CA3137259A1 - Executing system calls in isolated address space in operating system kernel - Google Patents
Executing system calls in isolated address space in operating system kernel Download PDFInfo
- Publication number
- CA3137259A1 CA3137259A1 CA3137259A CA3137259A CA3137259A1 CA 3137259 A1 CA3137259 A1 CA 3137259A1 CA 3137259 A CA3137259 A CA 3137259A CA 3137259 A CA3137259 A CA 3137259A CA 3137259 A1 CA3137259 A1 CA 3137259A1
- Authority
- CA
- Canada
- Prior art keywords
- system call
- kernel
- space
- page table
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/545—Interprogram communication where tasks reside in different layers, e.g. user- and kernel-space
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
- G06F12/1009—Address translation using page tables, e.g. page table structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/145—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being virtual, e.g. for virtual blocks or segments before a translation mechanism
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3004—Arrangements for executing specific machine instructions to perform operations on memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Hardware Redundancy (AREA)
- Bus Control (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/416,229 US11194639B2 (en) | 2019-05-19 | 2019-05-19 | Executing system calls in isolated address space in operating system kernel |
| US16/416,229 | 2019-05-19 | ||
| PCT/EP2020/063618 WO2020234155A1 (en) | 2019-05-19 | 2020-05-15 | Executing system calls in isolated address space in operating system kernel |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA3137259A1 true CA3137259A1 (en) | 2020-11-26 |
Family
ID=70779711
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA3137259A Pending CA3137259A1 (en) | 2019-05-19 | 2020-05-15 | Executing system calls in isolated address space in operating system kernel |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US11194639B2 (https=) |
| EP (1) | EP3973393B1 (https=) |
| JP (1) | JP7546602B2 (https=) |
| KR (1) | KR102612503B1 (https=) |
| CN (1) | CN113711182B (https=) |
| AU (1) | AU2020277632B2 (https=) |
| BR (1) | BR112021023258A2 (https=) |
| CA (1) | CA3137259A1 (https=) |
| IL (1) | IL288057B2 (https=) |
| MX (1) | MX2021013230A (https=) |
| SG (1) | SG11202110222XA (https=) |
| WO (1) | WO2020234155A1 (https=) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11799741B2 (en) * | 2019-10-29 | 2023-10-24 | Fannie Mae | Systems and methods for enterprise information technology (IT) monitoring |
| US11586727B2 (en) * | 2021-03-29 | 2023-02-21 | Red Hat, Inc. | Systems and methods for preventing kernel stalling attacks |
| CN114048502B (zh) * | 2021-10-15 | 2023-08-15 | 中国科学院信息工程研究所 | 一种轻量级可信通道及其通信控制方法 |
| CN116204884A (zh) * | 2021-11-30 | 2023-06-02 | 华为技术有限公司 | 内核保护方法、装置及系统 |
| US12254079B2 (en) * | 2022-05-10 | 2025-03-18 | International Business Machines Corporation | Providing system services |
| CN117573419B (zh) * | 2024-01-16 | 2024-04-26 | 上海芯联芯智能科技有限公司 | 一种页面异常处理方法及装置 |
| CN119004420B (zh) * | 2024-10-23 | 2025-08-15 | 浙江大华技术股份有限公司 | 一种权限控制方法、权限控制装置以及计算机存储介质 |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7496576B2 (en) | 2006-03-30 | 2009-02-24 | Microsoft Corporation | Isolated access to named resources |
| KR20080104591A (ko) * | 2007-05-28 | 2008-12-03 | 삼성전자주식회사 | 메모리 보호 방법 및 장치 |
| US10019327B1 (en) | 2008-12-15 | 2018-07-10 | Open Invention Network Llc | System and method for hybrid kernel- and user-space incremental and full checkpointing |
| US9354977B1 (en) | 2008-12-15 | 2016-05-31 | Open Invention Network Llc | System and method for hybrid kernel- and user-space incremental and full checkpointing |
| US8627451B2 (en) | 2009-08-21 | 2014-01-07 | Red Hat, Inc. | Systems and methods for providing an isolated execution environment for accessing untrusted content |
| US8533418B2 (en) * | 2010-06-30 | 2013-09-10 | International Business Machines Corporation | Memory allocation with identification of requesting loadable kernel module |
| US8677354B2 (en) | 2010-07-12 | 2014-03-18 | International Business Machines Corporation | Controlling kernel symbol visibility and accessibility across operating system linkage spaces |
| US9323921B2 (en) | 2010-07-13 | 2016-04-26 | Microsoft Technology Licensing, Llc | Ultra-low cost sandboxing for application appliances |
| US8954697B2 (en) * | 2010-08-05 | 2015-02-10 | Red Hat, Inc. | Access to shared memory segments by multiple application processes |
| CN102308282A (zh) * | 2011-07-20 | 2012-01-04 | 华为技术有限公司 | 多处理器体系结构远端内存访问的模拟方法及模拟器 |
| US9152548B2 (en) * | 2012-01-17 | 2015-10-06 | Vmware, Inc. | Controlling access to a privileged resource in user-mode system level mobile virtualization using a ptrace () system call |
| US9529614B2 (en) * | 2012-03-05 | 2016-12-27 | Board Of Regents The University Of Texas Systems | Automatically bridging the semantic gap in machine introspection |
| CN102681940B (zh) * | 2012-05-15 | 2015-06-10 | 北京航空航天大学 | 一种针对Linux操作系统内存管理子系统进行性能测试的方法 |
| US10585801B2 (en) * | 2012-11-26 | 2020-03-10 | Advanced Micro Devices, Inc. | Prefetch kernels on a graphics processing unit |
| US9910689B2 (en) * | 2013-11-26 | 2018-03-06 | Dynavisor, Inc. | Dynamic single root I/O virtualization (SR-IOV) processes system calls request to devices attached to host |
| US9628279B2 (en) * | 2014-09-30 | 2017-04-18 | Microsoft Technology Licensing, Llc | Protecting application secrets from operating system attacks |
