A method and device for accessing physical resources

A physical resource and resource technology, applied in resource allocation, multi-program device, program control device, etc., can solve problems such as memory resource leakage and memory resource insecurity

Active Publication Date: 2018-07-20
HUAWEI TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the global physical memory is visible to every Light OS. Therefore, when the Light OS kernel itself is untrustworthy or a logical error occurs in the page table mapping, it is possible to access the physical memory that does not belong to it, thereby causing other system kernels to fail. Memory resource leaks, causing insecurity of memory resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for accessing physical resources
  • A method and device for accessing physical resources
  • A method and device for accessing physical resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0258] Next, a specific implementation solution for the method for accessing physical resources will be provided according to the above system. Such as Figure 4 As shown, it specifically includes the following steps:

[0259] Step 401, when the Heavy OS starts, initialize the security firmware.

[0260] Wherein, performing initialization settings on the security firmware; the initialization settings include: setting a capacity for storing second resource allocation mapping information in the security firmware; and binding the security firmware to the Heavy OS , so that the security firmware only stores or updates the second resource allocation mapping information under the control of the Heavy OS, and the security firmware only feeds back an abnormal access signal to the Heavy OS.

[0261]The second resource allocation mapping information may be a correspondence between the CPU included in the Light OS and the physical addresses of all or part of the physical resources allo...

Embodiment 2

[0285] For the above-mentioned system, the embodiment of the present invention provides a method for accessing physical resources, the execution subject of which is the first Light OS, by monitoring the capability operation of the task process and the propagation path of key data in the first Light OS, to Guarantees access to kernel object resources. Such as Figure 5 As shown, the specific steps include:

[0286] Step 501, the first lightweight system kernel Light OS allocates kernel object resources for each task in the user space.

[0287] Wherein, the kernel object resource is that Light OS encapsulates kernel resources (such as memory, device, etc.) and exists in the form of an object (Object).

[0288] Specifically, the allocation of kernel object resources for each task in the user space by the first Light OS is completed by the Capability authorization module in the first Light OS, and the Capability authorization module is a part of the Capability mechanism. Among ...

Embodiment 3

[0301]For the above system, the embodiment of the present invention provides a method for accessing physical resources, the execution body of which is the Heavy OS, and the functional integrity of the Light OS is guaranteed by performing security detection on the Light OS. Such as Figure 6 As shown, the specific steps include:

[0302] Step 601, the heavyweight system kernel Heavy OS sends a security inspection request to the first Light OS; correspondingly, the first Light OS receives the security inspection request sent by the Heavy OS.

[0303] Wherein, the security detection request is used to detect whether the first Light OS is abnormal; the HeavyOS may perform security detection on the first Light OS periodically or in real time, and of course it is not limited thereto.

[0304] Further, before the Heavy OS performs security detection on the first Light OS, the method further includes: the Heavy OS periodically records the Capability table information of the first Lig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for accessing physical resources, relating to the technical field of operating systems, to limit the lightweight system kernel Light OS in a multi-kernel operating system from being able to access physical resources of other Light OSs, and to ensure access between Light OSs Security of physical resources. The method includes: the security firmware receives the physical address corresponding to the physical resource to be accessed by the first Light OS; the security firmware determines whether the physical address corresponding to the physical resource to be accessed by the first Light OS is out of bounds; if the first Sending a continuation access signal to the first Light OS if the access of the Light OS does not exceed the boundary; or, if the access of the first Light OS exceeds the boundary, sending an access error signal to the first Light OS.

Description

technical field [0001] The present invention relates to the technical field of operating systems, in particular to a method and device for accessing physical resources. Background technique [0002] With the further increase in data volume and data processing requirements, the load has higher and higher requirements on the performance of the operating system. Microkernel and multi-kernel have become a trend in the future development of the operating system. Multi-core cooperative work can well isolate applications, improve system throughput and greatly improve system performance. Therefore, in the face of big data processing today, virtualization technology and multi-core technology are more and more researched and applied due to their high scalability. Among them, the parallel virtualization system combines multi-core technology and virtualization technology to ensure resource reuse and isolation, and each core of the multi-core operating system can independently manage me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455G06F9/50
CPCG06F9/4411G06F2009/45583G06F21/78G06F2221/2141G06F12/1458G06F2212/1052G06F21/53G06F21/62G06F21/00G06F9/4555G06F21/572
Inventor 郑晨付龙詹剑锋张立新
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products