Wind River | Date: 2015-09-29
A device, system, and method performs an adaptive simulation. The method performed by a similar includes receiving a release to be incorporated into a user device, the user device being a deployed device. The method includes receiving a profile of the user device, the profile being indicative of settings and usage information of the user device. The method includes generating a simulated user device corresponding to the user device, the simulated user device having a simulated profile corresponding to the profile. The method includes performing, by the simulator, a simulation for the release based upon the simulated user device and the simulated profile.
Wind River | Date: 2015-10-22
A system and method for implementing a generation lock for protecting a data structure is provide. The systems and methods synchronizes read and write transactions for a protected data structure in a multitasking environment and provides low latency and improved scalability. For example, a system and method for implementing a generation lock for protecting a data structure may be provided. The generation lock provides an improved mechanism for restricting access to a data structure that is typically read more often than written. Specifically, the generation lock provides a method for reading and writing to a protected data structures that has a low average latency as compared to traditional read/write semaphores. The generation lock also provides a mechanism in which the system is scalable, meaning that the addition of additional processor cores is capable of increasing the performance, e.g., rate of executing requests, of the system, and is not or is not substantially rate limited by a shared resource.
Wind River | Date: 2015-11-24
A device, system, and method processes a request for allocation of a resource of an electronic device utilizing a secure supervisor system call. The method includes receiving a call from a requesting application of the electronic device, the call indicating the request for allocation of the resource of the electronic device. The method includes determining whether the call is authorized to receive the resource of the electronic device. The determining includes determining whether the call includes a signature that is generated based upon a predetermined signature operation and determining whether the signature is valid based upon the predetermined signature operation when the call includes the signature. The method includes processing the request for the allocation of the resource when the call is determined to be authorized.
Wind River | Date: 2015-12-16
A device, system, and method detects a malicious module using a memory of an electronic device. The method performed by an electronic device includes generating a first parameter corresponding to first unallocated regions of the memory in a trusted state, wherein the memory in the trusted state includes at least one memory allocation, each memory allocation corresponding to a module or an action previously determined as trusted. The method includes generating a second parameter corresponding to second unallocated regions of the memory in a current state, wherein the memory in the current state corresponds to a subsequent allocation of the memory at a time subsequent to the trusted state. The method includes comparing the second parameter to the first parameter. The method includes indicating that the malicious module is detected in the second unallocated regions if the comparing step determines that the second parameter is different from the first parameter.
Wind River | Date: 2015-12-11
A device and method generates a graphical representation for memory leak detection. The method includes executing a selected application for a time period. The method includes determining a plurality of memory application programming interface (API) functions performed during the execution of the selected application in the time period. Each of the memory API functions request a chunk of a memory of the electronic device at a specified time. The method includes determining select ones of the memory API functions that do not release the respective chunk of the memory in the time period. The method includes generating the graphical representation including the selected memory API functions at the respective specified time for identification of a memory leak of the selected application.
Wind River | Date: 2014-05-16
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor, the set of instructions, when executed by the processor, causing the processor to perform operations including mapping a memory area storing a segment of code for a kernel of the system during an initialization time of a system. The operations also include executing the segment of code during the initialization time. The operations also include unmapping a portion of the memory area for the kernel after the segment of code has been executed.
Wind River | Date: 2014-04-10
A non-transitory computer-readable storage medium storing a set of instructions that are executable by a processor. The set of instructions, when executed by one or more processors of a multi-processor computing system, causes the one or more processors to perform operations including initiating a first processor of the multi-processor computing system with an operating system image of an operating system, the operating system image including a predetermined object map, initiating a second processor of the multi-processor computing system with the operating system image, placing a plurality of system objects with corresponding processors according to the predetermined object map, receiving a triggering event causing a change to the predetermined object map and relocating one of the system objects to a different one of the processors based on the change to the predetermined object map.
Wind River | Date: 2015-09-17
A method and system encrypts data in a least privileged operating system. The method includes determining a first encryption scheme to be used with software code to be mapped to a virtual memory. The method includes mapping a first portion of the virtual memory with the software code for access by a processor using the first encryption scheme. The method includes receiving a call for an entry point of the operating system. The method includes determining a second encryption scheme to be used with the entry point when mapped to the virtual memory. The method includes mapping a second portion of the virtual memory for executing entry point code associated with the entry point for access by the processor using the second encryption scheme. The processor executing the software code is permitted to access only data from the first and second portions of the virtual memory.
Wind River | Date: 2015-02-24
A system and method for configuring a virtual computing environment to operate in direct interrupt mode; receiving a triggering event triggering a transition from direct interrupt mode to virtual interrupt mode; copying contents of a physical interrupt queue into a virtual interrupt queue; acknowledging vectors present in the physical interrupt queue; and transitioning the virtual computing environment to virtual interrupt mode. The system includes a processor for performing the steps of the method.
Wind River | Date: 2015-01-15
A system and method for dynamically processing data across a plurality of processor cores in a multi-core computing environment for breaking down incoming data traffic into a plurality of segments and dynamically distribute and re-distribute the segments on an ongoing basis so as to allocate the handling of data traffic in a resource efficient manner.