Virtualization supporting guest operating systems using memory protection units
A memory protection and memory technology, applied in memory systems, preventing unauthorized use of memory, instruments, etc., can solve problems such as reducing the cost of data processing systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] figure 1 A system supporting multiple virtual real-time processors and a virtual processor using virtual memory is schematically shown. The hypervisor 2 works at the second exception level EL2 and is used to control switching between virtual processors and to protect / isolate these virtual processors from each other. The first virtual real-time processor uses the first real-time operating system 4 to support the running of real-time applications 6 . When the real-time application 6 and the real-time operating system 4 specify a memory access operation, they both generate a physical address PA. The physical address PA generated by the real-time application 6 is subject to a first level of memory protection (on behalf of the guest real-time operating system 4 ) performed by a first memory protection unit, which is controlled by the real-time operating system 4 . If the memory access request is permitted by this first set of permissions, the memory access operation is als...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com