Unlock instant, AI-driven research and patent intelligence for your innovation.

Memory access instruction access detection method and device

A detection method and instruction technology, applied in the computer field, can solve the problems of undetectable access legitimacy, operating system kernel crash, illegal memory access, etc.

Active Publication Date: 2020-03-13
LOONGSON TECH CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the operating system kernel code is running, the memory access instructions need to access the kernel space memory. Due to the negligence in the writing process of the operating system kernel, illegal memory access may occur, which may cause the operating system kernel to crash. Therefore, how to detect the operating system The memory access instructions in the kernel code are very important to the legality of kernel space memory access
[0003] However, at present, it is impossible to detect the legitimacy of the access instruction in the operating system kernel code to the memory in the kernel space, thus, when an illegal memory access occurs, the operating system kernel crashes, affecting the normal operation of the computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory access instruction access detection method and device
  • Memory access instruction access detection method and device
  • Memory access instruction access detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0099] The terms "first", "second", "third" and "fourth" (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects without necessarily using Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access command access detection method and device. The method includes that a CPU determines if an access of an access command is a legal access or not according to an operation type of the access command in an operation system kernel code, an address to be accessed of the access command and the state of the address to be accessed, recorded in a shadow memory page, and the CPU executes the access command if the access command is the legal command. The method can determine if the access command is the legal access command or not according to the operation type of the access command, the address to be accessed, and the state of the address to be accessed, can execute the access command if the access command is the legal command, and can avoid collapse of an operation system kernel due to the fact that the access command illegally access the kernel space, and can improve the stability of operation of a computer system.

Description

technical field [0001] The invention relates to computer technology, in particular to a memory access instruction access detection method and device. Background technique [0002] Code in an operating system can run at different privilege levels, generally divided into kernel level and user level. When the code runs at the user level, it is also called running in the user state, and when the code runs at the kernel level, it is also called running in the kernel state. When the operating system kernel code is running, it runs in the kernel state. The linear address space in a computer system is divided into user space and kernel space. The memory in user space is called user space memory, and the memory in kernel space is called kernel space memory. Kernel space memory can only be accessed by code running in kernel mode, and user space memory can be accessed by code running in kernel mode and code running in user mode. When the operating system kernel code is running, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/44
CPCG06F21/44G06F21/57
Inventor 张爽爽王鹏孟小甫高翔
Owner LOONGSON TECH CORP