM dual-core processor, and the two operating systems share the physical memory of the hardware platform. Among them, SmartOSEKOS is an embedded real-time operating system that complies with the OSEK / VDX standard and is independently developed by the Embedded Engineering Center of Zhejiang University according to the needs of national automotive electronics software development. OSEK / VDX is an industry standard for the open structure of automobiles proposed by the international automobile industry to improve the reusability of automobile electronic software and reduce the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method of used internal memory of a real-time operating system (RTOS) in multiple systems. The process of the protection method includes: data needed by address mapping operation are initialized on a central processing unit (CPU) which is provided with memory management units; according to the size of the used internal memory of the data, the code segment and the data segment of the data are confirmed in a continuous virtual address section in a virtual address space by the RTOS; and according to the mechanism provided by the memory management units, the virtual address section used by the RTOS is mapped to an identical unused physical page frame through a common operating system. The protection method of the used internal memory of the RTOS in the multiple systems has the advantages of being small in memory cost and easy to operate, system operation efficiency is not reduced and time cost of the system is not increased. The virtual address section used by the RTOS is mapped to the physical page frame through the common operating system, memory isolation is achieved without large change of the operating system and addition of extra modules, and only space cost of one page of the physical page frame exists.

Description

technical field [0001] The invention belongs to the field of computer memory management, in particular to a method for protecting the memory occupied by a real-time operating system under multiple systems. Background technique [0002] In the embedded field, it is a trend that multiple operating systems run on one hardware platform at the same time, and real-time operating systems are a very important category in these operating systems. The real-time operating system has the characteristics of timely response and high reliability, which cannot be provided by ordinary operating systems. Combining the real-time operating system and the ordinary operating system can complement each other's advantages, provide more functions, and obtain higher hardware utilization. However, running multiple systems on the same hardware platform also brings some system security issues, especially memory security issues. Memory protection is an important research content of real-time operating ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06G06F12/1009
Inventor 杨国青李红吴朝晖刘健全
Owner ZHEJIANG UNIV