CN117539615A - Memory protection method and memory of operating system - Google Patents

Memory protection method and memory of operating system Download PDF

Info

Publication number
CN117539615A
CN117539615A CN202311317209.6A CN202311317209A CN117539615A CN 117539615 A CN117539615 A CN 117539615A CN 202311317209 A CN202311317209 A CN 202311317209A CN 117539615 A CN117539615 A CN 117539615A
Authority
CN
China
Prior art keywords
memory
processing thread
data
partition
thread
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311317209.6A
Other languages
Chinese (zh)
Inventor
刘宏倩
赵建森
张晓先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ISOFT INFRASTRUCTURE SOFTWARE CO Ltd
Original Assignee
ISOFT INFRASTRUCTURE SOFTWARE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ISOFT INFRASTRUCTURE SOFTWARE CO Ltd filed Critical ISOFT INFRASTRUCTURE SOFTWARE CO Ltd
Priority to CN202311317209.6A priority Critical patent/CN117539615A/en
Publication of CN117539615A publication Critical patent/CN117539615A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a memory protection method and a memory of an operating system, comprising the following steps: step S1: the method comprises the steps that access rights are predetermined for processing threads to be created when an application program in an operating system runs; step S2: constructing a permission mapping table of the processing thread corresponding to the memory area according to the access permission so as to determine the memory partition which can be actually used by the processing thread; step S3: and running the processing thread, wherein the processing thread only accesses the data in the memory partition when running. The beneficial effects are that: the corresponding access rights are configured for the processing thread in advance, and when the processing thread runs, the memory partition corresponding to the specific data category is configured according to the access rights and the mapping is established, so that the processing thread only resets the access rights of the specific area of the partition corresponding to the right table to which the thread belongs when switching, a better memory protection effect is realized, the power consumption is saved, and the instantaneity is improved.