| US10192067B2 (en) | 2016-05-26 | 2019-01-29 | Microsoft Technology Licensing, Llc | Self-described security model for resource access |
| US11188365B2 (en) * | 2016-11-29 | 2021-11-30 | Red Hat, Inc. | Memory overcommit by speculative fault |
| US10324838B2 (en) * | 2017-10-12 | 2019-06-18 | International Business Machines Corporation | Virtually addressable hardware global kernel segment table |
| US10599835B2 (en) * | 2018-02-06 | 2020-03-24 | Vmware, Inc. | 32-bit address space containment to secure processes from speculative rogue cache loads |
| US10698637B2 (en) * | 2018-07-03 | 2020-06-30 | Oracle International Corporation | Stale block resynchronization in NVM based systems |
-
2019
- 2019-05-19 US US16/416,229 patent/US11194639B2/en not_active Expired - Fee Related
-
2020
- 2020-05-15 CA CA3137259A patent/CA3137259A1/en active Pending
- 2020-05-15 SG SG11202110222XA patent/SG11202110222XA/en unknown
- 2020-05-15 CN CN202080029768.5A patent/CN113711182B/zh active Active
- 2020-05-15 WO PCT/EP2020/063618 patent/WO2020234155A1/en not_active Ceased
- 2020-05-15 EP EP20727198.2A patent/EP3973393B1/en active Active
- 2020-05-15 JP JP2021568575A patent/JP7546602B2/ja active Active
- 2020-05-15 AU AU2020277632A patent/AU2020277632B2/en active Active
- 2020-05-15 IL IL288057A patent/IL288057B2/en unknown
- 2020-05-15 MX MX2021013230A patent/MX2021013230A/es unknown
- 2020-05-15 KR KR1020217034428A patent/KR102612503B1/ko active Active
- 2020-05-15 BR BR112021023258A patent/BR112021023258A2/pt unknown
Also Published As
| Publication number | Publication date |
|---|---|
| AU2020277632A1 (en) | 2021-10-14 |
| SG11202110222XA (en) | 2021-10-28 |
| JP2022534685A (ja) | 2022-08-03 |
| KR20210141682A (ko) | 2021-11-23 |
| EP3973393A1 (en) | 2022-03-30 |
| US20200364101A1 (en) | 2020-11-19 |
| CN113711182B (zh) | 2025-02-11 |
| JP7546602B2 (ja) | 2024-09-06 |
| WO2020234155A1 (en) | 2020-11-26 |
| IL288057B1 (en) | 2024-02-01 |
| IL288057B2 (en) | 2024-06-01 |
| IL288057A (en) | 2022-01-01 |
| EP3973393B1 (en) | 2024-08-07 |
| AU2020277632B2 (en) | 2023-07-06 |
| CN113711182A (zh) | 2021-11-26 |
| US11194639B2 (en) | 2021-12-07 |
| KR102612503B1 (ko) | 2023-12-08 |
| MX2021013230A (es) | 2022-01-06 |
| BR112021023258A2 (pt) | 2022-01-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11194639B2 (en) | Executing system calls in isolated address space in operating system kernel | |
| US10073986B2 (en) | Regulating access to and protecting portions of applications of virtual machines | |
| KR102255767B1 (ko) | 가상 머신 감사를 위한 시스템 및 방법들 | |
| US9037873B2 (en) | Method and system for preventing tampering with software agent in a virtual machine | |
| US11093657B2 (en) | Limited execution environment for monolithic kernel | |
| US11341241B2 (en) | Enhancing memory safe programming using a page frame tag mechanism | |
| US10885206B2 (en) | Protecting enterprise data at each system layer | |
| US10114948B2 (en) | Hypervisor-based buffer overflow detection and prevention | |
| Weisberg et al. | Enhancing Transportation System Networks Reliability by Securer Operating System | |
| Wiseman et al. | Eliminating the threat of kernel stack overflows | |
| US20260064606A1 (en) | Control-flow based Memory Access Manipulation For Isolating Code and Data | |
| WO2013074071A1 (en) | Regulating access to and protecting portions of applications of virtual machines |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| EEER | Examination request |
Effective date: 20240426 |
|
| R00 | Party data change recorded |
Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R116 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUEST Effective date: 20241231 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT Effective date: 20241231 |
|
| MFA | Maintenance fee for application paid |
Free format text: FEE DESCRIPTION TEXT: MF (APPLICATION, 5TH ANNIV.) - STANDARD Year of fee payment: 5 |
|
| U00 | Fee paid |
Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED Effective date: 20250407 |
|
| U11 | Full renewal or maintenance fee paid |
Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL Effective date: 20250407 |
|
| R17 | Change to representative recorded |
Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R117 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUIREMENTS DETERMINED COMPLIANT Effective date: 20250408 |
|
| R00 | Party data change recorded |
Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R119 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REVOCATION OF AGENT REQUEST Effective date: 20250624 Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R116 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUEST Effective date: 20250624 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT Effective date: 20250626 |
|
| R17 | Change to representative recorded |
Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R121 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REVOCATION OF AGENT REQUIREMENTS DETERMINED COMPLIANT Effective date: 20250730 Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R117 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUIREMENTS DETERMINED COMPLIANT Effective date: 20250730 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W100 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: LETTER SENT Effective date: 20250730 |
|
| D15 | Examination report completed |
Free format text: ST27 STATUS EVENT CODE: A-2-2-D10-D15-D126 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: EXAMINER'S REPORT Effective date: 20251209 |