System and method for inhibiting unauthorized access to protected memory region

An unauthorized, storage area technology, applied in the field of computer systems, can solve problems affecting system stability, changing management programs, etc.

Inactive Publication Date: 2004-04-07
IBM CORP
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, since the hypervisor supports all partitions, changing the function of the hypervisor will affect the stability of the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for inhibiting unauthorized access to protected memory region
  • System and method for inhibiting unauthorized access to protected memory region
  • System and method for inhibiting unauthorized access to protected memory region

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] A preferred embodiment of the invention, together with its advantages, will be better understood by referring to the drawings, wherein like numerals are used to indicate like or corresponding parts.

[0018] The present invention is a system, method and computer program product for inhibiting unauthorized access to protected storage areas. Given are two areas of memory, the protected area and the trusted area. Calls from the trusted zone into the protected zone will be allowed and executed. Unreliable calls, ie calls from a zone outside the trusted zone to enter the protected zone, will not be executed. These calls will return without allowing access to the protected area.

[0019] To determine the starting address of a call to enter a protected region, the current value of a link register is determined. If the current value of the link register falls within the trust zone, the call is executed and allowed to access the protected zone. However, if the current value ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system, method, and computer program product are disclosed for prohibiting unauthorized access to a protected region of memory. A protected region of memory and a trusted region of memory are both specified. A call to access a location within the protected region of memory is received. An origination location of the call is then determined. In response to a determination that the origination location is within the trusted region, the call is permitted to access the protected region of memory. In response to a determination that the origination location is outside of the trusted region, the call is prohibited from accessing the protected region of memory.

Description

technical field [0001] The present invention relates generally to the field of computer systems and, more particularly, to systems, methods and computer program products for inhibiting unauthorized access to protected storage areas. Background technique [0002] A logical partition option (LPAR) within a data processing system (platform) allows multiple copies of a single operating system (OS) or multiple heterogeneous operating systems to run simultaneously on a single data processing system hardware platform. A partition in which an operating system image runs can be assigned a non-overlapping subset of the platform's hardware resources. In some implementations, a percentage of system resources is specified such that system resources are substantially time sliced ​​for each partition. These allocatable platform resources include one or more architecturally distinct processors and their interrupt management areas, system memory areas, and input / output (I / O) adapter bus slo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
CPCG06F12/1458
Inventor B·R·哈林顿K·B·洛克
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products