Description

Memory protection method and memory of operating system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a memory protection method and a memory for an operating system.
Background
In an embedded system, a memory is used to temporarily store operation data in a CPU and data exchanged with an external memory such as a hard disk. When the corresponding application program needs to be run, the operating system can call corresponding codes, data and the like from the storage to be stored in the memory so as to read, execute and write the application program when the application program runs. In order to achieve better security, stability and reliability of the embedded system, a corresponding memory protection mechanism is generally required to be configured to manage access and operation authority of the memory, so that erroneous access is avoided.
In the prior art, there are many technical solutions for memory protection, for example, chinese patent CN201811619460.7 discloses a memory access method, a memory access controller and a system on chip, and the method includes: a receiving step, namely receiving a memory access request from a memory access module through a bus, wherein the memory access request comprises an identification of the memory access module and a domain name of a memory area to be accessed; and a detection processing step, namely detecting the memory access request according to the currently stored memory access request and a preset memory access control table, correspondingly processing the memory access request according to a detection result, obtaining an updated memory access request, detecting the updated memory access request, and transmitting an access result of the memory access request to a corresponding memory access module according to the detection result. The invention can effectively protect the memory, avoid the leakage of sensitive information and can efficiently access the memory.
However, in the practical implementation process, the inventor finds that the technical scheme is large in time consumption and affects instantaneity because the software layer is relied on to intercept the memory access request, process the data of the appointed page, determine that the memory access request can be accessed and then released, and reset the whole memory protection unit when the threads are switched.
Disclosure of Invention
Aiming at the problems in the prior art, a memory protection method of an operating system is provided; in another aspect, a memory for implementing the memory protection method is also provided.
The specific technical scheme is as follows:
a memory protection method for an operating system, comprising:
step S1: determining access rights in advance for a processing thread to be created when an application program in the operating system runs;
step S2: constructing a permission mapping table of the processing thread corresponding to the memory area according to the access permission so as to determine the memory partition which can be actually used by the processing thread;
the memory partitions are determined according to the data types of the memory data to be accessed by the processing threads, and each memory partition is used for storing the memory data of one data type;
step S3: and running the processing thread, wherein the processing thread only accesses the data in the specific memory partition according to the authority mapping table during running.
On the other hand, the step S1 includes:
step S11: acquiring an application to which the processing thread belongs for the processing thread;
step S12: acquiring classification information of the application;
the classification information includes: untrusted applications and trusted applications;
step S13: and determining the access rights of the processing threads according to the classification information.
On the other hand, the access rights comprise a plurality of groups of data category rights, each group of data category rights respectively corresponds to one data category, and each group of data category rights also respectively comprises task access rights and interrupt access rights;
when the processing thread runs through a task, determining the actual access authority of the processing thread to the memory partition corresponding to each data category based on the task access authority;
when the processing thread runs through interruption, determining the actual access authority of the processing thread to the memory partition corresponding to each data type based on the interruption access authority;
the actual access authority is as follows: no rights or read-only or execute or read-write.
In another aspect, the data categories include: the code outside the application, the data outside the application, the private data of the application, the code of the processing thread, the data of the processing thread, the stack of the processing thread, the code of the other threads of the application, the data of the other threads, the stack of the other threads, and the peripheral interface.
On the other hand, a plurality of memory partitions form a memory partition group, and each memory partition group is respectively constructed for the memory data of one application.
On the other hand, after the step S3, the method further includes:
step S4: and acquiring the running state of the processing thread, and when the running state is switched, re-determining the access authority of the processing thread and adjusting the memory partition.
On the other hand, the step S4 includes:
step S41: acquiring the running state and judging whether thread switching occurs or not;
if yes, go to step S42;
if not, returning to the step S41;
step S42: determining the update application category of the processing thread according to the partition number to be accessed by the processing thread after the thread is switched;
the update application category includes: switching from the trusted application to another one of the trusted applications, from the untrusted application to another one of the untrusted applications, from the trusted application to the untrusted application, from the untrusted application to the trusted application;
step S43: determining a partition to be initialized according to the updated application category, and then initializing the partition to be initialized to form an available memory partition;
and the processing thread after the thread switching accesses the available memory partition to acquire memory data.
On the other hand, the process of executing the step S43 further includes:
judging whether the processing thread needs to cross the memory partition group or not, and adjusting the partition to be initialized according to a judging result.
A memory having stored therein computer instructions adapted to be executed in a computer device, which when executed by the computer device, performs the memory protection method described above.
The technical scheme has the following advantages or beneficial effects:
aiming at the problems of larger load and poorer timeliness of a memory protection mechanism in the prior art, in the scheme, the corresponding access authority is pre-configured around a processing thread which is created when an application program runs, and when the processing thread runs, a memory partition corresponding to a specific data category is configured according to the access authority and a mapping is established, so that the processing thread only resets the access authority of a specific area of a partition corresponding to the authority table to which the thread belongs when switching, thereby realizing better memory protection effect, saving power consumption and improving instantaneity.
