WO2023077519A1 - Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique - Google Patents

Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique Download PDF

Info

Publication number
WO2023077519A1
WO2023077519A1 PCT/CN2021/129358 CN2021129358W WO2023077519A1 WO 2023077519 A1 WO2023077519 A1 WO 2023077519A1 CN 2021129358 W CN2021129358 W CN 2021129358W WO 2023077519 A1 WO2023077519 A1 WO 2023077519A1
Authority
WO
WIPO (PCT)
Prior art keywords
address space
operating system
physical address
virtual
controller
Prior art date
Application number
PCT/CN2021/129358
Other languages
English (en)
Chinese (zh)
Inventor
李立
余夕亮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/129358 priority Critical patent/WO2023077519A1/fr
Publication of WO2023077519A1 publication Critical patent/WO2023077519A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements

Definitions

  • the present application relates to the computer field, and in particular, relates to a storage device supporting multiple operating systems, a configuration method and a computer system.
  • a computer needs to support multiple operating systems. For example, for office workers, it is required that a computer can support both the operating system for work and the operating system for private life.
  • the first method is to install different operating systems on different partitions by using the common hard disk partition method.
  • the computer When the computer is started, one of the operating systems will be selected for loading during startup. In this method, no matter which operating system is started, the user can access the data on each partition. For some application scenarios that require a high degree of confidentiality, this method will increase exposure and security risks.
  • the second way is to install virtual machine management software on the hard disk, virtualize multiple virtual machines, and install operating systems on the multiple virtual machines respectively.
  • the data of all virtual machines can still be accessed through the virtual machine management software, and there are still certain exposure risks and security risks. Therefore, there is an urgent need for a storage device, configuration method and computer system supporting multiple operating systems, which can improve security and privacy between multiple operating systems.
  • the present application provides a storage device supporting multiple operating systems, a configuration method and a computer system, which can improve security and privacy between multiple operating systems.
  • a storage device supporting multiple operating systems includes a controller and a storage medium, and the controller is used to: create a first virtual memory, a first address space of the first virtual memory Corresponding to the first physical address space of the storage medium, the first physical address space is used to install the first operating system; creating a second virtual memory, the second address space of the second virtual memory is the same as the storage medium
  • the second physical address space corresponds to the second physical address space, and the second physical address space is used to install the second operating system; and access one of the first operating system and the second operating system; wherein, when accessing the first When operating an operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
  • the storage medium is used to store the multiple operating systems, and can also be used to store managed user data.
  • the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
  • the controller is further configured to: when accessing the first operating system, directly convert the first address space into the first physical address space, And accessing the first operating system according to the first physical address space.
  • the address space of the virtual memory can be directly converted into the physical address space, and the corresponding operating system can be accessed according to the physical address space, and the operation is reliable.
  • the controller is configured to: convert the first address space into a first logical address space when accessing the first operating system, and further convert the The first logical address space is converted into a first physical address space, and the first operating system is accessed according to the first physical address space.
  • the address space of the virtual memory can be converted into a logical address space first, and then the logical address space can be further converted into a physical address space, and the corresponding operating system can be accessed according to the physical address space, which is convenient for operation.
  • the first virtual storage has a first life cycle.
  • the virtual memory can be set to have a life cycle, and within the life cycle, the corresponding relationship between the address space of the virtual memory and the physical address space remains unchanged, thereby improving privacy and security among multiple operating systems.
  • the controller is configured to: when at least part of the valid data in the first physical address space is erased, set the first address space and the corresponds to the third physical address space of the storage medium, and the first physical address space is different from the third physical address space.
  • the corresponding physical address space can be re-set for the address space of the virtual memory, for example, the erased Allocating the deleted physical address space to other address spaces can balance the wear of each physical address space and improve the overall lifespan of the storage device.
  • the first address space or the second address space starts from zero.
  • the address space of the virtual storage is presented as a continuous space starting from zero, or in other words, the address space of the virtual storage is presented as a continuous space from sector 0 to the maximum limit. Therefore, the storage device presents at most one virtual memory address space.
