JPS60142452A - Storage protecting system - Google Patents

Storage protecting system

Info

Publication number
JPS60142452A
JPS60142452A JP58250026A JP25002683A JPS60142452A JP S60142452 A JPS60142452 A JP S60142452A JP 58250026 A JP58250026 A JP 58250026A JP 25002683 A JP25002683 A JP 25002683A JP S60142452 A JPS60142452 A JP S60142452A
Authority
JP
Japan
Prior art keywords
flag
area
writing
address
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP58250026A
Other languages
Japanese (ja)
Inventor
Yasuo Baba
馬場 康夫
Masao Sato
正雄 佐藤
Akira Kabemoto
河部本 章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP58250026A priority Critical patent/JPS60142452A/en
Publication of JPS60142452A publication Critical patent/JPS60142452A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

PURPOSE:To protect an area to be inhibited from writing of data precisely by setting up a flag bit for displaying whether data writing in said area is to be permited or not in accordance with the area having a fixed size. CONSTITUTION:When the IPL of a control program to a storage device 2 is ended, the end is informed to a flag writing control part 4 by a signal S and an address control part 1 generates an address in an area to be inhibited from writing. The data concerned are stored in a register 5. At that time, the control part 4 generates a flag, stores the flag in a flag setting part 6 and rewrites the flag on the formed address position in the storage device 2. Consequently, the flag is displayed in a flag display part 3 corresponding to the address concerned. After repeating said operation and ending the writing of all flags, the status is informed to the control program by a signal E and the system is opened. Then, the data writing to the storage device 2 is inhibited by the contents of a flag detecting part 7.

Description

【発明の詳細な説明】 (1)本発明は通信制御処理装置の記憶部における割り
込み起動アドレス領域等の重要な領域を保護するだめの
方式に関するものである。
DETAILED DESCRIPTION OF THE INVENTION (1) The present invention relates to a method for protecting important areas such as an interrupt activation address area in a storage section of a communication control processing device.

(2)従来技術と問題点 従来、通信制御処理装置における記憶部のデータを保護
する方式として、キー比較方式があった。これは一定記
憶領域を単位としてキーを設定し、実行中のプログラム
が持つ保護キーとの比較によって記憶部へのアクセスを
制限するものである。そして、実際には、優先度の低い
プログラム(例えばユーザプログラム等)やサイクルス
チールによるアクセスについて監視し又いて、これらが
、制′約を越えてアクセスをしようとしたとき割り込み
を発生して措置している。
(2) Prior Art and Problems Conventionally, there has been a key comparison method as a method for protecting data in a storage unit in a communication control processing device. In this method, a key is set for a certain storage area, and access to the storage section is restricted by comparing it with the protection key held by the program being executed. In reality, it monitors accesses caused by low-priority programs (such as user programs) or cycle steals, and takes measures by generating an interrupt when these programs attempt to access beyond the constraints. ing.

通信制御処理装置の記憶部には各種割シ込みを処理する
ためのプログラムが、優先順にレベルを定めて格納しで
ある「割シ込み起動アドレス領域」が割シ付けられてい
る。この領域は、重要な領域であるから前述のキー比較
方式等によシ記憶の保護が為されているが、優先順位の
高いプログラム(例工ばスーパバイザモードで走行する
プログラム)によるアクセスの場合は保護されないと太
う問題点があった。
The storage section of the communication control processing device is allocated with an "interrupt start address area" in which programs for processing various interrupts are stored with levels determined in order of priority. Since this area is an important area, its storage is protected using the key comparison method described above, but when accessed by a program with a high priority (for example, a program running in supervisor mode), The problem was that they would gain weight if not protected.

前記[割り込み起動アドレス領域」の内容が万一破壊さ
れたような場合には、その性格上原因の究明が非常に困
難である。
If the contents of the above-mentioned "interrupt activation address area" were to be destroyed, it would be extremely difficult to investigate the cause due to its nature.