Drawings
Embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The drawings, however, are for illustration and description only and are not intended as a definition of the limits of the invention.
FIG. 1 is an overall schematic of an embodiment of the present invention;
FIG. 2 is a schematic diagram of the substep of step S1 in the embodiment of the invention;
FIG. 3 is a schematic diagram of step S4 in an embodiment of the present invention;
fig. 4 is a schematic diagram of the substep of step S4 in the embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention is further described below with reference to the drawings and specific examples, which are not intended to be limiting.
The invention comprises the following steps:
as shown in fig. 1, a memory protection method of an operating system includes:
step S1: the method comprises the steps that access rights are predetermined for processing threads to be created when an application program in an operating system runs;
step S2: constructing a permission mapping table of the processing thread corresponding to the memory area according to the access permission so as to determine the memory partition which can be actually used by the processing thread;
the memory partitions are determined according to the data types of the memory data to be accessed by the processing threads, and each memory partition is used for storing the memory data of one data type;
step S3: and running the processing thread, wherein the processing thread only accesses the data in the specific memory partition according to the authority mapping table when running.
Specifically, in the embodiment, corresponding access rights are pre-allocated for processing threads generated by an operating system during running, where the access rights are associated with data types accessible by the processing threads during running, for example, codes outside the application, data outside the application, and the like. Then, when the application program is actually running, the physical memory can be divided according to the data types of the related data contained in the application program, and a plurality of memory partitions can be configured, wherein each memory partition is used for storing the memory data of one data type, such as codes, private data, stacks and the like. It should be noted that, according to the data required by the application program, multiple memory partitions may be established, where the memory partitions correspond to actual physical memory addresses, and not all the memory partitions are accessible or operable by the current processing thread. After the memory partition is established, the memory partition which can be accessed by the processing thread can be determined based on the access right configured for the current processing thread, and a corresponding mapping relation is established to form a right mapping table. During actual running, the processing thread can only execute specific operations, such as read-only, execution, writing and the like, on specific memory partitions through the permission mapping table, so that a finer memory protection mechanism is realized, other data are not easy to leak, meanwhile, the thread only resets the access permission of the specific area of the partition corresponding to the permission table to which the thread belongs during switching, the permission table is calculated well when an operating system is started, and subsequent threads are directly read and used during switching. .
In the implementation process, as shown in fig. 2, step S1 includes:
step S11: acquiring an application of a processing thread aiming at the processing thread;
step S12: acquiring classification information of the application;
the classification information includes: untrusted applications and trusted applications;
step S13: and determining the access rights of the processing threads according to the classification information.
The access rights comprise a plurality of groups of data category rights, and each group of data category rights corresponds to one data category respectively;
the data categories include: code outside of the application, data outside of the application, private data of the application, code of a processing thread, data of a processing thread, a stack of a processing thread, code of other threads of the application, data of other threads, stacks of other threads, and a peripheral device interface.
In the operating system, the configuration of the threads is static configuration, and the threads are not dynamically created in the running process of the system, so that the overall memory layout and the thread position are determined. Each processing thread has its own application, which can be classified into untrusted and trusted applications according to a pre-defined hierarchy. The data types which can be accessed by the processing threads and are generated by each type of application can be configured aiming at the untrusted application and the trusted application, and in the subsequent process of creating the memory partition, the corresponding memory partition is respectively built around the data types so as to control the memory data which can be operated by the processing threads.
It should be noted that the above classification information is only a simpler embodiment, and other partitions may be also included in the implementation process, for example, the trusted application may be subdivided into a trusted application with protection, a trusted application without protection, and the like.
Further, in order to achieve a more accurate control effect, each group of data category authorities also respectively comprises a task access authority and an interrupt access authority;
when the processing thread runs through the task, determining the actual access authority of the processing thread to the memory partition corresponding to each data category based on the task access authority;
when the processing thread runs through the interrupt, determining the actual access authority of the processing thread to the memory partition corresponding to each data category based on the interrupt access authority;
the actual access rights are: no rights or read-only or execute or read-write.
Specifically, considering that the actual system is executing, the corresponding application program needs to be started and the processing thread is created by means of Task scheduling (Task) or interrupt trigger (ISR). Therefore, by selecting to control the access rights by further combining with the application scene when the process thread is created when the access rights are configured for each data category, more accurate configuration effect can be realized.
According to the above mechanism, a more complete authority configuration table can be formed, as shown in table 1:
TABLE 1
According to the authority configuration table, after the memory partition corresponding to the data category is created, the access authority of the thread to the memory partition of the specific data category can be processed under the condition that different triggers are configured according to the authority configuration table. Meanwhile, after the memory partitions are created, a plurality of memory partitions form a memory partition group, and each memory partition group is respectively constructed for memory data of one application, so that a processing thread can access the data in a specific memory partition and execute corresponding operation.
In one embodiment, as shown in fig. 3, after step S3, the method further includes:
