CA3137259A1 - Executing system calls in isolated address space in operating system kernel - Google Patents

Executing system calls in isolated address space in operating system kernel Download PDF

Info

Publication number
CA3137259A1
CA3137259A1 CA3137259A CA3137259A CA3137259A1 CA 3137259 A1 CA3137259 A1 CA 3137259A1 CA 3137259 A CA3137259 A CA 3137259A CA 3137259 A CA3137259 A CA 3137259A CA 3137259 A1 CA3137259 A1 CA 3137259A1
Authority
CA
Canada
Prior art keywords
system call
kernel
space
page table
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3137259A
Other languages
English (en)
French (fr)
Inventor
Michael Rapoport
Joel Kelly Nider
James Bottomley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CA3137259A1 publication Critical patent/CA3137259A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/545Interprogram communication where tasks reside in different layers, e.g. user- and kernel-space
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • G06F12/1009Address translation using page tables, e.g. page table structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/145Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being virtual, e.g. for virtual blocks or segments before a translation mechanism
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/3004Arrangements for executing specific machine instructions to perform operations on memory
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Bus Control (AREA)
CA3137259A 2019-05-19 2020-05-15 Executing system calls in isolated address space in operating system kernel Pending CA3137259A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/416,229 US11194639B2 (en) 2019-05-19 2019-05-19 Executing system calls in isolated address space in operating system kernel
US16/416,229 2019-05-19
PCT/EP2020/063618 WO2020234155A1 (en) 2019-05-19 2020-05-15 Executing system calls in isolated address space in operating system kernel

Publications (1)

Publication Number Publication Date
CA3137259A1 true CA3137259A1 (en) 2020-11-26

Family

ID=70779711

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3137259A Pending CA3137259A1 (en) 2019-05-19 2020-05-15 Executing system calls in isolated address space in operating system kernel

Country Status (12)

Country Link
US (1) US11194639B2 (https=)
EP (1) EP3973393B1 (https=)
JP (1) JP7546602B2 (https=)
KR (1) KR102612503B1 (https=)
CN (1) CN113711182B (https=)
AU (1) AU2020277632B2 (https=)
BR (1) BR112021023258A2 (https=)
CA (1) CA3137259A1 (https=)
IL (1) IL288057B2 (https=)
MX (1) MX2021013230A (https=)
SG (1) SG11202110222XA (https=)
WO (1) WO2020234155A1 (https=)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11799741B2 (en) * 2019-10-29 2023-10-24 Fannie Mae Systems and methods for enterprise information technology (IT) monitoring
US11586727B2 (en) * 2021-03-29 2023-02-21 Red Hat, Inc. Systems and methods for preventing kernel stalling attacks
CN114048502B (zh) * 2021-10-15 2023-08-15 中国科学院信息工程研究所 一种轻量级可信通道及其通信控制方法
CN116204884A (zh) * 2021-11-30 2023-06-02 华为技术有限公司 内核保护方法、装置及系统
US12254079B2 (en) * 2022-05-10 2025-03-18 International Business Machines Corporation Providing system services
CN117573419B (zh) * 2024-01-16 2024-04-26 上海芯联芯智能科技有限公司 一种页面异常处理方法及装置
CN119004420B (zh) * 2024-10-23 2025-08-15 浙江大华技术股份有限公司 一种权限控制方法、权限控制装置以及计算机存储介质

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7496576B2 (en) 2006-03-30 2009-02-24 Microsoft Corporation Isolated access to named resources
KR20080104591A (ko) * 2007-05-28 2008-12-03 삼성전자주식회사 메모리 보호 방법 및 장치
US10019327B1 (en) 2008-12-15 2018-07-10 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US9354977B1 (en) 2008-12-15 2016-05-31 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US8627451B2 (en) 2009-08-21 2014-01-07 Red Hat, Inc. Systems and methods for providing an isolated execution environment for accessing untrusted content
US8533418B2 (en) * 2010-06-30 2013-09-10 International Business Machines Corporation Memory allocation with identification of requesting loadable kernel module
US8677354B2 (en) 2010-07-12 2014-03-18 International Business Machines Corporation Controlling kernel symbol visibility and accessibility across operating system linkage spaces
US9323921B2 (en) 2010-07-13 2016-04-26 Microsoft Technology Licensing, Llc Ultra-low cost sandboxing for application appliances
US8954697B2 (en) * 2010-08-05 2015-02-10 Red Hat, Inc. Access to shared memory segments by multiple application processes
CN102308282A (zh) * 2011-07-20 2012-01-04 华为技术有限公司 多处理器体系结构远端内存访问的模拟方法及模拟器
US9152548B2 (en) * 2012-01-17 2015-10-06 Vmware, Inc. Controlling access to a privileged resource in user-mode system level mobile virtualization using a ptrace () system call
US9529614B2 (en) * 2012-03-05 2016-12-27 Board Of Regents The University Of Texas Systems Automatically bridging the semantic gap in machine introspection
CN102681940B (zh) * 2012-05-15 2015-06-10 北京航空航天大学 一种针对Linux操作系统内存管理子系统进行性能测试的方法
US10585801B2 (en) * 2012-11-26 2020-03-10 Advanced Micro Devices, Inc. Prefetch kernels on a graphics processing unit
US9910689B2 (en) * 2013-11-26 2018-03-06 Dynavisor, Inc. Dynamic single root I/O virtualization (SR-IOV) processes system calls request to devices attached to host
US9628279B2 (en) * 2014-09-30 2017-04-18 Microsoft Technology Licensing, Llc Protecting application secrets from operating system attacks
US10192067B2 (en) 2016-05-26 2019-01-29 Microsoft Technology Licensing, Llc Self-described security model for resource access
US11188365B2 (en) * 2016-11-29 2021-11-30 Red Hat, Inc. Memory overcommit by speculative fault
US10324838B2 (en) * 2017-10-12 2019-06-18 International Business Machines Corporation Virtually addressable hardware global kernel segment table
US10599835B2 (en) * 2018-02-06 2020-03-24 Vmware, Inc. 32-bit address space containment to secure processes from speculative rogue cache loads
US10698637B2 (en) * 2018-07-03 2020-06-30 Oracle International Corporation Stale block resynchronization in NVM based systems

