Wind River | Date: 2015-09-29
A device, system, and method performs an adaptive simulation. The method performed by a similar includes receiving a release to be incorporated into a user device, the user device being a deployed device. The method includes receiving a profile of the user device, the profile being indicative of settings and usage information of the user device. The method includes generating a simulated user device corresponding to the user device, the simulated user device having a simulated profile corresponding to the profile. The method includes performing, by the simulator, a simulation for the release based upon the simulated user device and the simulated profile.
Wind River | Date: 2015-10-22
A system and method for implementing a generation lock for protecting a data structure is provide. The systems and methods synchronizes read and write transactions for a protected data structure in a multitasking environment and provides low latency and improved scalability. For example, a system and method for implementing a generation lock for protecting a data structure may be provided. The generation lock provides an improved mechanism for restricting access to a data structure that is typically read more often than written. Specifically, the generation lock provides a method for reading and writing to a protected data structures that has a low average latency as compared to traditional read/write semaphores. The generation lock also provides a mechanism in which the system is scalable, meaning that the addition of additional processor cores is capable of increasing the performance, e.g., rate of executing requests, of the system, and is not or is not substantially rate limited by a shared resource.
Wind River | Date: 2015-11-24
A device, system, and method processes a request for allocation of a resource of an electronic device utilizing a secure supervisor system call. The method includes receiving a call from a requesting application of the electronic device, the call indicating the request for allocation of the resource of the electronic device. The method includes determining whether the call is authorized to receive the resource of the electronic device. The determining includes determining whether the call includes a signature that is generated based upon a predetermined signature operation and determining whether the signature is valid based upon the predetermined signature operation when the call includes the signature. The method includes processing the request for the allocation of the resource when the call is determined to be authorized.
Wind River | Date: 2014-05-16
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor, the set of instructions, when executed by the processor, causing the processor to perform operations including mapping a memory area storing a segment of code for a kernel of the system during an initialization time of a system. The operations also include executing the segment of code during the initialization time. The operations also include unmapping a portion of the memory area for the kernel after the segment of code has been executed.
Wind River | Date: 2014-04-10
A non-transitory computer-readable storage medium storing a set of instructions that are executable by a processor. The set of instructions, when executed by one or more processors of a multi-processor computing system, causes the one or more processors to perform operations including initiating a first processor of the multi-processor computing system with an operating system image of an operating system, the operating system image including a predetermined object map, initiating a second processor of the multi-processor computing system with the operating system image, placing a plurality of system objects with corresponding processors according to the predetermined object map, receiving a triggering event causing a change to the predetermined object map and relocating one of the system objects to a different one of the processors based on the change to the predetermined object map.
Wind River | Date: 2014-11-26
The present invention provides systems and methods for authenticating a mobile communication device to a computer system of an automobile that does not require manual code entry, and thereby reduces the burden on the user, minimizes human errors, and provides the ability to utilize more complex digital keys an increase the security level of the connection. In particular, the systems and methods of the present invention generate a unique identifier corresponding to the automobile and locally transfer a message including or generated from this unique identifier to the mobile communication device without manual code entry.
Wind River | Date: 2014-11-18
A method including mapping a first portion of a virtual memory containing code of an operating system for access by a processor; receiving a call for an entry point of the operating system; and mapping, after receiving the call, a second portion of the virtual memory containing data for executing entry point code associated with the entry point for access by the processor. The processor executing the operating system code is permitted to access only data from the first and second portions of the virtual memory.
Wind River | Date: 2015-09-17
A method and system encrypts data in a least privileged operating system. The method includes determining a first encryption scheme to be used with software code to be mapped to a virtual memory. The method includes mapping a first portion of the virtual memory with the software code for access by a processor using the first encryption scheme. The method includes receiving a call for an entry point of the operating system. The method includes determining a second encryption scheme to be used with the entry point when mapped to the virtual memory. The method includes mapping a second portion of the virtual memory for executing entry point code associated with the entry point for access by the processor using the second encryption scheme. The processor executing the software code is permitted to access only data from the first and second portions of the virtual memory.
Wind River | Date: 2015-02-24
A system and method for configuring a virtual computing environment to operate in direct interrupt mode; receiving a triggering event triggering a transition from direct interrupt mode to virtual interrupt mode; copying contents of a physical interrupt queue into a virtual interrupt queue; acknowledging vectors present in the physical interrupt queue; and transitioning the virtual computing environment to virtual interrupt mode. The system includes a processor for performing the steps of the method.
Wind River | Date: 2015-01-15
A system and method for dynamically processing data across a plurality of processor cores in a multi-core computing environment for breaking down incoming data traffic into a plurality of segments and dynamically distribute and re-distribute the segments on an ongoing basis so as to allocate the handling of data traffic in a resource efficient manner.