Abstract
The priority inversion problem was discovered in the eighties. The decisive ideas to cope with this problem have been published in the nineties. In the meantime the suppliers of real-time operating systems and run-time systems have occupied this topic by providing certain protocols in order to give the application programmer comfortable system calls to avoid priority inversion. At a closer look there are considerable errors and defects in the protocol implementations but also in the approach to derive these protocols. So, on the one hand this article unfolds an undetected error of the priority inheritance protocol. On the other hand it shows by a sequence of test suites that certain operating systems and runtime systems have different kinds of defects in implementing the protocol.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.