CN114546500A - Method and system for realizing password card drive supporting multiple devices - Google Patents

Method and system for realizing password card drive supporting multiple devices Download PDF

Info

Publication number
CN114546500A
CN114546500A CN202210105557.6A CN202210105557A CN114546500A CN 114546500 A CN114546500 A CN 114546500A CN 202210105557 A CN202210105557 A CN 202210105557A CN 114546500 A CN114546500 A CN 114546500A
Authority
CN
China
Prior art keywords
pci
equipment
resource structure
structure body
driver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210105557.6A
Other languages
Chinese (zh)
Other versions
CN114546500B (en
Inventor
雷宗华
彭金辉
李鑫
刘武忠
王凯霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN202210105557.6A priority Critical patent/CN114546500B/en
Publication of CN114546500A publication Critical patent/CN114546500A/en
Application granted granted Critical
Publication of CN114546500B publication Critical patent/CN114546500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and a system for realizing a password card drive supporting multiple devices, wherein the method comprises the following steps: creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver; initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card; respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure; using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table; and setting each device resource structure body as private data of the pci device structure body pci _ dev. The invention makes all the pci-e code cards occupy one equipment node of the system, and saves system resources.

Description

Method and system for realizing password card drive supporting multiple devices
Technical Field
The invention relates to the field of computers, in particular to a method and a system for realizing a password card drive supporting multiple devices.
Background
Devices are classified in the linux system into three basic types: character devices, block devices, and network devices. The pci-e password card is generally a character device, and the character device generally realizes system calls such as open, close, write, read and the like. The character device system calls to realize functions required by the user, and the application layer user calls the character device system to complete the operation of the password card. Generally, one pci-e password card needs to associate a device with one character device, needs to create a corresponding device file, and simultaneously needs to apply for one device number, and if a plurality of pci-e devices are inserted into one machine (for example, one card of the pci-e password card supporting virtualization can virtualize 128 pci-e devices), the device numbers of a plurality of linux systems are occupied, too many system resources are occupied, and resource waste is caused.
Disclosure of Invention
Based on the above, it is necessary to provide a method and a system for implementing a cryptographic card driver supporting multiple devices, which can effectively avoid resource waste caused by excessive system resource occupation.
The invention provides a method for realizing a password card drive supporting multiple devices, which comprises the following steps:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
Further, respectively acquiring device resources for each pci-e password card, and storing the device resources in a corresponding device resource structure, specifically comprising:
respectively acquiring I/O resources for each pci-e password card and storing the I/O resources in a corresponding equipment resource structure;
and respectively applying for DMA resources for each pci-e password card and storing the DMA resources in a corresponding equipment resource structure.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, after setting each device resource structure as private data of the driver module pci-dev, the method further includes:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list structure _ head accel _ table by using a function list _ del. .
Further, after setting each device resource structure as private data of the driver module pci-dev, the method further includes:
calling an open function of the character equipment, opening a character equipment file, and acquiring a handle fd of the character equipment file;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
Further, after the device resource structure body matched with the incoming demand information is taken out and saved to the private data of the character device file, the method further comprises the following steps:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
A second aspect further provides a multi-device supporting cryptocard driver implementation system, which is configured to implement the above multi-device supporting cryptocard driver implementation method, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system;
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a detection function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev. Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
The method comprises the steps of establishing equipment nodes under a pci-dev driven by a Linux system, establishing corresponding equipment resource structural bodies for at least one pci-e password card under the equipment nodes, linking each equipment resource structural body to a preset global linked list, and setting each equipment resource structural body as private data of the pci-dev, so that all the pci-e password cards occupy one equipment node of the system to save system resources; and meanwhile, a chain table structure _ head provided by a linux kernel is used, so that operations such as searching, inserting, deleting and the like of a device resource structure body are facilitated, and management of the pci-e password card through the chain table is realized.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart of a cryptographic card driver implementation method supporting multiple devices according to the present invention;
FIG. 2 shows a structural diagram of the global linked list _ head accel _ table according to the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flowchart of a cryptographic card driver implementation method supporting multiple devices according to the present invention.
As shown in fig. 1, a first aspect of the present invention provides a method for implementing a cryptographic card driver supporting multiple devices, where the method includes:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
It can be understood that, in the Linux system driver initialization process, a global linked LIST _ HEAD accel _ table is defined and initialized by using a LIST _ HEAD (accel _ table) function.
Further, respectively acquiring device resources for each pci-e password card, and storing the device resources in a corresponding device resource structure, specifically comprising:
respectively acquiring I/O resources for each pci-e password card and storing the I/O resources in a corresponding equipment resource structure;
and respectively applying for DMA resources for each pci-e password card and storing the DMA resources in a corresponding equipment resource structure.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, after setting each device resource structure to be private data of the pci device structure pci _ dev, the method further includes:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list struct _ head accel _ table by using a function list _ del.
Further, after setting each device resource structure to be private data of the pci device structure pci _ dev, the method further includes:
calling an open function of the character equipment, opening a file of the character equipment, and acquiring a handle fd of the file of the character equipment;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
Further, after the device resource structure body matched with the incoming demand information is taken out and saved to the private data of the character device file, the method further comprises the following steps:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
A second aspect further provides a multi-device supporting cryptocard driver implementation system, which is configured to implement the above multi-device supporting cryptocard driver implementation method, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system;
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources for each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
Further, the device resource structure body comprises the attribute, name, number and occupied memory information of the struct list _ head list and the pci-e password card.
Further, the pci-e cipher card supports a national encryption and decryption algorithm and a signature algorithm.