  • activation information is received, and the activation information is used to indicate activation of the first virtual storage or the second virtual storage; accessing the first operating system corresponding to the first virtual storage or the second operating system corresponding to the second virtual storage.
  • the controller is configured to receive the activation information, and set the first address space or the second address space for external presentation according to the activation information.
  • the address space of the virtual memory presented externally supports read and write access.
  • the controller is further configured to: receive deletion information, where the deletion information is used to indicate deletion of the first virtual storage and the second virtual storage. at least one virtual storage; delete the at least one virtual storage according to the deletion information.
  • the controller can delete unnecessary virtual storage, improving the flexibility of storage device configuration.
  • the controller is configured to: receive activation information from a basic input output system BIOS; and/or the controller is configured to: receive the deletion information from the BIOS.
  • a virtual memory management interface is configured between the storage device including the controller and the BIOS, and the controller acquires activation information or deletion information from the BIOS through the virtual memory management interface.
  • the user can interact with the hard disk through the BIOS, which improves the flexibility of configuring the virtual storage.
  • a method for configuring multiple operating systems includes: creating a first virtual memory, the first address space of the first virtual memory corresponds to the first physical address space of the storage medium, and the first The physical address space is used to install the first operating system; a second virtual memory is created, the second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used for Install a second operating system; and access one of the first operating system and the second operating system; wherein, when accessing the first operating system, the controller is configured to prohibit access to the second operating system An operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
  • the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
  • the method further includes: when accessing the first operating system, directly converting the first address space into the first physical address space, And accessing the first operating system according to the first physical address space.
  • the method further includes: when accessing the first operating system, converting the first address space into a first logical address space, and further converting the The first logical address space is converted into a first physical address space, and the first operating system is accessed according to the first physical address space.
  • the first virtual storage has a first lifecycle.
  • the method further includes: when at least part of the valid data in the first physical address space is erased, setting the first address space and the corresponds to the third physical address space of the storage medium, and the first physical address space is different from the third physical address space.
  • the first address space or the second address space starts from zero.
  • the method further includes: receiving activation information, where the activation information is used to indicate activation of the first virtual storage or the second virtual storage; accessing the The first operating system corresponding to the first virtual storage or the second operating system corresponding to the second virtual storage.
  • the method includes: receiving deletion information, where the deletion information is used to indicate deletion of at least one of the first virtual storage and the second virtual storage Virtual storage: delete the at least one virtual storage according to the deletion information.
  • a device for configuring multiple operating systems includes a mapping management module and a non-volatile storage module; wherein: the mapping management module is used to create a first virtual memory, and the first virtual The first address space of the memory corresponds to the first physical address space of the storage medium, and the first physical address space is used to install the first operating system; the mapping management module is also used to create a second virtual memory, so The second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used to install the second operating system; the non-volatile storage module is used to access the one of the first operating system and the second operating system; wherein, when accessing the first operating system, the non-volatile storage module is configured to prohibit access to the second operating system; When the second operating system is used, the non-volatile storage module is configured to prohibit access to the first operating system.
  • the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
  • a BIOS is provided, where the BIOS is used to send first creation information to a storage device, where the first creation information is used to instruct the storage device to create a first virtual memory, and the first address space of the first virtual memory Corresponding to the first physical address space of the storage medium, the first physical address space is used to install the first operating system; the BIOS is also used to send second creation information to the storage device, and the second creation information is used to indicate The storage device creates a second virtual memory, a second address space of the second virtual memory corresponds to a second physical address space of the storage medium, and the second physical address space is used to install a second operating system.
