Method and device for protecting program memory space through precise partitioning

A technology of program storage and storage space, which is applied to multi-program devices, specific access rights, transaction processing, etc. It can solve problems such as system resource waste and user program failure to run normally, and achieve the effect of avoiding waste

Active Publication Date: 2016-06-15
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the range of storage space to be protected is too small, the user program will not run normally, and if the range of storage space to be protected is too large, system resources will be wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting program memory space through precise partitioning
  • Method and device for protecting program memory space through precise partitioning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] see figure 1 , a method for protecting program storage space through precise partitioning provided by the present invention, the specific steps are as follows:

[0035] Step 101: Determine the first length according to the program length, obtain the first head address according to the head address of the program storage space and the first length, and obtain the first storage space according to the first length and the first head address.

[0036] Specifically, the preset interval is determined according to the program length, and the upper boundary value of the preset interval is used as the first length. Align the first address of the program storage space to the left to an integer multiple of the first length to obtain the first first address, calculate the sum of the first first address and the first length to obtain the first end address, and combine the first first address and the first end address The storage space between is used as the first storage space.

...

Embodiment 2

[0101] see figure 2 , the present invention provides a device for protecting program storage space through precise partitioning, including:

[0102] The first storage space generation module 11 is used to determine the first length according to the length of the program, and align the first address of the program storage space to an integer multiple of the first length to the left to obtain the first first address, according to the first first address and the first length get the first storage space;

[0103] Specifically, the first storage space generating module is specifically configured to determine the preset interval where the program length is located, use the upper boundary value of the preset interval as the first length, and align the first address of the program storage space to the left Integer multiples of the first length to obtain the first head address, and the first storage space is obtained according to the first head address and the first length.

[0104]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for protecting program memory space through precise partitioning, and relate to the technical field of digital memory. The method comprises the steps that a first memory space is obtained according to the program memory space, the first memory space is processed to obtain a front end region and a rear end region, the front end region and the rear end region are subjected to recursive partitioning, and the access permission of sub-regions obtained through partitioning is set. The device comprises a first memory space generating module, a first judgment module, a first portioning module, a second judgment module, a front end region generating module, a rear end region generating module, a front end region processing module, a rear end region processing module, a third judgment module, a fourth judgment module, a front end region updating module and a rear end region updating module. The program memory space is protected through precise partitioning, the situation that due to inaccurate partitioning, the program cannot operate normally is avoided, and waste of system resources is avoided.

Description

technical field [0001] The invention relates to the technical field of digital storage, in particular to a method and device for protecting program storage space through precise partitioning. Background technique [0002] Some embedded systems use multi-task operation and control. These systems must provide a mechanism to ensure that the running tasks do not destroy the operation of other tasks. ARM is equipped with hardware that effectively protects system resources—MPU (MemoryProtectionUnit, memory protection unit ), the MPU can restrict access to system resources. The MPU has the following functions: 1 to protect the storage area, 2 to overlap the protected area, 3 to control the access rights, 4 to output the storage attributes to the system. The MPU protection module mainly divides the memory into domains, and ARMv7m supports 8 domains. If the range of storage space to be protected is too small, the user program will not run normally, and if the range of storage space...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46
CPCG06F9/467G06F9/468
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products