In order to further explain the technical scheme of the invention, a specific use scenario is given below.
Module initialization: the method comprises the steps of creating character equipment and equipment nodes in a module _ init module of a Linux system driver, then registering a pci-e device driver by using a pci _ register _ driver, and registering a pci device structure body pci _ dev in the system by the pci-e device driver.
Equipment detection: initializing the pci-e password card by a probe function probe driven by the pci-e device, and applying for a device resource structure, wherein the members of the device resource structure comprise struct list _ head list, the attribute, name, number, occupied memory and other information of the password card.
And acquiring the equipment resources, storing the equipment resources into an equipment resource structure, and adding a member struct list _ head list of the equipment resource structure into a global linked list struct _ head accel _ table by using a function list _ add.
If a plurality of pci-e password cards exist, the probe function is executed for a plurality of times, and all the device resource structure bodies are linked to the global linked list struct _ head accel _ table through the probe function, as shown in fig. 2.
Equipment removal: in a removing function remove of a pci-e device driver, a device resource structure body of a target pci-e password card is obtained through private data of a pci device structure body pci _ dev, the position of the device resource structure body in a linked list is found in a global linked list structure _ header _ table by using list _ for _ access _ entry _ safe, and then the device resource structure body in the linked list is deleted by using list _ del.
The device access: calling an open system call of the character equipment, opening a file of the character equipment, acquiring a handle fd of the file of the character equipment, calling an ioctl system call of the character equipment by using the fd, and transmitting the attribute (any one of a name, bdf and a number) of the pci-e password card. And traversing the device resource structure in the global linked list struct _ head access _ table by using a list _ for _ reach _ entry _ safe function, taking out the device resource structure with the attribute matched with the external incoming attribute from the device resource structure, and storing the device resource structure into private data of the character device file.
Reading and writing by equipment: and calling ioctl, write and read system calls of the character equipment through a handle fd of the character equipment file, taking out an equipment resource structural body of the target pci-e password card from private data of the character equipment file by a linux system driver, and realizing access to the target pci-e password card through the equipment resource structural body.
The invention can make all the pci-e code cards occupy one equipment node of the system, and saves system resources. And meanwhile, the operation of searching, inserting, deleting and the like of the equipment resource structure body is carried out by using a global linked list struct _ head accel _ table of the linux system, so that the management of the pci-e password card is realized.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A cryptographic card drive implementation method supporting multiple devices is characterized by comprising the following steps:
creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver;
initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card;
respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure;
using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table;
and setting each device resource structure body as private data of the pci device structure body pci _ dev.
2. The method for realizing the drive of the multi-device supported cryptographic card according to claim 1, wherein the device resource structure includes attribute, name, number, and occupied memory information of a struct list _ head list and a pci-e cryptographic card.
3. The method for implementing the multi-device supporting cryptographic card driver according to claim 2, wherein after the setting of each device resource structure as private data of a pci device structure pci _ dev, the method further comprises:
in a removing function remove of the pci-e device driver, obtaining a target device resource structure body through private data of a pci device structure body pci _ dev;
searching the position of a target equipment resource structure in a global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe;
and based on the found position, deleting the target equipment resource structure body in a global linked list structure _ head accel _ table by using a function list _ del.
4. The method for implementing the multi-device supporting cryptographic card driver according to claim 2, wherein after the setting of each device resource structure as private data of a pci device structure pci _ dev, the method further comprises:
calling an open function of the character equipment, opening a character equipment file, and acquiring a handle fd of the character equipment file;
calling an ioctl function of the character equipment by using the handle fd, and transmitting any required information of attribute, name and number of the pci-e password card;
and traversing the device resource structure in the global linked list struct _ head accel _ table by using a function list _ for _ reach _ entry _ safe, taking out the device resource structure matched with the input demand information from the device resource structure, and storing the device resource structure in the private data of the character device file.
5. The implementation method of claim 4, wherein after the device resource structure body matched with the incoming requirement information is fetched and saved to the private data of the character device file, the method further comprises:
calling ioctl, write and read functions of the character equipment through the handle fd of the character equipment file;
the Linux system drives the device resource structure body corresponding to the pci-e password card to be taken out from the private data of the character device file;
and realizing read-write access to the pci-e password card through the equipment resource structure body.
6. The implementation method of the cryptocard driver supporting multiple devices according to claim 1, wherein the pci-e cryptocard supports a cryptographic encryption and decryption algorithm and a signature algorithm.
7. A multi-device supporting cryptocard driver implementation system, configured to implement the multi-device supporting cryptocard driver implementation method according to any one of claims 1 to 6, where the multi-device supporting cryptocard driver implementation system includes: the system comprises a host end and at least one pci-e password card, wherein the host end is in communication connection with the pci-e password card and is provided with a Linux system; creating character equipment and equipment nodes in a module _ init module driven by a Linux system, registering a pci-e equipment driver in the system by using a pci _ register _ driver, and registering a pci equipment structure body pci _ dev in the system by the pci-e equipment driver; initializing at least one pci-e password card one by a probe function probe driven by the pci-e equipment, and applying for a corresponding equipment resource structure body for each pci-e password card; respectively acquiring I/O (input/output) resources and DMA (direct memory access) resources aiming at each pci-e password card, and storing the I/O resources and the DMA resources in a corresponding equipment resource structure; using a function list _ add to link each equipment resource structure body to a preset global linked list struct _ head accel _ table; and setting each device resource structure body as private data of the pci device structure body pci _ dev.
8. The system for realizing driving of the multi-device supported cryptographic card according to claim 7, wherein the device resource structure includes attribute, name, number, and occupied memory information of the struct list _ head list and the pci-e cryptographic card.
CN202210105557.6A 2022-01-28 2022-01-28 Method and system for realizing password card drive supporting multiple devices Active CN114546500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210105557.6A CN114546500B (en) 2022-01-28 2022-01-28 Method and system for realizing password card drive supporting multiple devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210105557.6A CN114546500B (en) 2022-01-28 2022-01-28 Method and system for realizing password card drive supporting multiple devices