  • a virtual memory management interface can be configured between the BIOS and the storage device, and the BIOS can support read and write functions, so that the BIOS can receive the creation information input by the user and send the creation information to the storage device to create virtual memory.
  • a computer system in a fifth aspect, includes the storage device in any implementation manner of the first aspect.
  • the computer system further includes the BIOS in any implementation manner of the fourth aspect.
  • an apparatus includes a processing unit, a sending unit, and a receiving unit.
  • the sending unit and the receiving unit may also be transceiver units.
  • the device is configured to execute the method in any implementation manner of the second aspect.
  • a device including a processor and an interface circuit, and the interface circuit is used to receive signals from devices other than the device and transmit them to the processor or send signals from the processor to the device
  • the processor is used to implement the method in any possible implementation manner of the aforementioned second aspect through a logic circuit or by executing code instructions.
  • a computer-readable storage medium in which a computer program or instruction is stored, and when the computer program or instruction is executed, the above-mentioned any possible implementation manner of the second aspect is realized. method.
  • a chip system includes a processor and may further include a memory, configured to implement the method in any possible implementation manner of the aforementioned second aspect.
  • the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
  • a computer program product of computer-executable instructions is provided.
  • the computer-executable instructions are run on a computer, the method in any possible implementation manner of the aforementioned second aspect is implemented.
  • Fig. 1 is a schematic diagram of a computer system applicable to the embodiment of the present application
  • FIG. 2 is a schematic diagram of a hard disk provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a mapping management method provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of another mapping management method provided by an embodiment of the present application.
  • Fig. 5 is a configuration method of multiple operating systems provided by the embodiment of the present application.
  • dotted lines in the figures indicate that the corresponding steps are optional steps, or the corresponding modules are optional modules.
  • FIG. 1 shows a schematic diagram of a computer system 100 suitable for the method provided by the embodiment of the present application.
  • this computer system 100 can comprise central processing unit (central processing unit, CPU) 101, display 102, bridge chip 103, input/output (input/output, IO) interface 104, onboard flash memory (flash) 105 , memory 106 and hard disk 107.
  • the CPU 101 may be used to process data access requests.
  • the CPU 101 when the CPU receives a data write request sent by a user, it will temporarily store the data in the data request in the memory 106 . When the total amount of data in the memory 106 reaches a certain threshold, the CPU 101 sends the data stored in the memory 106 to the hard disk 107 for persistent storage. In addition, the CPU 101 can also be used to calculate or process data, such as metadata management, deduplication, data compression, data verification, virtualized storage space, and address translation.
  • data such as metadata management, deduplication, data compression, data verification, virtualized storage space, and address translation.
  • the memory 106 refers to an internal memory directly exchanging data with the processor. It can read and write data at any time, and the speed is very fast. It is used as a temporary data storage for the operating system or other running programs.
  • Memory includes at least two kinds of memory, for example, memory can be either random access memory or read-only memory (Read Only Memory, ROM).
  • the random access memory is dynamic random access memory (Dynamic Random Access Memory, DRAM), or storage class memory (Storage Class Memory, SCM).
  • DRAM is a semiconductor memory, which, like most Random Access Memory (RAM), is a volatile memory device.
  • the DRAM and the SCM are only exemplary illustrations in this embodiment, and the memory may also include other random access memories, such as Static Random Access Memory (Static Random Access Memory, SRAM) and the like.
  • the hard disk 107 is used to provide storage resources, such as storing data. It may be a magnetic disk or another type of storage medium, such as a solid state disk (solid state disk, SSD) or a shingled magnetic recording hard disk.
  • solid state disk solid state disk, SSD
  • SSD solid state disk
  • FIG. 2 shows a schematic structural diagram of a storage device 200 .
  • the storage device 200 includes a controller 210 and a storage medium 220, and the controller 210 is used to control the storage medium 220.
  • the storage device 200 may also include a high-speed memory, a power supply, and optionally a power-down protection circuit.
  • the controller 210 may include a host interface module 211 , a mapping management module 212 , and a nonvolatile memory control module 213 ; the storage medium 220 may include at least one nonvolatile storage medium 221 .
  • the non-volatile memory 221 can be Nand Flash or phase change memory (phase change memory, PCM), etc., and the high-speed memory can be DRAM or SRAM, etc., and the controller 210 can be realized by pure hardware, or a combination of software and hardware. way to achieve.
  • the storage medium 104 may be connected to a CPU or a host through a host interface module 211 to implement command interaction, such as read and write commands and management commands.
  • the mapping management module 212 is used for managing the mapping between the visible logical block address in the computer system and the physical address space of the non-volatile memory on the disk.