Also Published As

Publication number Publication date
AU2020277632A1 (en) 2021-10-14
SG11202110222XA (en) 2021-10-28
JP2022534685A (ja) 2022-08-03
KR20210141682A (ko) 2021-11-23
EP3973393A1 (en) 2022-03-30
US20200364101A1 (en) 2020-11-19
CN113711182B (zh) 2025-02-11
JP7546602B2 (ja) 2024-09-06
WO2020234155A1 (en) 2020-11-26
IL288057B1 (en) 2024-02-01
IL288057B2 (en) 2024-06-01
IL288057A (en) 2022-01-01
EP3973393B1 (en) 2024-08-07
AU2020277632B2 (en) 2023-07-06
CN113711182A (zh) 2021-11-26
US11194639B2 (en) 2021-12-07
KR102612503B1 (ko) 2023-12-08
MX2021013230A (es) 2022-01-06
BR112021023258A2 (pt) 2022-01-04

Similar Documents

Publication Publication Date Title
US11194639B2 (en) Executing system calls in isolated address space in operating system kernel
US10073986B2 (en) Regulating access to and protecting portions of applications of virtual machines
KR102255767B1 (ko) 가상 머신 감사를 위한 시스템 및 방법들
US9037873B2 (en) Method and system for preventing tampering with software agent in a virtual machine
US11093657B2 (en) Limited execution environment for monolithic kernel
US11341241B2 (en) Enhancing memory safe programming using a page frame tag mechanism
US10885206B2 (en) Protecting enterprise data at each system layer
US10114948B2 (en) Hypervisor-based buffer overflow detection and prevention
Weisberg et al. Enhancing Transportation System Networks Reliability by Securer Operating System
Wiseman et al. Eliminating the threat of kernel stack overflows
US20260064606A1 (en) Control-flow based Memory Access Manipulation For Isolating Code and Data
WO2013074071A1 (en) Regulating access to and protecting portions of applications of virtual machines

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20240426

R00 Party data change recorded

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R116 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUEST

Effective date: 20241231

W00 Other event occurred

Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT

Effective date: 20241231

MFA Maintenance fee for application paid

Free format text: FEE DESCRIPTION TEXT: MF (APPLICATION, 5TH ANNIV.) - STANDARD

Year of fee payment: 5

U00 Fee paid

Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED

Effective date: 20250407

U11 Full renewal or maintenance fee paid

Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL

Effective date: 20250407

R17 Change to representative recorded

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R117 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUIREMENTS DETERMINED COMPLIANT

Effective date: 20250408

R00 Party data change recorded

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R119 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REVOCATION OF AGENT REQUEST

Effective date: 20250624

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R00-R116 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUEST

Effective date: 20250624

W00 Other event occurred

Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT

Effective date: 20250626

R17 Change to representative recorded

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R121 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REVOCATION OF AGENT REQUIREMENTS DETERMINED COMPLIANT

Effective date: 20250730

Free format text: ST27 STATUS EVENT CODE: A-2-2-R10-R17-R117 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPOINTMENT OF AGENT REQUIREMENTS DETERMINED COMPLIANT

Effective date: 20250730

W00 Other event occurred

Free format text: ST27 STATUS EVENT CODE: A-2-2-W10-W00-W100 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: LETTER SENT

Effective date: 20250730

D15 Examination report completed

Free format text: ST27 STATUS EVENT CODE: A-2-2-D10-D15-D126 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: EXAMINER'S REPORT

Effective date: 20251209