Publications (2)

Publication Number Publication Date
CN114546500A true CN114546500A (en) 2022-05-27
CN114546500B CN114546500B (en) 2024-06-21

Family

ID=81674053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210105557.6A Active CN114546500B (en) 2022-01-28 2022-01-28 Method and system for realizing password card drive supporting multiple devices

Country Status (1)

Country Link
CN (1) CN114546500B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090023923A (en) * 2007-09-03 2009-03-06 주식회사 옥타컴 Sensor device management algorithm in sensor node operating system
CN102866966A (en) * 2012-08-28 2013-01-09 大唐移动通信设备有限公司 Device driver control method and device for Linux operating system
US20150281126A1 (en) * 2014-03-31 2015-10-01 Plx Technology, Inc. METHODS AND APPARATUS FOR A HIGH PERFORMANCE MESSAGING ENGINE INTEGRATED WITHIN A PCIe SWITCH
WO2016091071A1 (en) * 2014-12-11 2016-06-16 北京奇虎科技有限公司 Linux kernel driver loading method and device
WO2016150098A1 (en) * 2015-03-20 2016-09-29 中兴通讯股份有限公司 Pcie apparatus and pcie bus management method and device
CN106293896A (en) * 2016-08-10 2017-01-04 四川安嵌科技有限公司 Equipment multiplexing method and device applied to multiple systems
CN107967223A (en) * 2017-12-07 2018-04-27 郑州云海信息技术有限公司 A kind of multiple product lines versatility code architecture system
CN108009103A (en) * 2017-11-28 2018-05-08 中国船舶重工集团公司第七六研究所 A kind of device PCI sort method of VxWorks system
CN109117390A (en) * 2018-08-09 2019-01-01 山东中孚安全技术有限公司 A kind of Linux kernel module obtains the method and system of usb_bus_type symbolic address
CN109656844A (en) * 2018-12-03 2019-04-19 郑州云海信息技术有限公司 A kind of AT24xx EEPROM driving method and device
CN111290827A (en) * 2018-12-07 2020-06-16 华为技术有限公司 Data processing method and device and server
CN112947863A (en) * 2021-03-25 2021-06-11 北京计算机技术及应用研究所 Method for combining storage spaces under Feiteng server platform
CN113032103A (en) * 2021-04-14 2021-06-25 中南大学 VF (variable frequency) resource dynamic scheduling method based on SR-IOV (scheduling request-input/output) function of high-speed network card
CN113515387A (en) * 2021-09-13 2021-10-19 渔翁信息技术股份有限公司 Data processing method and device and electronic device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090023923A (en) * 2007-09-03 2009-03-06 주식회사 옥타컴 Sensor device management algorithm in sensor node operating system
CN102866966A (en) * 2012-08-28 2013-01-09 大唐移动通信设备有限公司 Device driver control method and device for Linux operating system
US20150281126A1 (en) * 2014-03-31 2015-10-01 Plx Technology, Inc. METHODS AND APPARATUS FOR A HIGH PERFORMANCE MESSAGING ENGINE INTEGRATED WITHIN A PCIe SWITCH
WO2016091071A1 (en) * 2014-12-11 2016-06-16 北京奇虎科技有限公司 Linux kernel driver loading method and device
WO2016150098A1 (en) * 2015-03-20 2016-09-29 中兴通讯股份有限公司 Pcie apparatus and pcie bus management method and device
CN106293896A (en) * 2016-08-10 2017-01-04 四川安嵌科技有限公司 Equipment multiplexing method and device applied to multiple systems
CN108009103A (en) * 2017-11-28 2018-05-08 中国船舶重工集团公司第七六研究所 A kind of device PCI sort method of VxWorks system
CN107967223A (en) * 2017-12-07 2018-04-27 郑州云海信息技术有限公司 A kind of multiple product lines versatility code architecture system
CN109117390A (en) * 2018-08-09 2019-01-01 山东中孚安全技术有限公司 A kind of Linux kernel module obtains the method and system of usb_bus_type symbolic address
CN109656844A (en) * 2018-12-03 2019-04-19 郑州云海信息技术有限公司 A kind of AT24xx EEPROM driving method and device