  • the non-volatile memory control module 213 is used for controlling data reading and writing to the non-volatile memory.
  • the storage device includes a controller and a storage medium.
  • the controller can be the controller 210 in FIG.
  • the medium may be the non-volatile memory 221 in FIG. 2 .
  • the storage device 200 includes a controller 210 and a storage medium 220 .
  • the controller 210 is configured to create a first virtual storage, the first address space of the first virtual storage corresponds to the first physical address space of the storage medium, and the first physical address space is used for installing the first operating system.
  • the host interface module 211 in the controller 210 receives first creation information from the BIOS, where the first creation information is used to instruct the controller 210 to create the first virtual storage.
  • the controller 210 is further configured to create a second virtual memory, the second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used for installing the second operating system.
  • the host interface module 211 in the controller 210 receives second creation information from the BIOS, where the second creation information is used to instruct the controller 210 to create the second virtual storage.
  • the controller 210 is also used to access one of the first operating system and the second operating system.
  • the non-volatile memory control module 213 in the controller 210 is used to access one of the first operating system and the second operating system.
  • the controller when accessing the first operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
  • each virtual storage corresponds to a different physical storage medium. Address space, each physical address space can be used to install different operating systems, when the controller 210 accesses one of the operating systems, the controller is configured to prohibit access to other operating systems.
  • the controller 210 when creating the first virtual storage, is specifically configured to allocate the first physical address space of the storage medium to the first address space of the first virtual storage according to the first creation information.
  • the first creation information is also used to indicate the size of the first physical address space.
  • the controller 210 allocates a physical address space of 300MB for the first virtual memory according to the first creation information.
  • the address space of the virtual storage can be understood as the address space displayed by the virtual storage and accessible by users.
  • the first address space of the first virtual memory starts from zero.
  • the first address space of the first virtual storage is externally presented as a continuous space starting from zero, or in other words, the first address space of the first virtual storage is externally presented as a continuous space from sector 0 to the maximum limit.
  • the controller 210 may use the following two methods to access the first operating system, which will be introduced respectively in conjunction with FIG. 3 and FIG. 4 .
  • the controller 210 When accessing the first operating system, the controller 210 directly converts the first address space into the first physical address space, and accesses the first operating system according to the first physical address space.
  • the mapping management module 212 of the controller 210 allocates an independent physical address space for each virtual memory, referring to Figure 3, the first address space of the first virtual memory corresponds to the first physical address space, the first The Nth address space of the N virtual memory corresponds to the Nth physical address space, and each physical address space can only store data of a corresponding operating system.
  • the controller 210 can independently manage the address space of each virtual memory and the corresponding physical address space. For example, when accessing one of the operating systems, the controller 210 will use the The address space of the system is directly converted into the corresponding physical address space, and the operating system is accessed according to the physical address space.
  • the controller 210 may assign a corresponding physical address space to the address space of each virtual memory based on the structure of the storage medium. For example, taking Nand Flash as an example, it can be allocated in units of physical blocks, or in units of LUN, Die, or Plane. In other words, the controller 210 can allocate the address space of each virtual memory based on different granularities. Allocate the corresponding physical address space.
  • the first virtual storage has a first lifetime.
  • Each virtual memory can have its own life cycle. In the life cycle, the physical address space corresponding to the virtual memory can always belong to the virtual memory, and other virtual memories cannot be used.
  • the first address space when at least part of valid data in the first physical address space is erased, the first address space is set to correspond to the third physical address space, and the first physical address space is different from the third physical address space.
  • the address space of the virtual memory can be reset to correspond to other physical address spaces, for example, the erased part of the first physical address space can be allocated
  • the third physical address space may be a part of the first physical address space where data has not been erased.
  • the controller 210 When accessing the first operating system, the controller 210 converts the first address space into a first logical address space, further converts the first logical address space into a first physical address space, and accesses the first physical address space according to the first physical address space. an operating system.
  • the mapping management module 212 of the controller 210 allocates an independent logical address space for each virtual memory, referring to Figure 4, the first address space of the first virtual memory corresponds to the first logical address space, the first The Nth address space of the N virtual memory corresponds to the N logical address space.