step S4: acquiring the running state of the processing thread, and when the running state is switched, re-determining the access authority of the processing thread and adjusting the memory partition.
Specifically, considering the problem that the processing thread may be switched during the actual running process, and thus the memory management mechanism is invalid, in this embodiment, after the mapping relationship between the processing thread and the memory partition is established, the state of the processing thread is further monitored, so as to obtain the running state of the processing thread, and when the thread is switched, the corresponding memory partition is redetermined, so that a better protection effect is achieved, and meanwhile, as the operation process of the thread itself is not required to be identified, the occupation of resources is reduced.
In one embodiment, as shown in fig. 4, step S4 includes:
step S41: acquiring an operation state and judging whether thread switching occurs or not;
if yes, go to step S42;
if not, returning to step S41;
step S42: determining the update application category of the processing thread according to the partition number to be accessed by the processing thread after the thread is switched;
updating the application category includes: switching from a trusted application to another trusted application, from an untrusted application to another untrusted application, from a trusted application to an untrusted application, from an untrusted application to a trusted application;
step S43: determining a partition to be initialized according to the update application category, and then initializing the partition to be initialized to form an available memory partition;
and the processing thread after the thread switching accesses the available memory partition to acquire the memory data.
Specifically, in order to achieve a better allocation effect, in this embodiment, the identification process is further constructed, after the processing thread is switched according to the partition number to be accessed by the processing thread after the thread is switched, the change of the theoretical security level is determined, and then the memory area needing to be initialized and the access authority and the mapping relation are selected, so that the security of the memory data in the switching process is improved.
The identification process is a parallel process performed by the processing thread when the processing thread normally executes corresponding processing, and judges whether specific initialization operation is needed by monitoring the running state and judging whether thread switching occurs or not; when there is no thread switch, only the monitoring of the running state is maintained without processing the memory partition until the processing thread exits or shuts down.
In one embodiment, the step S43 further includes:
judging whether the processing thread needs to cross the memory partition group or not, and adjusting the partition to be initialized according to the judging result.
Specifically, in the process of determining the memory partition to be initialized, in order to achieve better memory security, whether the processing thread needs to access the memory partition outside the current memory partition group is further determined, if yes, the memory partition to be initialized is increased to improve the security.
In one embodiment, 1 st to 13 th memory partitions, respectively 1 st and code starting sections, are sequentially arranged in a memory partition group of a certain application program; 2. an application code start section; 3. the application code segment; 4. an application code ending section; 5. a code ending section; 6. a data start section; 7. a private data start segment; 8. applying the private data segment; 9. a thread data start segment; 10. a thread data segment; 11. a thread data end segment; 12. application data end section and 13, external device section.
When triggering thread switching, the partition numbers before and after switching are firstly identified and classified into the following categories:
switching from a trusted application to another trusted application, from an untrusted application to another untrusted application, from a trusted application to an untrusted application, from an untrusted application to a trusted application;
and then judging whether the switching of the threads is to cross the memory partition group or not, and finally generating the memory partition which needs to be initialized.
For example, when switching from a trusted application to another trusted application:
if the thread switching needs to cross the partition, the 9, thread data initial segment needs to be reinitialized at most; 10. a thread data segment; 11. a thread data end segment;
if the partition is not needed to be crossed, only initializing 10 and thread data segments;
upon switching from an untrusted application to another untrusted application:
if the thread switching needs to cross the partition, 4 is needed to be reinitialized at most, and the code ending section is applied; 5. a code ending section; 6. a data start section; 9. a thread data start segment; 10. a thread data segment; 11. a thread data end segment;
if the partition is not needed to be crossed, only initializing 10 and thread data segments;
when switching from a trusted application to an untrusted application, or vice versa, all of the memory partitions of 2-11 need to be initialized.
A memory having stored therein computer instructions adapted to be executed in a computer device, which when executed by the computer device, performs the memory protection method described above.
When the computer device reads the computer instruction, the operating system loads the instruction, and controls the processing thread of the application program and creates the memory partition according to the memory protection method.
The memory may be a computer readable signal medium or a computer readable storage medium. The computer-readable storage medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing, such as Random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable read-only memory (CD-ROM).
A processor in the computer reads the computer instructions stored in the memory so that the processor can perform the functional actions specified in each step in the flowchart, or a combination of steps; a means for generating a functional action specified in each block of the block diagram or a combination of blocks.
It should be appreciated that a processor in a computer may be understood as one or more Application Specific Integrated Circuits (ASICs), DSPs, programmable Logic Devices (PLDs), complex Programmable Logic Devices (CPLDs), field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers (MCUs), microprocessors (microprocessors), or other electronic element implementations for executing the aforementioned computer instructions.
The computer instructions may execute entirely on the user's local computer, partly on the user's local computer, as a stand-alone software package, partly on the user's local computer and partly on a remote computer or entirely on the remote computer or server. It should also be noted that in some alternative implementations, the functions noted in the flowchart steps or blocks in the block diagrams may occur out of the order noted in the figures. For example, two steps or blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the embodiments and scope of the present invention, and it should be appreciated by those skilled in the art that equivalent substitutions and obvious variations may be made using the description and illustrations of the present invention, and are intended to be included in the scope of the present invention.

