Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for accessing shared memory, processor and computer system

A shared memory and security processor technology, applied in the field of accessing shared memory, can solve the problem of low memory usage efficiency, achieve the effect of improving usage efficiency and ensuring security

Active Publication Date: 2020-03-27
HYGON INFORMATION TECH CO LTD
View PDF8 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present application is to provide a method, device, processor and computer system for accessing shared memory, so as to solve the low efficiency of memory usage in the prior art The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for accessing shared memory, processor and computer system
  • Method and device for accessing shared memory, processor and computer system
  • Method and device for accessing shared memory, processor and computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0032] Introduce the related concepts involved in the embodiment of this application:

[0033] The security processor is a hardware security processor chip embedded in the processor SoC, which can provide security functions independent of the general-purpose processor.

[0034] Secure virtualization, using secure processors as trusted bases, provides an environment for securely running tenant programs on untrusted hosts.

[0035] Secure memory is isolated by hardware, usually provided by the processor SoC. Secure memory is used to protect some core memory data from access and modification by untrusted code.

[0036] Computer programs usually run based on virtual addresses, while hardware access uses physical addresses, so a hardware mechanism is required to complete address translation. Therefore...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for accessing a shared memory, a processor and a computer system. The method comprises the following steps: receiving a configuration request sent by a virtual machine manager, wherein the configuration request comprises identity authentication information of the first virtual machine and a to-be-accessed target memory space of the first virtual machine;if the target memory space is the shared memory of the second virtual machine, verifying the identity authentication information, wherein the shared memory of the second virtual machine is used for being accessed by the security processor, the second virtual machine and the virtual machine authorized by the second virtual machine; and if the identity verification is passed, adding a mapping relationship pointing to the target memory space in a security page table of the first virtual machine, so as to enable the first virtual machine to access the target memory space according to the mapping relationship in the security page table. According to the method, the memory of the virtual machine is divided into the shared memory and the secure memory, so that the first virtual machine and the second virtual machine can share the data in the target memory space, and the use efficiency of the memory is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular, to a method, device, processor and computer system for accessing shared memory. Background technique [0002] Virtualization technology is widely used in cloud computing environments. Tenants purchase virtual machine instances from cloud service vendors to run tenant programs. Cloud service vendors run programs of different tenants on the same hardware platform, and improve hardware usage efficiency through sharing. Tenants can only fully trust the operating environment provided by the cloud service provider. However, due to software / hardware vulnerabilities and personnel management defects, authorized server operation and maintenance personnel and hackers may steal or destroy tenant programs and data. [0003] Based on secure memory technology, tenant programs and data are properly stored in secure memory to isolate them from common data or other tenant data, achieving...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F12/0875G06F12/0882G06F12/0842G06F12/1009
CPCG06F9/45558G06F12/0875G06F12/0882G06F12/0842G06F12/1009G06F2009/45583
Inventor 买宇飞应志伟杜朝晖
Owner HYGON INFORMATION TECH CO LTD