  • the controller 210 may translate the logical address space into a corresponding physical address space.
  • the controller 210 may independently manage the address space of each virtual memory and the corresponding logical address space, and then perform unified management on each logical address space and the corresponding physical address space. For example, when accessing one of the operating systems, the controller 210 converts the address space of the virtual memory where the operating system is located into a corresponding logical address space, and then converts the logical address space into a corresponding physical address space, and according to the physical address space access the operating system.
  • the controller 210 can directly convert the address space of the virtual memory where the operating system is located into a physical address space, and access the first operating system according to the physical address space.
  • the operating system may also first convert the address space of the virtual memory where the operating system is located into a virtual address space, then convert the virtual address space into a physical address space, and access the operating system to the physical address space.
  • the description that the controller 210 accesses other operating systems is similar to the above description of accessing the first operating system, and for simplicity, details are not repeated here.
  • a virtual memory management interface can be set on the host interface module 211 , the virtual memory management interface is used to receive the creation information from the BIOS.
  • the virtual memory management interface can be a software-configured communication protocol, for example, can be based on standard small computer system interface (small computer system interface, SCSI)/serial attached SCSI (serial attached SCSI, SAS), advanced technology additional interface (advanced technology attachment, ATA) / serial ATA (serial ATA, SATA) or non-volatile memory host controller interface specification (non-volatile memory express, NVMe) / peripheral component interconnect standard extension (peripheral component interconnect express, PCIe) Interface protocol custom command implementation.
  • standard small computer system interface small computer system interface
  • SCSI small computer system interface
  • SCSI serial attached SCSI
  • SAS advanced technology additional interface
  • ATA advanced technology additional interface
  • ATA serial ATA
  • non-volatile memory host controller interface specification non-volatile memory express, NVMe
  • peripheral component interconnect standard extension peripheral component interconnect express, PCIe
  • controller 210 can also obtain the creation information through other software modules, for example, it can reuse other software modules on the computer system or use a separately established software module to send information to the controller through I2C, serial interface or IO interface. 210 Send creation information.
  • the creation information includes an authentication password. If the authentication password is correct, the controller 210 creates the first virtual storage according to the first creation information.
  • the controller 210 can authenticate the creation information, and only when the user inputs a correct authentication password, the controller 210 creates a virtual storage according to the creation information.
  • the authentication password may be pre-configured by the computer system, or pre-agreed by the user and the controller. For example, when using the function of the virtual storage for the first time, the user can enter the configuration interface of the virtual storage without an authentication password, and agree on the authentication password on the configuration interface, and then the user enters the configuration interface of the virtual storage again or enters the creation information Need to include the authentication password.
  • the controller 210 can also activate virtual storage.
  • the controller 210 may set the virtual storage to an active state or an inactive state. For example, when the controller 210 receives the activation information for activating a certain virtual storage, if other virtual storages are in the activated state, they can change them to the inactive state by themselves.
  • the controller 210 when the first operating system needs to be accessed, the controller 210 is also configured to receive activation information, and the activation information is used to activate the first virtual storage, so that the first operating system on the first virtual storage supports read and write access , the controller 210 controls the first virtual storage to be in an active state, and other virtual storages to be in an inactive state, and the operating system on the virtual storage in the inactive state does not support read and write access.
  • the controller 210 receives the activation information, and presents the first address space of the first virtual storage to the user according to the activation information, and the controller 210 controls the address spaces of other virtual storages not to be presented to the user, so that the address spaces on the first virtual storage
  • the operating system supports read and write access, and the operating system of other virtual storage does not support read and write access.
  • the host interface module 211 in the controller 210 is configured to receive the activation information
  • the mapping management module 212 in the controller 210 is configured to activate the first virtual storage according to the activation information.
  • the controller 210 can control the state of each virtual memory to be active or inactive, so that the operating system of the virtual memory in the active state supports read and write access, and the operating system of the virtual memory in the inactive state does not support read and write access. For example, when the controller 210 receives the activation information indicating to activate the first virtual storage, it may set the other virtual storages to an inactive state. Therefore, the multiple virtual memories in the system can only be accessed by the operating system on at most one virtual memory at the same time, or the address space of at most one virtual memory is presented to the outside world, that is, the multiple virtual memories in the system can be accessed at most at the same time Only one virtual storage can be active.
  • the controller 210 When the controller 210 acquires information for starting the system, the controller 210 loads the operating system on the virtual storage in an activated state.
  • controller 210 can also delete the virtual storage.
  • the controller 210 is further configured to receive deletion information, and the deletion information is used to delete the first virtual storage;
  • the controller 210 is also configured to delete the first virtual storage according to the deletion information.
  • the host interface module 211 in the controller 210 is configured to receive the deletion information
  • the mapping management module 212 in the controller 210 is configured to delete the first virtual storage according to the deletion information.
  • the controller 210 may modify the capacity of the virtual storage by deleting the virtual storage and recreating the virtual storage.
  • the deletion information includes a correct authentication password
  • the content executed by the controller 210 is similar to the description of including the authentication password in the creation information, and for simplicity, details are not repeated here.
  • the controller 210 may support querying whether the storage device has the capability of creating a virtual storage.
  • the user can first query whether the storage device has the ability to create a virtual storage.
  • the controller 210 is also used to receive query information, and the query information is used to query whether the storage device It has the ability to create a virtual storage; the controller 210 is also used to query according to the query information; the controller 210 is also used to return the result of the query.
  • the host interface module 211 in the controller 210 is used to receive query information sent by the user, and the host interface module 211 is also used to determine whether the storage device has the ability to create a virtual storage according to the supported communication interface, for example, the host interface module 211 inquires whether there is a communication interface that supports receiving creation information, and if so, the host interface module 211 can return to the user the query result that the storage device supports the creation of virtual storage; or the mapping management module 212 in the controller 210 determines the Whether the storage device has the ability to create a virtual memory, for example, the mapping management module 212 inquires whether it has the ability of independent mapping management, and if so, the host interface module 211 can return the query result that the storage device supports creating a virtual memory to the user; or not
  • the volatile memory control module 213 determines whether the storage device has the ability to create a virtual memory according to the storage conditions in the storage medium.
  • the interface module 211 may return to the user a query result that the storage device supports creating virtual storage.
  • the controller 210 may support enabling the ability to create a virtual store, activate a virtual store, or delete a virtual store.
  • the controller 210 is also configured to receive enabling information; the controller 210 is further configured to enable the storage device to have the capability of creating virtual storage, activating virtual storage, or deleting virtual storage according to the enabling information.
  • the host interface module 211 in the controller 210 is used to obtain the enabling information, and the mapping management module 212 or the non-volatile memory control module 213 in the controller 210 opens the storage device according to the enabling information to create a virtual memory, activate Virtual storage or the ability to delete virtual storage.
  • the storage device provided by the embodiment of the present application has been described above, and the storage device can improve the security and privacy of the supported operating system.
  • the method for configuring multiple operating systems proposed in the embodiment of the present application will be described below.
  • FIG. 5 shows a method 500 for configuring multiple operating systems provided by this application.
  • S501 Create a first virtual storage, where a first address space of the first virtual storage corresponds to a first physical address space of a storage medium, and the first physical address space is used to install a first operating system.
  • the controller may receive first creation information, where the first creation information is used to indicate to create the first virtual storage in the storage medium of the storage device.
  • the system loads and runs the BIOS, and the user can input (for example, press a specific key on the keyboard) through the keyboard and/or mouse to enter the BIOS setup menu, and the user inputs the first creation information to the BIOS through the keyboard and/or mouse , the BIOS sends the first creation information to the controller through the virtual memory management interface.
  • the first creation information also includes an authentication password.
  • the first creation information includes an authentication password and an instruction for creating the first virtual storage, wherein the controller may obtain the authentication password first, and then receive the instruction for creating the first virtual storage from the BIOS if the authentication password is correct. Instructions for the first virtual memory.
  • the first creation information also includes capacity information of the virtual storage.
  • the BIOS can obtain the capacity information of the virtual memory through keyboard and/or mouse input, and when the BIOS sends an instruction for creating a certain virtual memory to the controller, it can simultaneously indicate the capacity of the virtual memory.
  • the first creation information is also used to indicate the capacity of the first virtual storage.
  • the BIOS can obtain the capacity information of the first virtual storage through keyboard and/or mouse input, and when the BIOS sends an instruction for creating the first virtual storage to the controller, it can simultaneously indicate the capacity of the first virtual storage.
  • the manner in which the controller creates the second virtual storage is similar to the manner in which the first virtual storage is described in S501, and for simplicity, details are not repeated here.
  • the controller when accessing the first operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
  • the controller when accessing the first operating system, directly converts the first address space into the first physical address space, and accesses the first operating system according to the first physical address space.
  • the controller when accessing the first operating system, converts the first address space into a first logical address space, further converts the first logical address space into a first physical address space, and accesses the first operating system according to the first physical address space. an operating system.
  • step S503 the method 500 further includes step S504.
  • the controller accesses the first operating system, the activation information is used to indicate activation of the first virtual storage. If in S503, the controller accesses the second operating system, the activation information is used to indicate activation of the second virtual storage.
  • controller activating the virtual storage is similar to the description in FIG. 2 , and for simplicity, details are not repeated here.
  • the controller When the controller obtains the information for starting the system, the controller loads the operating system on the virtual storage in an active state.
  • the computer system when the computer system is started, the computer system will only display the first operating system, and the controller will load the first virtual storage The first operating system on the .
  • the user needs to access other operating systems, for example, the second operating system on the second virtual storage, the user needs to send activation information to the controller to indicate activation of the second virtual storage, so that the second virtual storage is in an active state, and other virtual storage
  • the memory is in an inactive state, and when the computer system is started again, the controller will load the second operating system on the second virtual memory. Therefore, the computer system only displays at most one operating system at a time, which protects the privacy of each operating system.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean determining B only according to A, and B may also be determined according to A and/or other information.
  • sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules is only a logical function division. In actual implementation, there may be other division methods.
  • multiple modules or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or modules may be in electrical, mechanical or other forms.
  • the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or may also be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional module in each embodiment of the present application may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server, or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be read by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium, (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital versatile disc (digital video disc, DVD)) or a semiconductor medium (for example, a solid state disk (solid state disk, SSD) )wait.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a digital versatile disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disk, SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un dispositif de stockage prenant en charge de multiples systèmes d'exploitation, ainsi qu'un procédé de configuration et un système informatique, susceptibles d'améliorer la sécurité et la confidentialité entre des systèmes d'exploitation multiples. Le dispositif de stockage comporte un contrôleur et un support de stockage. Le contrôleur est utilisé pour: créer une première mémoire virtuelle (S501), un premier espace d'adresses de la première mémoire virtuelle correspondant à un premier espace d'adresses physiques du support de stockage, et le premier espace d'adresses physiques étant utilisé pour installer un premier système d'exploitation; créer une seconde mémoire virtuelle (S502), un second espace d'adresses de la seconde mémoire virtuelle correspondant à un second espace d'adresses physiques du support de stockage, et le second espace d'adresses physiques étant utilisé pour installer un second système d'exploitation; et accéder à un système parmi le premier système d'exploitation et le second système d'exploitation, lors d'un accès au premier système d'exploitation, le contrôleur étant configuré pour interdire l'accès au second système d'exploitation, et lors d'un accès au second système d'exploitation, le contrôleur étant configuré pour interdire l'accès au premier système d'exploitation (S503).
PCT/CN2021/129358 2021-11-08 2021-11-08 Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique WO2023077519A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/129358 WO2023077519A1 (fr) 2021-11-08 2021-11-08 Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/129358 WO2023077519A1 (fr) 2021-11-08 2021-11-08 Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique

Publications (1)

Publication Number Publication Date
WO2023077519A1 true WO2023077519A1 (fr) 2023-05-11

Family

ID=86240613

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/129358 WO2023077519A1 (fr) 2021-11-08 2021-11-08 Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique

Country Status (1)

Country Link
WO (1) WO2023077519A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004171477A (ja) * 2002-11-22 2004-06-17 Ntt Data Corp マルチオペレーティングシステム制御方法、およびその方法をコンピュータに実行させるプログラム、ならびにマルチオペレーティングシステム制御装置
CN1920731A (zh) * 2005-08-23 2007-02-28 北京软通科技有限责任公司 一种实现操作系统隔离的系统及方法
CN101477476A (zh) * 2008-01-02 2009-07-08 联想(北京)有限公司 多操作系统之间切换显示的控制方法和计算机系统
CN102117184A (zh) * 2010-01-05 2011-07-06 联想(北京)有限公司 用于多存储器的控制器、终端设备及其启动和访问方法
CN102346818A (zh) * 2010-08-02 2012-02-08 南京壹进制信息技术有限公司 一种用软件实现的计算机网络环境隔离系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004171477A (ja) * 2002-11-22 2004-06-17 Ntt Data Corp マルチオペレーティングシステム制御方法、およびその方法をコンピュータに実行させるプログラム、ならびにマルチオペレーティングシステム制御装置
CN1920731A (zh) * 2005-08-23 2007-02-28 北京软通科技有限责任公司 一种实现操作系统隔离的系统及方法
CN101477476A (zh) * 2008-01-02 2009-07-08 联想(北京)有限公司 多操作系统之间切换显示的控制方法和计算机系统
CN102117184A (zh) * 2010-01-05 2011-07-06 联想(北京)有限公司 用于多存储器的控制器、终端设备及其启动和访问方法
CN102346818A (zh) * 2010-08-02 2012-02-08 南京壹进制信息技术有限公司 一种用软件实现的计算机网络环境隔离系统

Similar Documents

Publication Publication Date Title
EP3457288B1 (fr) Système informatique et dispositif d'accès à la mémoire
US8924659B2 (en) Performance improvement in flash memory accesses
JP4665040B2 (ja) 計算機およびアクセス制御方法
US8578178B2 (en) Storage system and its management method
WO2017072933A1 (fr) Système et procédé de gestion pour système informatique
US8966188B1 (en) RAM utilization in a virtual environment
US20130290541A1 (en) Resource management system and resource managing method
KR102384759B1 (ko) 호스트 메모리 버퍼를 사용하기 위해 호스트 장치와 속성 정보를 공유하는 스토리지 장치 및 그것을 포함하는 전자 장치
US20190114116A1 (en) Memory device managing data in accordance with command and non-transitory computer readable recording medium
JP2005222123A5 (fr)
KR101579941B1 (ko) 가상머신 i/o 관리 방법 및 장치
JPWO2018008123A1 (ja) 計算機システム
WO2023051715A1 (fr) Procédé et appareil de traitement de données, processeur et système de mémoire hybride
US11954051B2 (en) Managed NAND Flash memory region control against endurance hacking
US20240086092A1 (en) Method for managing namespaces in a storage device and storage device employing the same
US11775188B2 (en) Communications to reclaim storage space occupied by proof of space plots in solid state drives
US20230244394A1 (en) Gradually Reclaim Storage Space Occupied by a Proof of Space Plot in a Solid State Drive
US11093175B1 (en) Raid data storage device direct communication system
JP2022034455A (ja) 計算機システムおよび管理方法
WO2023077519A1 (fr) Dispositif de stockage prenant en charge de multiples systèmes d'exploitation, procédé de configuration et système informatique
WO2017107163A1 (fr) Procédé et système de gestion de mémoire en fonction d'une mémoire hybride hétérogène
KR102276912B1 (ko) 스토리지 시스템 및 이의 동작 방법
EP3388937A1 (fr) Mécanisme d'effacement de disques locaux pour des ressources physiques communes
Ha et al. Dynamic Capacity Service for Improving CXL Pooled Memory Efficiency
US20150242338A1 (en) Memory device and method enabling performance of special operations by application of memory device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21963028

Country of ref document: EP

Kind code of ref document: A1