Claims (9)

1. A memory protection method for an operating system, comprising:
step S1: determining access rights in advance for a processing thread to be created when an application program in the operating system runs;
step S2: constructing a permission mapping table of the processing thread corresponding to the memory area according to the access permission so as to determine the memory partition which can be actually used by the processing thread;
the memory partitions are determined according to the data types of the memory data to be accessed by the processing threads, and each memory partition is used for storing the memory data of one data type;
step S3: and running the processing thread, wherein the processing thread only accesses the data in the specific memory partition according to the authority mapping table during running.
2. The memory protection method according to claim 1, wherein the step S1 includes:
step S11: acquiring an application to which the processing thread belongs for the processing thread;
step S12: acquiring classification information of the application;
step S13: and determining the access rights of the processing threads according to the classification information.
3. The memory protection method according to claim 2, wherein the access rights include a plurality of sets of data category rights, each set of data category rights corresponding to a data category, each set of data category rights further including a task access right and an interrupt access right, respectively;
when the processing thread is triggered by task scheduling, determining the actual access authority of the processing thread to the memory partition corresponding to each data category based on the task access authority;
when the processing thread is triggered by the interrupt, determining the actual access authority of the processing thread to the memory partition corresponding to each data type based on the interrupt access authority.
4. The memory protection method of claim 2, wherein the data class comprises: the code outside the application, the data outside the application, the private data of the application, the code of the processing thread, the data of the processing thread, the stack of the processing thread, the code of the other threads of the application, the data of the other threads, the stack of the other threads, and the peripheral interface.
5. The memory protection method of claim 2, wherein a plurality of said memory partitions form a memory partition group, each said memory partition group being constructed for memory data of one said application.
6. The memory protection method according to claim 5, further comprising, after the step S3:
step S4: and acquiring the running state of the processing thread, and when the running state is switched, re-determining the access authority of the processing thread and adjusting the memory partition.
7. The memory protection method according to claim 6, wherein the step S4 includes:
step S41: acquiring the running state and judging whether thread switching occurs or not;
if yes, go to step S42;
if not, returning to the step S41;
step S42: determining the update application category of the processing thread according to the partition number to be accessed by the processing thread after the thread is switched;
step S43: determining a partition to be initialized according to the updated application category, and then initializing the partition to be initialized to form an available memory partition;
and the processing thread after the thread switching accesses the available memory partition to acquire memory data.
8. The memory protection method according to claim 7, further comprising, in performing the step S43:
judging whether the processing thread needs to cross the memory partition group or not, and adjusting the partition to be initialized according to a judging result.
9. A memory having stored therein computer instructions adapted to be executed in a computer device, wherein the memory protection method according to any of claims 1-8 is performed when the computer device executes the computer instructions.
CN202311317209.6A 2023-10-11 2023-10-11 Memory protection method and memory of operating system Pending CN117539615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311317209.6A CN117539615A (en) 2023-10-11 2023-10-11 Memory protection method and memory of operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311317209.6A CN117539615A (en) 2023-10-11 2023-10-11 Memory protection method and memory of operating system

Publications (1)

Publication Number Publication Date
CN117539615A true CN117539615A (en) 2024-02-09

Family

ID=89784983

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311317209.6A Pending CN117539615A (en) 2023-10-11 2023-10-11 Memory protection method and memory of operating system

Country Status (1)

Country Link
CN (1) CN117539615A (en)

Similar Documents

Publication Publication Date Title
TWI655643B (en) Area identification operation for identifying an area of a memory attribute unit corresponding to a target memory address
JP3023425B2 (en) Data processing device
TW201015323A (en) Secure information processing
CN112639779A (en) Security configuration for translation of memory addresses from object-specific virtual address space to physical address space
JP5433349B2 (en) Data processor
US11586779B2 (en) Embedded system and method
JPH08272625A (en) Device and method for multiprogram execution control
EP2996043B1 (en) Debugging in a data processing apparatus
KR20160019454A (en) Security protection of software libraries in a data processing apparatus
US8850601B2 (en) Systems and methods of determining a trust level from system management mode
CN116578341A (en) Processor, interrupt isolation method, instruction simulation method, system on chip and device
CN117234729B (en) Dynamic memory protection method, device, computer equipment and storage medium
CN113449292B (en) Running method, device and equipment of trusted application
KR102646630B1 (en) Method to issue write protect commands on dynamic random-access memory(dram) cells in a system run-time environment
CN114282206A (en) Stack overflow detection method, device, embedded system and storage medium
CN114641769A (en) Safety measuring device and method for processor
CN117539615A (en) Memory protection method and memory of operating system
US20180260563A1 (en) Computer system for executing analysis program, and method of monitoring execution of analysis program
JP7569307B2 (en) Apparatus and method for handling exception cause events - Patents.com
CN114201752B (en) Page table management method and device for security isolation virtual machine and related equipment
EP4095725A1 (en) Electronic device and security protection method
RU2780973C2 (en) Response with processor function identifier for virtualization
US20230066447A1 (en) Execution of code in system memory
CN109190383B (en) Access instruction processing method, device and equipment
EP4372551A1 (en) Virtual machine management method and related system, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination