-
公开(公告)号:US11995451B2
公开(公告)日:2024-05-28
申请号:US17041942
申请日:2018-03-27
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Fuzhou Xiao , Youzhan Yin , Li Chen
IPC: G06F9/44 , G06F8/71 , G06F9/445 , G06F9/50 , G06F16/903
CPC classification number: G06F9/44505 , G06F8/71 , G06F9/5061 , G06F16/90344
Abstract: A resource permission processing method and apparatus, a storage medium, and a chip are disclosed, to update a resource label in a terminal device based on a first resource permission configuration file when a system software version in the terminal device is upgraded. The first resource permission configuration file covers only path information in which a label changes before and after the system software version is upgraded. Therefore, in a process of updating the resource label stored in the terminal device, a matching amount is greatly reduced when path information that matches traversal path information of a resource is searched for in the first resource permission configuration file, and therefore time consumed for labeling the stored resource can be reduced. The reduced time for labeling the stored resource improves labeling efficiency, reduces time consumed for the system software version upgrade, and improves efficiency of the system software version upgrade.
-
公开(公告)号:US10289472B2
公开(公告)日:2019-05-14
申请号:US15441837
申请日:2017-02-24
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jinghui Li , Jianqing Yuan , Xuewen Gong , Youzhan Yin
Abstract: Embodiments of the present disclosure disclose a resource leak detection method, apparatus, and system that includes obtaining a target resource called when target code of a program runs, where the target code is partial code in program code, determining a first storage resource amount occupied by the target resource, determining whether the first storage resource amount occupied by the target resource satisfies a first preset condition, and if the first storage resource amount occupied by the target resource satisfies the first preset condition, determining a storage location of the target code as a resource leak location. In the embodiments of the present disclosure, the target code of the program can be tracked, and further, by means of detection, the storage location of the target code can be determined as the resource leak location.
-
公开(公告)号:US12032494B2
公开(公告)日:2024-07-09
申请号:US16965935
申请日:2018-11-26
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Fuzhou Xiao , Youzhan Yin , Dengzhou Xia
CPC classification number: G06F12/1491 , G06F12/1416 , G06F21/53 , G06F21/71 , G06F2212/1052
Abstract: Embodiments of the present disclosure relate to kernel integrity protection methods and apparatuses. In an embodiment, a method includes: sending, by a first program executing at a first exception level, a request message to a second program executing at a second exception level, wherein the first exception level has lower execution privilege than the second exception level, the request message requests to perform memory access, and wherein the memory access is a preset register access or a preset memory space access, and; in response to receiving the request message, obtaining, by the second program, event information corresponding to the memory access; sending, by the second program, the event information to the first program; and processing, by the first program, the event information.
-
公开(公告)号:US20170168886A1
公开(公告)日:2017-06-15
申请号:US15441837
申请日:2017-02-24
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jinghui Li , Jianqing Yuan , Xuewen Gong , Youzhan Yin
IPC: G06F11/07
CPC classification number: G06F11/079 , G06F11/073 , G06F11/0793 , G06F11/3037 , G06F11/3452 , G06F11/36 , G06F11/3612
Abstract: Embodiments of the present disclosure disclose a resource leak detection method, apparatus, and system that includes obtaining a target resource called when target code of a program runs, where the target code is partial code in program code, determining a first storage resource amount occupied by the target resource, determining whether the first storage resource amount occupied by the target resource satisfies a first preset condition, and if the first storage resource amount occupied by the target resource satisfies the first preset condition, determining a storage location of the target code as a resource leak location. In the embodiments of the present disclosure, the target code of the program can be tracked, and further, by means of detection, the storage location of the target code can be determined as the resource leak location.
-
-
-