A priority inheritance-based inversion control methodology for general resource access problems

Liubo Chen, Masaaki Mizuno, Gurdip Singh

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

Real-time concurrent systems typically involve a large number of components interacting with one another in complex ways. In such systems, proper and often complex and elaborate resource access policies must be incorporated to eliminate undesirable executions and to ensure maximum possible concurrency. In this paper, we present a technique for priority inversion control when using such complex resource access policies. We present a systematic approach to design resource access control code based on a formal development methodology called the global invariant approach, along with appropriate priority inversion control code. Our solution relies only on mutex locks with priority inversion control, which are found in many real-time operating systems, and priority-based binary semaphores; therefore, our solution can be implemented on existing infrastructures. We present an implementation of our solution on VxWorks.

Original languageEnglish (US)
Title of host publicationProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium
Pages202-210
Number of pages9
StatePublished - 2004
Externally publishedYes
EventProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium - Toronto, Canada
Duration: May 25 2004May 28 2004

Publication series

NameProceedings - IEEE Real-Time and Embedded Technology and Applications Symposium
Volume10

Other

OtherProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium
Country/TerritoryCanada
CityToronto
Period5/25/045/28/04

Keywords

  • Global invariant based synchronization
  • Priority inheritance protocol
  • Priority inversion control
  • Resource Access Control

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A priority inheritance-based inversion control methodology for general resource access problems'. Together they form a unique fingerprint.

Cite this