An application-oriented Linux kernel customization for embedded systems

被引:0
|
作者
Lee, CT [1 ]
Lin, JM
Hong, ZW
Lee, WT
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
[2] Tamkang Univ, Dept Elect Engn, Tamsui 251, Taiwan
关键词
embedded operating system; general purpose operating system; Linux kernel customization; call graph; redundant code; unreachable code; dead code;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How to reconfigure a general purpose operating system (GPOS) into an embedded operating system has attracted attention for application-specific domains. Linux is currently one of the popular candidates for GPOSs. Although Linux has tools for kernel reconfiguration by letting users add or remove desired function modules, the best schemes of reconfiguring Linux according to a specific embedded system are not practical. Even after this configuration, the target Linux might still be a GPOS. In this article, we will propose an approach to customizing an application-specific Linux operation system. This approach derives from a "call graph" based on reengineering. By analyzing a graph-structure representation of the target system, its hardware and software specifications are determined. Thus, we can find the rules for removing the redundant code in Linux. Moreover, we employ the call graph approach to verify the system integrity at the source-code level. In order to demonstrate the proposed idea, an experimental system will also be reported in this article. The results show that our approach can significantly remove about 17 percent of the Linux kernel's footprint with respect to unreachable code.
引用
收藏
页码:1093 / 1107
页数:15
相关论文
共 3 条
  • [1] PESKEA: Anomaly Detection Framework for Profiling Kernel Event Attributes in Embedded Systems
    Ezeme, Okwudili M.
    Azim, Akramul
    Mahmoud, Qusay H.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 957 - 971
  • [2] Efficient scheme of verifying integrity of application binaries in embedded operating systems
    Soon Seok Kim
    Deok Gyu Lee
    Jong Hyuk Park
    The Journal of Supercomputing, 2012, 59 : 676 - 692
  • [3] Efficient scheme of verifying integrity of application binaries in embedded operating systems
    Kim, Soon Seok
    Lee, Deok Gyu
    Park, Jong Hyuk
    JOURNAL OF SUPERCOMPUTING, 2012, 59 (02) : 676 - 692