
User’s Manual U14833EJ2V0UM
10
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.5.7
Creating mailboxes ......................................................................................................................60
Deleting mailboxes.......................................................................................................................60
Messages.....................................................................................................................................61
Transmitting messages................................................................................................................61
Receiving messages....................................................................................................................62
Obtaining mailbox information......................................................................................................62
Examples of message communication using mailboxes ..............................................................62
5.6
Mutexes......................................................................................................................................65
5.6.1
Creating mutexes.........................................................................................................................65
5.6.2
Deleting mutexes .........................................................................................................................65
5.6.3
Priority inheritance protocol..........................................................................................................65
5.6.4
Priority ceiling protocol.................................................................................................................65
5.6.5
Simplified priority order control rules............................................................................................66
5.6.6
Locking mutexes ..........................................................................................................................66
5.6.7
Releasing mutex locks .................................................................................................................66
5.6.8
Obtaining mutex information ........................................................................................................66
5.6.9
Examples of synchronization using mutexes................................................................................67
CHAPTER 6 MEMORY MANAGEMENT...............................................................................................69
6.1
6.2
6.3
6.4
6.5
Overview.....................................................................................................................................69
System Pool...............................................................................................................................69
Stack Pool..................................................................................................................................70
User Pool....................................................................................................................................70
Fixed-Length Memory Pools....................................................................................................70
6.5.1
Creating fixed-length memory pools.............................................................................................70
6.5.2
Deleting fixed-length memory pools.............................................................................................70
6.5.3
Fixed-length memory blocks ........................................................................................................71
6.5.4
Structure of fixed-length memory pool .........................................................................................71
6.5.5
Acquiring fixed-length memory blocks..........................................................................................72
6.5.6
Returning fixed-length memory blocks.........................................................................................72
6.5.7
Obtaining fixed-length memory pool information..........................................................................72
6.5.8
Examples of acquiring memory blocks from fixed-length memory pools......................................73
Variable-Length Memory Pools ...............................................................................................75
6.6.1
Creating variable-length memory pools........................................................................................75
6.6.2
Deleting variable-length memory pools........................................................................................75
6.6.3
Variable-length memory blocks....................................................................................................75
6.6.4
Structure of variable-length memory pool....................................................................................76
6.6.5
Acquiring variable-length memory blocks.....................................................................................77
6.6.6
Returning variable-length memory blocks....................................................................................79
6.6.7
Obtaining variable-length memory pool information.....................................................................80
6.6.8
Examples of acquiring memory blocks from variable-length memory pools.................................81
6.6
CHAPTER 7 TIME MANAGEMENT ......................................................................................................84
7.1
7.2
Overview.....................................................................................................................................84
System Clock.............................................................................................................................84
7.2.1
Setting the system clock...............................................................................................................84