Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for positioning specific memory illegally rewritten by function

A function and memory technology, which is applied in the field of locating a specific memory that is illegally rewritten by a function, can solve problems such as not prohibiting other tasks from running, tasks cannot be run, and external events of the system clock cannot be handled correctly, so as to achieve the effect of improving stability

Inactive Publication Date: 2010-07-14
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above three methods, the prohibition of preemption will temporarily invalidate the kernel task scheduling, but other tasks cannot run except for the interrupt program; when using semaphores to protect shared memory, other tasks are not prohibited from running, only access The suspension of tasks to shared memory resources, although it has little impact on the real-time performance of the system, cannot prevent the interrupt service program from accessing critical resources; while turning off interrupts is more effective than the above two methods, it can completely prevent other The conflicting access of tasks or interrupt service programs has the highest execution efficiency, but the interrupt can only be turned off for a short time, otherwise the system clock and other external events will not be processed correctly, thus greatly reducing the real-time level of the system
[0005] In short, the protection of specific shared memory through the above three methods has its own shortcomings. Therefore, it is necessary to find a more effective method to prevent specific memory from being illegally rewritten

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for positioning specific memory illegally rewritten by function
  • Method for positioning specific memory illegally rewritten by function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Hereinafter, the method for locating a specific memory illegally rewritten by a function of the present invention will be described in detail with reference to the accompanying drawings.

[0020] The core idea of ​​the present invention is: for the embedded real-time operating system, the task is represented as a function, and this function is the entry function of the task, each task has its own stack, and the operating system uses preemptive scheduling or round-robin scheduling to perform Scheduling, all tasks run in a unified linear address space. Therefore, many debugging functions in the system can be used to view the information when the system is running abnormally, such as when the task is suspended, and locate the cause of the task suspension based on this information, so as to quickly solve the problem.

[0021] Hereinafter, only the VxWorks system is taken as an example to describe the method for locating a specific memory illegally rewritten by a function of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method that a positioned specific memory is illegally rewritten by a function, wherein, during the running of an embedded real-time operating system, exception processing of the function when the specific memory is rewritten is set in the specific memory function body which is not allowed to be visited, and corresponding processing and positioning are carried out when thespecific memory is rewritten in the function. The method that the positioned specific memory is illegally rewritten by the function can better avoid the condition that the positioned specific memory is illegally rewritten but unknown to people, so as to improve the stability of the system.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for locating specific memory illegally rewritten by a function. Background technique [0002] In the field of communication technology, most products use embedded real-time operating systems, such as Linux, VxWorks and other operating systems. In the current data communication products, such as routers, switches, and broadband access servers, VxWorks is used as the cornerstone of technical development. The memory management adopts the flat (FLAT) memory mode based on VxWorks. All global variables, queues, Linked lists and pointers can be directly accessed by all tasks. Although this can improve the efficiency of communication between processes or tasks, it is also likely to cause abnormal system operation. [0003] In order to avoid the system instability caused by the above-mentioned shared memory, it is usually considered to protect the shared memory by prohibiting preempti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/48
Inventor 杨利君石江涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products