Font Size: a A A

Embedded Operating System Priority Inversion Real-time Design Patterns And Method Of Implementation And Research

Posted on:2012-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:L N YangFull Text:PDF
GTID:2178330332492725Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Embedded real-time systems, compared with the traditional operating system have many constraints, the task not only to meet the requirements of correctness, but also to meet the real-time standards. With the automation of industrial production, technological development trend of modernization, it brought new opportunities to the embedded system's development and application, but also brought a higher demand.In priority-based preemptive real-time operating system kernel, prone to the phenomenon of priority inversion, high-priority task will be blocked by a low priority task in an uncertain time, it will affect the safety and stability of the system seriously, Therefore, patterns of resource management is especially important in real-time systems.In this paper, the research object isμC/OS-Ⅱembedded real time operating system, the focus is the priority inversion model on resource management, first introduced the development and production of embedded systems, real-time operating system and embedded operating systems. and then based on the introduce ofμC/OS-Ⅱ, Linux, VxWorks and other popular operating systems, analyzed the approach of priority inversion in these common operating systems. Taken focused on the real-time operatingμC/OS-Ⅱsystem depression priority inversion method, disable interrupts law, priority inheritance protocol,, priority ceiling protocol three methods, and analyzed and compared these three methods, the results show that the three methods are inadequate.On the based ofμC/OS-Ⅱ, analyzed its core, increasing the shared resource control block data structure and shared resource control block list, used to record the properties of shared resources. In explaining the reasons of the deadlock and priority inversion, then proposed priority inversion and deadlock resource management pattern based on priority inheritance protocol. By shared resources sorting methods, with the Source ID from low to high be accessed finally, by experiment model test and verity, the method to some extent inhibited the priority inversion and deadlock occurs.
Keywords/Search Tags:Real-time System, Priority Inversion, Priority Ceiling, Priority Inheritance, Deadlock
PDF Full Text Request
Related items