High-safety key task scheduling method based on inter-core migration

A task scheduling and task technology, applied in the direction of program startup/switching, resource allocation, program control design, etc., can solve problems such as poor security, and achieve the effect of improving security and increasing the success rate of scheduling

Active Publication Date: 2020-03-13
NORTHWESTERN POLYTECHNICAL UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the disadvantages of poor security of existing high-security-critical task scheduling methods, the present invention provides a high-security-critical task scheduling method based on inter-core migration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-safety key task scheduling method based on inter-core migration
  • High-safety key task scheduling method based on inter-core migration
  • High-safety key task scheduling method based on inter-core migration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] refer to figure 1 . The specific steps of the method for scheduling high-security critical tasks based on inter-core migration in the present invention are as follows:

[0022] Step 1. Get the unschedulable task w h The current processor π h (LO) and its processor mapping π in the high safety critical mode HI-cri h (HI).

[0023] Step 2. Judgment task w h Processor Mapping π in Low Safety Critical Mode LO-cri h (LO) and Processor Mapping in High Safety-Critical Modes π h Whether (HI) are the same, if they are the same, it means that the task cannot be migrated between cores, and skip to step 5; if not, it means that the task can be migrated, and skip to step 3.

[0024] Step 3, assign task w h join processor pi h (HI) task queue, calculate π by formulas (1) and (2) h (HI) task set utilization U h , judging processor π h (HI) task set utilization U h Whether it is greater than 1, if it is greater than 1, it means that the task w h Migrate to Processor π h ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-safety key task scheduling method based on inter-core migration. The method is used for solving the technical problem that an existing high-safety key task scheduling method is poor in safety. The method comprises the steps of recording processor mapping of a task in a high-security key mode as pi HI, and recording processor mapping of the task in a low-security keymode as pi LO; when the system is improved from a low-security key mode to a high-security key mode, judging whether a task w which cannot be scheduled on the pi LO can be scheduled after being migrated to the pi HI, if the schedulability is met, migrating the task w to the pi HI for scheduling, and finishing inter-core migration work; and if the task ws meeting the conditions do not exist, judging that the task w cannot be subjected to inter-core migration, and inter-core migration fails. According to the method, the advantages of the multi-core processor are brought into full play on the unschedulable high-security key tasks on the current processor, the unschedulable tasks are schedulable on the new processor through inter-core migration, the scheduling success rate of the high-securitykey tasks is increased, and the security of the system is improved.

Description

technical field [0001] The invention relates to a scheduling method for high-safety critical tasks, in particular to a scheduling method for high-safety critical tasks based on inter-core migration. Background technique [0002] The article "Multiprocessor Scheduling of Precedence constrained Mixed-critical Jobs" published in IEEE International Symposium on Realtime Distributed Computing 2015 Edition 198-207 proposes a scheduling method for Mixed-Criticality Priority Improvement (MCPI). In this method, a table is used to store the priority of tasks, and each time a task is scheduled, the priority table needs to be queried first to schedule the task with the highest priority. When the safety-critical level of the system is converted, the priority of the task will be reassigned, and the priority of the high-safety-critical task will be increased so that it can be scheduled first. [0003] Although this method can guarantee the scheduling success rate of high safety-critical t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/48G06F9/50
CPCG06F9/4806G06F9/485G06F9/5038Y02D10/00
Inventor 朱怡安李孟豪李联史先琛
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products