CN111290827A (en) * 2018-12-07 2020-06-16 华为技术有限公司 Data processing method and device and server
CN112947863A (en) * 2021-03-25 2021-06-11 北京计算机技术及应用研究所 Method for combining storage spaces under Feiteng server platform
CN113032103A (en) * 2021-04-14 2021-06-25 中南大学 VF (variable frequency) resource dynamic scheduling method based on SR-IOV (scheduling request-input/output) function of high-speed network card
CN113515387A (en) * 2021-09-13 2021-10-19 渔翁信息技术股份有限公司 Data processing method and device and electronic device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
FLORIAN SKOPIK;TIMEA PAHI: "Under false flag: using technical artifacts for cyber attack attribution", 《CYBERSECURITY》, 20 March 2020 (2020-03-20), pages 1 - 20 *
彭滨;: "Linux系统PCI设备驱动程序的实现方法", 中国高新技术企业, no. 15, 1 August 2008 (2008-08-01), pages 125 - 126 *
杨志强,王厚军,李力: "Linux 系统下的PCI 串口设备驱动", 《电子测量技术》, pages 58 - 60 *
陈德平;: "数控PCI接口设备卡Linux驱动程序的开发", 产业与科技论坛, no. 18, 30 September 2013 (2013-09-30), pages 67 - 68 *

Also Published As

Publication number Publication date
CN114546500B (en) 2024-06-21

Similar Documents

Publication Publication Date Title
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
Ntantogian et al. Evaluating the privacy of Android mobile applications under forensic analysis
CN103595790A (en) Remote accessing method for device, thin client side and virtual machine
US9171178B1 (en) Systems and methods for optimizing security controls for virtual data centers
CN109656844B (en) AT24xx EEPROM driving method and device
CN104636186A (en) Virtual machine memory management method, physical host, PCIE equipment, configuration method thereof and migration management equipment
CN114625481A (en) Data processing method and device, readable medium and electronic equipment
CN110719590B (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN114691300A (en) Hot migration method of virtual machine instance
CN112015476B (en) Display card driving method and device, electronic equipment and storage medium
CN112925606A (en) Memory management method, device and equipment
CN116522368A (en) Firmware decryption analysis method for Internet of things equipment, electronic equipment and medium
US9659156B1 (en) Systems and methods for protecting virtual machine program code
CN114546500B (en) Method and system for realizing password card drive supporting multiple devices
CN110737678B (en) Data searching method, device, equipment and storage medium
CN109587205B (en) Shared directory creation mounting method and related equipment
US9286302B2 (en) Inode reuse systems and methods
US8543830B1 (en) Method and apparatus for connecting to a security token without restarting an application
CN110109849B (en) CAN equipment driving device and method based on PCI bus
CN111382441B (en) Application processor, coprocessor and data processing equipment
CN114036085A (en) Multitask read-write scheduling method based on DDR4, computer equipment and storage medium
CN115687223A (en) Method and device for serial port communication of embedded equipment, embedded equipment and storage medium
CN111966486A (en) Data acquisition method, FPGA system and readable storage medium
CN112597053A (en) User interface automatic testing method and device with safety control
CN100464276C (en) Method and system for allocating and protecting subscriber software-hardware configuration information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant