Virtualization supporting guest operating systems using memory protection units
A memory protection and memory technology, applied in memory systems, preventing unauthorized use of memory, instruments, etc., can solve problems such as reducing the cost of data processing systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0053] figure 1 A system supporting multiple virtual real-time processors and a virtual processor using virtual memory are schematically shown. The hypervisor 2 works at the second abnormal level EL2, and is used to control switching between virtual processors and to protect / isolate these virtual processors from each other. The first virtual real-time processor uses the first real-time operating system 4 to support the running of the real-time application 6. When the real-time application 6 and the real-time operating system 4 specify a memory access operation, they both generate a physical address PA. The physical address PA generated by the real-time application 6 is protected by the first level of memory protection (representing the guest real-time operating system 4) executed by the first memory protection unit, and the first memory protection unit is controlled by the real-time operating system 4. If the memory access request is permitted by the first set of permissions, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap