CN114546500A - Method and system for realizing password card drive supporting multiple devices - Google Patents
Method and system for realizing password card drive supporting multiple devices Download PDFInfo
- Publication number
- CN114546500A CN114546500A CN202210105557.6A CN202210105557A CN114546500A CN 114546500 A CN114546500 A CN 114546500A CN 202210105557 A CN202210105557 A CN 202210105557A CN 114546500 A CN114546500 A CN 114546500A
- Authority
- CN
- China
- Prior art keywords
- pci
- equipment
- resource structure
- structure body
- driver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000006870 function Effects 0.000 claims abstract description 43
- 239000000523 sample Substances 0.000 claims abstract description 17
- 238000001514 detection method Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a system for realizing a password card drive supporting multiple devices, wherein the method comprises the following steps: creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver; initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card; respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure; using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table; and setting each device resource structure body as private data of the pci device structure body pci _ dev. The invention makes all the pci-e code cards occupy one equipment node of the system, and saves system resources.
Description
Technical Field
The invention relates to the field of computers, in particular to a method and a system for realizing a password card drive supporting multiple devices.
Background
Devices are classified in the linux system into three basic types: character devices, block devices, and network devices. The pci-e password card is generally a character device, and the character device generally realizes system calls such as open, close, write, read and the like. The character device system calls to realize functions required by the user, and the application layer user calls the character device system to complete the operation of the password card. Generally, one pci-e password card needs to associate a device with one character device, needs to create a corresponding device file, and simultaneously needs to apply for one device number, and if a plurality of pci-e devices are inserted into one machine (for example, one card of the pci-e password card supporting virtualization can virtualize 128 pci-e devices), the device numbers of a plurality of linux systems are occupied, too many system resources are occupied, and resource waste is caused.
Disclosure of Invention
Based on the above, it is necessary to provide a method and a system for implementing a cryptographic card driver supporting multiple devices, which can effectively avoid resource waste caused by excessive system resource occupation.
The invention provides a method for realizing a password card drive supporting multiple devices, which comprises the following steps:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
Further, respectively acquiring device resources for each pci-e password card, and storing the device resources in a corresponding device resource structure, specifically comprising:
respectively acquiring I/O resources for each pci-e password card and storing the I/O resources in a corresponding equipment resource structure;
and respectively applying for DMA resources for each pci-e password card and storing the DMA resources in a corresponding equipment resource structure.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, after setting each device resource structure as private data of the driver module pci-dev, the method further includes:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list structure _ head accel _ table by using a function list _ del. .
Further, after setting each device resource structure as private data of the driver module pci-dev, the method further includes:
calling an open function of the character equipment, opening a character equipment file, and acquiring a handle fd of the character equipment file;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
Further, after the device resource structure body matched with the incoming demand information is taken out and saved to the private data of the character device file, the method further comprises the following steps:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
A second aspect further provides a multi-device supporting cryptocard driver implementation system, which is configured to implement the above multi-device supporting cryptocard driver implementation method, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system;
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a detection function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev. Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
The method comprises the steps of establishing equipment nodes under a pci-dev driven by a Linux system, establishing corresponding equipment resource structural bodies for at least one pci-e password card under the equipment nodes, linking each equipment resource structural body to a preset global linked list, and setting each equipment resource structural body as private data of the pci-dev, so that all the pci-e password cards occupy one equipment node of the system to save system resources; and meanwhile, a chain table structure _ head provided by a linux kernel is used, so that operations such as searching, inserting, deleting and the like of a device resource structure body are facilitated, and management of the pci-e password card through the chain table is realized.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart of a cryptographic card driver implementation method supporting multiple devices according to the present invention;
FIG. 2 shows a structural diagram of the global linked list _ head accel _ table according to the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flowchart of a cryptographic card driver implementation method supporting multiple devices according to the present invention.
As shown in fig. 1, a first aspect of the present invention provides a method for implementing a cryptographic card driver supporting multiple devices, where the method includes:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
It can be understood that, in the Linux system driver initialization process, a global linked LIST _ HEAD accel _ table is defined and initialized by using a LIST _ HEAD (accel _ table) function.
Further, respectively acquiring device resources for each pci-e password card, and storing the device resources in a corresponding device resource structure, specifically comprising:
respectively acquiring I/O resources for each pci-e password card and storing the I/O resources in a corresponding equipment resource structure;
and respectively applying for DMA resources for each pci-e password card and storing the DMA resources in a corresponding equipment resource structure.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, after setting each device resource structure to be private data of the pci device structure pci _ dev, the method further includes:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list struct _ head accel _ table by using a function list _ del.
Further, after setting each device resource structure to be private data of the pci device structure pci _ dev, the method further includes:
calling an open function of the character equipment, opening a file of the character equipment, and acquiring a handle fd of the file of the character equipment;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
Further, after the device resource structure body matched with the incoming demand information is taken out and saved to the private data of the character device file, the method further comprises the following steps:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
A second aspect further provides a multi-device supporting cryptocard driver implementation system, which is configured to implement the above multi-device supporting cryptocard driver implementation method, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system;
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources for each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
In order to further explain the technical scheme of the invention, a specific use scenario is given below.
Module initialization: the method comprises the steps of creating character equipment and equipment nodes in a module _ init module of a Linux system driver, then registering a pci-e device driver by using a pci _ register _ driver, and registering a pci device structure body pci _ dev in the system by the pci-e device driver.
Equipment detection: initializing the pci-e password card by a probe function probe driven by the pci-e device, and applying for a device resource structure, wherein the members of the device resource structure comprise struct list _ head list, the attribute, name, number, occupied memory and other information of the password card.
And acquiring the equipment resources, storing the equipment resources into an equipment resource structure, and adding a member struct list _ head list of the equipment resource structure into a global linked list struct _ head accel _ table by using a function list _ add.
If a plurality of pci-e password cards exist, the probe function is executed for a plurality of times, and all the device resource structure bodies are linked to the global linked list struct _ head accel _ table through the probe function, as shown in fig. 2.
Equipment removal: in a removing function remove of a pci-e device driver, a device resource structure body of a target pci-e password card is obtained through private data of a pci device structure body pci _ dev, the position of the device resource structure body in a linked list is found in a global linked list structure _ header _ table by using list _ for _ access _ entry _ safe, and then the device resource structure body in the linked list is deleted by using list _ del.
The device access: calling an open system call of the character equipment, opening a file of the character equipment, acquiring a handle fd of the file of the character equipment, calling an ioctl system call of the character equipment by using the fd, and transmitting the attribute (any one of a name, bdf and a number) of the pci-e password card. And traversing the device resource structure in the global linked list struct _ head access _ table by using a list _ for _ reach _ entry _ safe function, taking out the device resource structure with the attribute matched with the external incoming attribute from the device resource structure, and storing the device resource structure into private data of the character device file.
Reading and writing by equipment: and calling ioctl, write and read system calls of the character equipment through a handle fd of the character equipment file, taking out an equipment resource structural body of the target pci-e password card from private data of the character equipment file by a linux system driver, and realizing access to the target pci-e password card through the equipment resource structural body.
The invention can make all the pci-e code cards occupy one equipment node of the system, and saves system resources. And meanwhile, the operation of searching, inserting, deleting and the like of the equipment resource structure body is carried out by using a global linked list struct _ head accel _ table of the linux system, so that the management of the pci-e password card is realized.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (8)
1. A cryptographic card drive implementation method supporting multiple devices is characterized by comprising the following steps:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
2. The method for realizing the drive of the multi-device supported cryptographic card according to claim 1, wherein the device resource structure includes attribute, name, number, and occupied memory information of a struct list _ head list and a pci-e cryptographic card.
3. The method for implementing the multi-device supporting cryptographic card driver according to claim 2, wherein after the setting of each device resource structure as private data of a pci device structure pci _ dev, the method further comprises:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list structure _ head accel _ table by using a function list _ del.
4. The method for implementing the multi-device supporting cryptographic card driver according to claim 2, wherein after the setting of each device resource structure as private data of a pci device structure pci _ dev, the method further comprises:
calling an open function of the character equipment, opening a character equipment file, and acquiring a handle fd of the character equipment file;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
5. The implementation method of claim 4, wherein after the device resource structure body matched with the incoming requirement information is fetched and saved to the private data of the character device file, the method further comprises:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
6. The implementation method of the cryptocard driver supporting multiple devices according to claim 1, wherein the pci-e cryptocard supports a cryptographic encryption and decryption algorithm and a signature algorithm.
7. A multi-device supporting cryptocard driver implementation system, configured to implement the multi-device supporting cryptocard driver implementation method according to any one of claims 1 to 6, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system; creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver; initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card; respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure; using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table; and setting each device resource structure body as private data of the pci device structure body pci _ dev.
8. The system for realizing driving of the multi-device supported cryptographic card according to claim 7, wherein the device resource structure includes attribute, name, number, and occupied memory information of the struct list _ head list and the pci-e cryptographic card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210105557.6A CN114546500B (en) | 2022-01-28 | 2022-01-28 | Method and system for realizing password card drive supporting multiple devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210105557.6A CN114546500B (en) | 2022-01-28 | 2022-01-28 | Method and system for realizing password card drive supporting multiple devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114546500A true CN114546500A (en) | 2022-05-27 |
CN114546500B CN114546500B (en) | 2024-06-21 |
Family
ID=81674053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210105557.6A Active CN114546500B (en) | 2022-01-28 | 2022-01-28 | Method and system for realizing password card drive supporting multiple devices |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114546500B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090023923A (en) * | 2007-09-03 | 2009-03-06 | 주식회사 옥타컴 | Sensor device management algorithm in sensor node operating system |
CN102866966A (en) * | 2012-08-28 | 2013-01-09 | 大唐移动通信设备有限公司 | Device driver control method and device for Linux operating system |
US20150281126A1 (en) * | 2014-03-31 | 2015-10-01 | Plx Technology, Inc. | METHODS AND APPARATUS FOR A HIGH PERFORMANCE MESSAGING ENGINE INTEGRATED WITHIN A PCIe SWITCH |
WO2016091071A1 (en) * | 2014-12-11 | 2016-06-16 | 北京奇虎科技有限公司 | Linux kernel driver loading method and device |
WO2016150098A1 (en) * | 2015-03-20 | 2016-09-29 | 中兴通讯股份有限公司 | Pcie apparatus and pcie bus management method and device |
CN106293896A (en) * | 2016-08-10 | 2017-01-04 | 四川安嵌科技有限公司 | Equipment multiplexing method and device applied to multiple systems |
CN107967223A (en) * | 2017-12-07 | 2018-04-27 | 郑州云海信息技术有限公司 | A kind of multiple product lines versatility code architecture system |
CN108009103A (en) * | 2017-11-28 | 2018-05-08 | 中国船舶重工集团公司第七六研究所 | A kind of device PCI sort method of VxWorks system |
CN109117390A (en) * | 2018-08-09 | 2019-01-01 | 山东中孚安全技术有限公司 | A kind of Linux kernel module obtains the method and system of usb_bus_type symbolic address |
CN109656844A (en) * | 2018-12-03 | 2019-04-19 | 郑州云海信息技术有限公司 | A kind of AT24xx EEPROM driving method and device |
CN111290827A (en) * | 2018-12-07 | 2020-06-16 | 华为技术有限公司 | Data processing method and device and server |
CN112947863A (en) * | 2021-03-25 | 2021-06-11 | 北京计算机技术及应用研究所 | Method for combining storage spaces under Feiteng server platform |
CN113032103A (en) * | 2021-04-14 | 2021-06-25 | 中南大学 | VF (variable frequency) resource dynamic scheduling method based on SR-IOV (scheduling request-input/output) function of high-speed network card |
CN113515387A (en) * | 2021-09-13 | 2021-10-19 | 渔翁信息技术股份有限公司 | Data processing method and device and electronic device |
-
2022
- 2022-01-28 CN CN202210105557.6A patent/CN114546500B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090023923A (en) * | 2007-09-03 | 2009-03-06 | 주식회사 옥타컴 | Sensor device management algorithm in sensor node operating system |
CN102866966A (en) * | 2012-08-28 | 2013-01-09 | 大唐移动通信设备有限公司 | Device driver control method and device for Linux operating system |
US20150281126A1 (en) * | 2014-03-31 | 2015-10-01 | Plx Technology, Inc. | METHODS AND APPARATUS FOR A HIGH PERFORMANCE MESSAGING ENGINE INTEGRATED WITHIN A PCIe SWITCH |
WO2016091071A1 (en) * | 2014-12-11 | 2016-06-16 | 北京奇虎科技有限公司 | Linux kernel driver loading method and device |
WO2016150098A1 (en) * | 2015-03-20 | 2016-09-29 | 中兴通讯股份有限公司 | Pcie apparatus and pcie bus management method and device |
CN106293896A (en) * | 2016-08-10 | 2017-01-04 | 四川安嵌科技有限公司 | Equipment multiplexing method and device applied to multiple systems |
CN108009103A (en) * | 2017-11-28 | 2018-05-08 | 中国船舶重工集团公司第七六研究所 | A kind of device PCI sort method of VxWorks system |
CN107967223A (en) * | 2017-12-07 | 2018-04-27 | 郑州云海信息技术有限公司 | A kind of multiple product lines versatility code architecture system |
CN109117390A (en) * | 2018-08-09 | 2019-01-01 | 山东中孚安全技术有限公司 | A kind of Linux kernel module obtains the method and system of usb_bus_type symbolic address |
CN109656844A (en) * | 2018-12-03 | 2019-04-19 | 郑州云海信息技术有限公司 | A kind of AT24xx EEPROM driving method and device |
CN111290827A (en) * | 2018-12-07 | 2020-06-16 | 华为技术有限公司 | Data processing method and device and server |
CN112947863A (en) * | 2021-03-25 | 2021-06-11 | 北京计算机技术及应用研究所 | Method for combining storage spaces under Feiteng server platform |
CN113032103A (en) * | 2021-04-14 | 2021-06-25 | 中南大学 | VF (variable frequency) resource dynamic scheduling method based on SR-IOV (scheduling request-input/output) function of high-speed network card |
CN113515387A (en) * | 2021-09-13 | 2021-10-19 | 渔翁信息技术股份有限公司 | Data processing method and device and electronic device |
Non-Patent Citations (4)
Title |
---|
FLORIAN SKOPIK;TIMEA PAHI: "Under false flag: using technical artifacts for cyber attack attribution", 《CYBERSECURITY》, 20 March 2020 (2020-03-20), pages 1 - 20 * |
彭滨;: "Linux系统PCI设备驱动程序的实现方法", 中国高新技术企业, no. 15, 1 August 2008 (2008-08-01), pages 125 - 126 * |
杨志强,王厚军,李力: "Linux 系统下的PCI 串口设备驱动", 《电子测量技术》, pages 58 - 60 * |
陈德平;: "数控PCI接口设备卡Linux驱动程序的开发", 产业与科技论坛, no. 18, 30 September 2013 (2013-09-30), pages 67 - 68 * |
Also Published As
Publication number | Publication date |
---|---|
CN114546500B (en) | 2024-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100464313C (en) | Mobile memory device and method for accessing encrypted data in mobile memory device | |
Ntantogian et al. | Evaluating the privacy of Android mobile applications under forensic analysis | |
CN103595790A (en) | Remote accessing method for device, thin client side and virtual machine | |
US9171178B1 (en) | Systems and methods for optimizing security controls for virtual data centers | |
CN109656844B (en) | AT24xx EEPROM driving method and device | |
CN104636186A (en) | Virtual machine memory management method, physical host, PCIE equipment, configuration method thereof and migration management equipment | |
CN114625481A (en) | Data processing method and device, readable medium and electronic equipment | |
CN110719590B (en) | One-key login method, device, equipment and storage medium based on mobile phone number | |
CN114691300A (en) | Hot migration method of virtual machine instance | |
CN112015476B (en) | Display card driving method and device, electronic equipment and storage medium | |
CN112925606A (en) | Memory management method, device and equipment | |
CN116522368A (en) | Firmware decryption analysis method for Internet of things equipment, electronic equipment and medium | |
US9659156B1 (en) | Systems and methods for protecting virtual machine program code | |
CN114546500B (en) | Method and system for realizing password card drive supporting multiple devices | |
CN110737678B (en) | Data searching method, device, equipment and storage medium | |
CN109587205B (en) | Shared directory creation mounting method and related equipment | |
US9286302B2 (en) | Inode reuse systems and methods | |
US8543830B1 (en) | Method and apparatus for connecting to a security token without restarting an application | |
CN110109849B (en) | CAN equipment driving device and method based on PCI bus | |
CN111382441B (en) | Application processor, coprocessor and data processing equipment | |
CN114036085A (en) | Multitask read-write scheduling method based on DDR4, computer equipment and storage medium | |
CN115687223A (en) | Method and device for serial port communication of embedded equipment, embedded equipment and storage medium | |
CN111966486A (en) | Data acquisition method, FPGA system and readable storage medium | |
CN112597053A (en) | User interface automatic testing method and device with safety control | |
CN100464276C (en) | Method and system for allocating and protecting subscriber software-hardware configuration information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |