Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and devices for executing system calling

A technology for executing systems and executors, applied in the direction of multi-program devices, computer security devices, specific access rights, etc., can solve problems such as inability to achieve differentiated control, and the number of system calls cannot meet access requirements

Active Publication Date: 2017-09-26
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a method and device for executing a system call to solve the problem that the existing technology cannot realize differentiated control when restricting the system call, and the number of open system calls cannot meet the access requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and devices for executing system calling
  • Methods and devices for executing system calling
  • Methods and devices for executing system calling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0121] In the following description, many specific details are explained in order to fully understand this application. However, this application can be implemented in many other ways different from those described herein, and those skilled in the art can make similar promotion without violating the connotation of this application. Therefore, this application is not limited by the specific implementation disclosed below.

[0122] In this application, a method and device for executing system calls and another method and device for executing system calls are respectively provided. Detailed descriptions are given in the following embodiments one by one.

[0123] The method for executing system calls provided in this application provides a sandbox mechanism for performing permission control on executing system calls. Its core is: when judging whether a system call can be executed in response to a received system call request, yes Based on whether the executor has the corresponding acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for executing system calling, and meanwhile discloses another method and device for executing system calling. The first method for executing system calling comprises the steps of receiving a system calling executing request, and judging whether a system calling executor has a system calling access authority or not; if yes, allowing the executor to execute system calling. According to the methods, whether the certain system calling is executed or not is judged on the basis that the executor has the corresponding access authority, and the purpose of limiting system calling is achieved through executor's authorization, so that executor identity based different control is achieved, which system calling is opened is not limited, and therefore the reasonable access requirement for system calling of the user space can be flexibly met.

Description

Technical field [0001] This application relates to system call technology, in particular to a method and device for executing system calls. This application also relates to another method and device for executing system calls. Background technique [0002] In order to ensure security, the operating space of an operating system (for example, Linux) can usually be divided into kernel space and user space, which run in different levels and are logically isolated from each other. Applications are generally not allowed to access kernel data, nor can they use kernel functions. They can only manipulate user data in user space and call user space functions. When the user program needs to obtain system services or access the core functions of the system, a system call (syscall) needs to be executed at this time. [0003] When a system call is executed, it usually falls into the kernel through the soft interrupt mechanism, that is, enters the kernel space, and then executes the correspondi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/52G06F2221/2141G06F21/629G06F21/53G06F9/468G06F9/545G06F21/6281
Inventor 裘绍翔许来光
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products