しかし、通信制御プログラムは、性能向上や機能追加な
どのためのデバッグや端末機の収容変更に係るシステム
生成(SG)等の機会が多く、そのためのプログラムミ
スや障害の発生などのために「割υ込み起動アドレス領
域」が誤ったアクセスによシ破壊されると云う事態がし
ばしば起こり得る。
However, communication control programs have many opportunities for debugging to improve performance and add functions, and system generation (SG) to change terminal accommodation, and there are many opportunities for debugging to improve performance and add functions, and system generation (SG) to change terminal accommodation. A situation can often occur in which the υinclusive startup address area is destroyed by an erroneous access.

このようなとき、従来のキー比較方式では。In such cases, the traditional key comparison method.

不当なアクセスから「割)込み起動アドレス領域」のよ
うな重要な領域を保護することが不可能であると云う欠
点があった。
The drawback is that it is impossible to protect important areas such as the "interrupt activation address area" from unauthorized access.

(3) 発明の目的 本発明は上記従来の欠点に鑑み、通信制御処理装置の記
憶部の「割シ込み起動アドレス領域」のように、重要で
、その領域が破壊されると、与える影響が大であるだけ
でなく、その原因の探索が非常に困難であるような領域
を確実に保護することの出来る方式を提供することを目
的としている。
(3) Purpose of the Invention In view of the above-mentioned drawbacks of the conventional art, the present invention solves the problem of an important area such as an "interrupt start address area" in the storage section of a communication control processing device, and if such an area is destroyed, it will have a negative impact. The purpose of this invention is to provide a method that can reliably protect areas that are not only large in size, but also for which it is extremely difficult to find the cause.

(4)発明の構成 そして、この目的は本発明によれば、特許請求の範囲に
記載のとお)、情報処理装置または通信制御処理装置の
制御プログラムを格納する記憶装置において、一定の大
きさの仰域ごとに対応していて該領域にデータの書き込
みを許容するかまたは拒否するかを表示するフラグビッ
トを設け、制御プログラムのイニシアルプログラムロー
ド終了後、該フラグビットの表示をハードウェア的に書
き込む手段と、フラグビットが書き込み拒否状態を表示
しているときは該フラグビットに対応する領域へのデー
タの書き込みを禁止する手段とを有することを特徴とす
る記憶保護方式にょυ達成される。
(4) Structure of the Invention According to the present invention, this object is to store a control program of a certain size in a storage device for storing a control program of an information processing device or a communication control processing device. A flag bit is provided that corresponds to each area and indicates whether writing of data is permitted or denied in that area, and after the initial program load of the control program is completed, the indication of the flag bit is written in hardware. This is accomplished by a memory protection method characterized by comprising means for inhibiting data from being written to an area corresponding to the flag bit when the flag bit indicates a write-rejected state.

(5)発明の実施例 第1図は本発明の1実施例のブロック図であって、1は
アドレス制御部、2は記憶装置、3はフラグ表示部、4
はフラグ書き込み制御部、5はレジスタ、6はフラグ・
セット部、7はフラグ検出部を表わしており、Sは制御
プログラムのIPLが終了したとき発出される信号、E
はフラグ書き込みが終了したことを制御プログラムに通
知する信号、工はフラグの書き込み拒否状態を検出した
ことを通知する信号である。Aは「割シ込み起動アドレ
ス領域」で制御プログラムのIPL終了後は書き込みが
禁止される領域を示している。
(5) Embodiment of the invention FIG. 1 is a block diagram of an embodiment of the invention, in which 1 is an address control section, 2 is a storage device, 3 is a flag display section, and 4 is a block diagram of an embodiment of the invention.
is a flag write control unit, 5 is a register, and 6 is a flag write control unit.
The set part, 7 represents a flag detection part, S is a signal issued when the IPL of the control program is completed, and E
is a signal that notifies the control program that flag writing has been completed, and is a signal that notifies that a flag writing refusal state has been detected. A indicates an "interrupt start address area", which is an area in which writing is prohibited after the IPL of the control program is completed.

第1図において、記憶装置2への制御プログラムのIP
Lが終了すると、信号Sによってフラグ書き込み制御部
4に知らされ、アドレス制御部1で臀き込みを禁止すべ
き領域(第1図のAで示される領域)のアドレスを生成
して、当該データを読み出してレジスタ5に格納する。
In FIG. 1, the IP of the control program to the storage device 2 is
When L ends, the flag writing control unit 4 is notified by the signal S, and the address control unit 1 generates the address of the area (indicated by A in FIG. 1) where glutes should be prohibited, and writes the data. is read and stored in register 5.

このときフラグ書き込み制御部4はフラグ(“1#)を
生成してフラグ・セット部6に格納して、これらのデー
タとフラグを記憶装置2の先に該データを読み出したア
ドレス位置に再び書き込む。この結果として当該アドレ
スのフラグ表示部3は11′″が表示される。このよう
な動作を繰シ返すことにょシ、Aで示される領域内のフ
ラグ表示部3の各フラグは″1#を表示する。ひと−っ
のフラグが対応する領域の大きさは必要に応じて任意に
設定出来るが本例で4バイトごとにフラグを持つ如く設
定されている。領域Aについてのすべてのフラグの書き
込みが終了すると信号Eによって制御プログラムに通知
されシステムがオープンする。
At this time, the flag write control unit 4 generates a flag (“1#”), stores it in the flag set unit 6, and writes these data and the flag again to the address location from which the data was read in the storage device 2. As a result, 11'' is displayed on the flag display section 3 of the address. By repeating this operation, each flag on the flag display section 3 in the area indicated by A will display "1#." The size of the area to which each flag corresponds may be adjusted as necessary. Although it can be set arbitrarily, in this example, it is set so that every 4 bytes has a flag. When all the flags for area A have been written, the control program is notified by signal E and the system is opened.

その後、記憶装置2へのデータの書き込みに際しては、
当該アドレスのフラグが、レジスタ5のフラグ・セット
部6に読み出されてフラグ検出部7によシ検査され、該
フラグが”1#であった場合には信号工によって、書き
込みを阻止すると共に割シ込みを発生して制御プログ2
ムに知らせる。これらの制御はすべてハードウェアで行
なわれる。
After that, when writing data to the storage device 2,
The flag at the address is read out by the flag setting section 6 of the register 5 and checked by the flag detection section 7. If the flag is "1#", the signal engineer blocks the writing and Generates an interrupt and controls program 2
Notify Mu. All these controls are performed by hardware.

(6)発明の効果 以上詳細に説明したように本発明の方式によれば、記憶
装置の制御プログラム格納などで制御プログラムのIP
L後はデータの書き込みを禁止したい領域について、ハ
ードウェアが確実に保護するので、ソフトウェアのデバ
ッグやSG等に際するバグ等のため重要な領域を破壊さ
れることが無くなるから、効果は大である。
(6) Effects of the Invention As explained in detail above, according to the system of the present invention, the IP address of the control program is stored in a storage device, etc.
After L, the hardware will reliably protect the area where you want to prohibit writing data, so important areas will not be destroyed due to bugs during software debugging or SG, so the effect is great. be.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の1実施例のブロック図である。 1・・・アドレス制御部、2・・・記憶装置、3・・・
フラグ表示部、4・・・フラグ書き込み制御部、5・・
・レジスタ、6・・・フラグ・セット部、7・・・フラ
グ検出部 第 1 図
FIG. 1 is a block diagram of one embodiment of the present invention. 1...Address control unit, 2...Storage device, 3...
Flag display section, 4...Flag writing control section, 5...
・Register, 6...Flag setting section, 7...Flag detection section Fig. 1

Claims (1)

【特許請求の範囲】[Claims] 情報処理装置または通信制御処理装置の制御プログラム
を格納する記憶装置において、一定の大きさの領域ごと
に対応していて該領域にデータの書き込みを許容するか
または拒否するかを表示するフラグビットを設け、制御
プログラムのイニシアルプログラムロード終了後、該フ
ラグビットの表示をハードウェア的に書き込む手段と、
フラグビットが書き込み拒否状態を表示しているときは
該フラグビットに対応する領域へのデータの書き込みを
禁止する手段とを有することを特徴とする記憶保護方式
。。
In a storage device that stores a control program for an information processing device or a communication control processing device, a flag bit is provided that corresponds to each area of a certain size and indicates whether writing of data to that area is permitted or denied. means for writing an indication of the flag bit in hardware after the initial program loading of the control program is completed;
1. A storage protection system comprising means for prohibiting data from being written to an area corresponding to a flag bit when the flag bit indicates a write-rejected state. .
JP58250026A 1983-12-28 1983-12-28 Storage protecting system Pending JPS60142452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP58250026A JPS60142452A (en) 1983-12-28 1983-12-28 Storage protecting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP58250026A JPS60142452A (en) 1983-12-28 1983-12-28 Storage protecting system

Publications (1)

Publication Number Publication Date
JPS60142452A true JPS60142452A (en) 1985-07-27

Family

ID=17201730

Family Applications (1)

Application Number Title Priority Date Filing Date
JP58250026A Pending JPS60142452A (en) 1983-12-28 1983-12-28 Storage protecting system

Country Status (1)

Country Link
JP (1) JPS60142452A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS62150438A (en) * 1985-12-24 1987-07-04 Omron Tateisi Electronics Co Program protect device for control equipment
JPS6367696A (en) * 1986-09-06 1988-03-26 ツアイス・イコーン・アクチエンゲゼルシヤフト Non-contact information transmitting method and apparatus
JPH0279295A (en) * 1988-09-16 1990-03-19 Nippon Telegr & Teleph Corp <Ntt> Semiconductor memory

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS62150438A (en) * 1985-12-24 1987-07-04 Omron Tateisi Electronics Co Program protect device for control equipment
JPS6367696A (en) * 1986-09-06 1988-03-26 ツアイス・イコーン・アクチエンゲゼルシヤフト Non-contact information transmitting method and apparatus
JPH0279295A (en) * 1988-09-16 1990-03-19 Nippon Telegr & Teleph Corp <Ntt> Semiconductor memory

Similar Documents

Publication Publication Date Title
US9021605B2 (en) Method and system for protecting sensitive data in a program
US20070266214A1 (en) Computer system having memory protection function
CN103365792A (en) Information processing apparatus, and method of controlling information processing apparatus
CN114282206A (en) Stack overflow detection method, device, embedded system and storage medium
US7680999B1 (en) Privilege promotion based on check of previous privilege level
JPS60142452A (en) Storage protecting system
JPS58211254A (en) Accumulated program controlling system
JPS6074059A (en) Access control system for storage device
JPS58203700A (en) Privacy protecting device for information in memory
JP3047839B2 (en) Single-chip microcomputer
JPS6120160A (en) Method for detecting exception of addressing
JPS6073762A (en) Memory protective system
JPH06202957A (en) Memory protecting device
JPH05225361A (en) Register rewriting system
JPH08241194A (en) Video game system, information processor and software storage means thereof
JP2944080B2 (en) Memory content protection circuit
JPS62232054A (en) Controlling system for stack frame descriptor
JPS61228544A (en) Write protection system
JPH03144751A (en) Memory miswriting preventing device
JPH06309236A (en) Illegal write detecting circuit for memory
JPH05334195A (en) Information processor
JPH0538385A (en) Program copy preventing device
JPS6195464A (en) Data protecting system
JP2002215458A (en) Operating method and configuration for controlling access attribute of memory storage page
JPS6224342A (en) Controller incorporating memory data protection circuit