WO2023077519A1 - 支持多操作系统的存储设备、配置方法以及计算机系统 - Google Patents
支持多操作系统的存储设备、配置方法以及计算机系统 Download PDFInfo
- Publication number
- WO2023077519A1 WO2023077519A1 PCT/CN2021/129358 CN2021129358W WO2023077519A1 WO 2023077519 A1 WO2023077519 A1 WO 2023077519A1 CN 2021129358 W CN2021129358 W CN 2021129358W WO 2023077519 A1 WO2023077519 A1 WO 2023077519A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address space
- operating system
- physical address
- virtual
- controller
- Prior art date
Links
- 238000003860 storage Methods 0.000 title claims abstract description 109
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000015654 memory Effects 0.000 claims abstract description 142
- 230000004913 activation Effects 0.000 claims description 33
- 238000012217 deletion Methods 0.000 claims description 24
- 230000037430 deletion Effects 0.000 claims description 24
- 238000013507 mapping Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 7
- 238000007726 management method Methods 0.000 description 27
- 230000014759 maintenance of location Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003213 activating effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 239000007787 solid Substances 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 235000019580 granularity Nutrition 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
Definitions
- the present application relates to the computer field, and in particular, relates to a storage device supporting multiple operating systems, a configuration method and a computer system.
- a computer needs to support multiple operating systems. For example, for office workers, it is required that a computer can support both the operating system for work and the operating system for private life.
- the first method is to install different operating systems on different partitions by using the common hard disk partition method.
- the computer When the computer is started, one of the operating systems will be selected for loading during startup. In this method, no matter which operating system is started, the user can access the data on each partition. For some application scenarios that require a high degree of confidentiality, this method will increase exposure and security risks.
- the second way is to install virtual machine management software on the hard disk, virtualize multiple virtual machines, and install operating systems on the multiple virtual machines respectively.
- the data of all virtual machines can still be accessed through the virtual machine management software, and there are still certain exposure risks and security risks. Therefore, there is an urgent need for a storage device, configuration method and computer system supporting multiple operating systems, which can improve security and privacy between multiple operating systems.
- the present application provides a storage device supporting multiple operating systems, a configuration method and a computer system, which can improve security and privacy between multiple operating systems.
- a storage device supporting multiple operating systems includes a controller and a storage medium, and the controller is used to: create a first virtual memory, a first address space of the first virtual memory Corresponding to the first physical address space of the storage medium, the first physical address space is used to install the first operating system; creating a second virtual memory, the second address space of the second virtual memory is the same as the storage medium
- the second physical address space corresponds to the second physical address space, and the second physical address space is used to install the second operating system; and access one of the first operating system and the second operating system; wherein, when accessing the first When operating an operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
- the storage medium is used to store the multiple operating systems, and can also be used to store managed user data.
- the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
- the controller is further configured to: when accessing the first operating system, directly convert the first address space into the first physical address space, And accessing the first operating system according to the first physical address space.
- the address space of the virtual memory can be directly converted into the physical address space, and the corresponding operating system can be accessed according to the physical address space, and the operation is reliable.
- the controller is configured to: convert the first address space into a first logical address space when accessing the first operating system, and further convert the The first logical address space is converted into a first physical address space, and the first operating system is accessed according to the first physical address space.
- the address space of the virtual memory can be converted into a logical address space first, and then the logical address space can be further converted into a physical address space, and the corresponding operating system can be accessed according to the physical address space, which is convenient for operation.
- the first virtual storage has a first life cycle.
- the virtual memory can be set to have a life cycle, and within the life cycle, the corresponding relationship between the address space of the virtual memory and the physical address space remains unchanged, thereby improving privacy and security among multiple operating systems.
- the controller is configured to: when at least part of the valid data in the first physical address space is erased, set the first address space and the corresponds to the third physical address space of the storage medium, and the first physical address space is different from the third physical address space.
- the corresponding physical address space can be re-set for the address space of the virtual memory, for example, the erased Allocating the deleted physical address space to other address spaces can balance the wear of each physical address space and improve the overall lifespan of the storage device.
- the first address space or the second address space starts from zero.
- the address space of the virtual storage is presented as a continuous space starting from zero, or in other words, the address space of the virtual storage is presented as a continuous space from sector 0 to the maximum limit. Therefore, the storage device presents at most one virtual memory address space.
- activation information is received, and the activation information is used to indicate activation of the first virtual storage or the second virtual storage; accessing the first operating system corresponding to the first virtual storage or the second operating system corresponding to the second virtual storage.
- the controller is configured to receive the activation information, and set the first address space or the second address space for external presentation according to the activation information.
- the address space of the virtual memory presented externally supports read and write access.
- the controller is further configured to: receive deletion information, where the deletion information is used to indicate deletion of the first virtual storage and the second virtual storage. at least one virtual storage; delete the at least one virtual storage according to the deletion information.
- the controller can delete unnecessary virtual storage, improving the flexibility of storage device configuration.
- the controller is configured to: receive activation information from a basic input output system BIOS; and/or the controller is configured to: receive the deletion information from the BIOS.
- a virtual memory management interface is configured between the storage device including the controller and the BIOS, and the controller acquires activation information or deletion information from the BIOS through the virtual memory management interface.
- the user can interact with the hard disk through the BIOS, which improves the flexibility of configuring the virtual storage.
- a method for configuring multiple operating systems includes: creating a first virtual memory, the first address space of the first virtual memory corresponds to the first physical address space of the storage medium, and the first The physical address space is used to install the first operating system; a second virtual memory is created, the second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used for Install a second operating system; and access one of the first operating system and the second operating system; wherein, when accessing the first operating system, the controller is configured to prohibit access to the second operating system An operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
- the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
- the method further includes: when accessing the first operating system, directly converting the first address space into the first physical address space, And accessing the first operating system according to the first physical address space.
- the method further includes: when accessing the first operating system, converting the first address space into a first logical address space, and further converting the The first logical address space is converted into a first physical address space, and the first operating system is accessed according to the first physical address space.
- the first virtual storage has a first lifecycle.
- the method further includes: when at least part of the valid data in the first physical address space is erased, setting the first address space and the corresponds to the third physical address space of the storage medium, and the first physical address space is different from the third physical address space.
- the first address space or the second address space starts from zero.
- the method further includes: receiving activation information, where the activation information is used to indicate activation of the first virtual storage or the second virtual storage; accessing the The first operating system corresponding to the first virtual storage or the second operating system corresponding to the second virtual storage.
- the method includes: receiving deletion information, where the deletion information is used to indicate deletion of at least one of the first virtual storage and the second virtual storage Virtual storage: delete the at least one virtual storage according to the deletion information.
- a device for configuring multiple operating systems includes a mapping management module and a non-volatile storage module; wherein: the mapping management module is used to create a first virtual memory, and the first virtual The first address space of the memory corresponds to the first physical address space of the storage medium, and the first physical address space is used to install the first operating system; the mapping management module is also used to create a second virtual memory, so The second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used to install the second operating system; the non-volatile storage module is used to access the one of the first operating system and the second operating system; wherein, when accessing the first operating system, the non-volatile storage module is configured to prohibit access to the second operating system; When the second operating system is used, the non-volatile storage module is configured to prohibit access to the first operating system.
- the controller can create multiple virtual memories in the storage medium, the address spaces of each virtual memory correspond to physical address spaces that do not overlap with each other, and each physical address space can install mutually isolated operating systems , when one of the operating systems is accessed, the controller will be configured to prohibit access to other operating systems, which can improve the security and privacy among multiple operating systems.
- a BIOS is provided, where the BIOS is used to send first creation information to a storage device, where the first creation information is used to instruct the storage device to create a first virtual memory, and the first address space of the first virtual memory Corresponding to the first physical address space of the storage medium, the first physical address space is used to install the first operating system; the BIOS is also used to send second creation information to the storage device, and the second creation information is used to indicate The storage device creates a second virtual memory, a second address space of the second virtual memory corresponds to a second physical address space of the storage medium, and the second physical address space is used to install a second operating system.
- a virtual memory management interface can be configured between the BIOS and the storage device, and the BIOS can support read and write functions, so that the BIOS can receive the creation information input by the user and send the creation information to the storage device to create virtual memory.
- a computer system in a fifth aspect, includes the storage device in any implementation manner of the first aspect.
- the computer system further includes the BIOS in any implementation manner of the fourth aspect.
- an apparatus includes a processing unit, a sending unit, and a receiving unit.
- the sending unit and the receiving unit may also be transceiver units.
- the device is configured to execute the method in any implementation manner of the second aspect.
- a device including a processor and an interface circuit, and the interface circuit is used to receive signals from devices other than the device and transmit them to the processor or send signals from the processor to the device
- the processor is used to implement the method in any possible implementation manner of the aforementioned second aspect through a logic circuit or by executing code instructions.
- a computer-readable storage medium in which a computer program or instruction is stored, and when the computer program or instruction is executed, the above-mentioned any possible implementation manner of the second aspect is realized. method.
- a chip system includes a processor and may further include a memory, configured to implement the method in any possible implementation manner of the aforementioned second aspect.
- the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
- a computer program product of computer-executable instructions is provided.
- the computer-executable instructions are run on a computer, the method in any possible implementation manner of the aforementioned second aspect is implemented.
- Fig. 1 is a schematic diagram of a computer system applicable to the embodiment of the present application
- FIG. 2 is a schematic diagram of a hard disk provided by an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of a mapping management method provided by an embodiment of the present application.
- FIG. 4 is a schematic structural diagram of another mapping management method provided by an embodiment of the present application.
- Fig. 5 is a configuration method of multiple operating systems provided by the embodiment of the present application.
- dotted lines in the figures indicate that the corresponding steps are optional steps, or the corresponding modules are optional modules.
- FIG. 1 shows a schematic diagram of a computer system 100 suitable for the method provided by the embodiment of the present application.
- this computer system 100 can comprise central processing unit (central processing unit, CPU) 101, display 102, bridge chip 103, input/output (input/output, IO) interface 104, onboard flash memory (flash) 105 , memory 106 and hard disk 107.
- the CPU 101 may be used to process data access requests.
- the CPU 101 when the CPU receives a data write request sent by a user, it will temporarily store the data in the data request in the memory 106 . When the total amount of data in the memory 106 reaches a certain threshold, the CPU 101 sends the data stored in the memory 106 to the hard disk 107 for persistent storage. In addition, the CPU 101 can also be used to calculate or process data, such as metadata management, deduplication, data compression, data verification, virtualized storage space, and address translation.
- data such as metadata management, deduplication, data compression, data verification, virtualized storage space, and address translation.
- the memory 106 refers to an internal memory directly exchanging data with the processor. It can read and write data at any time, and the speed is very fast. It is used as a temporary data storage for the operating system or other running programs.
- Memory includes at least two kinds of memory, for example, memory can be either random access memory or read-only memory (Read Only Memory, ROM).
- the random access memory is dynamic random access memory (Dynamic Random Access Memory, DRAM), or storage class memory (Storage Class Memory, SCM).
- DRAM is a semiconductor memory, which, like most Random Access Memory (RAM), is a volatile memory device.
- the DRAM and the SCM are only exemplary illustrations in this embodiment, and the memory may also include other random access memories, such as Static Random Access Memory (Static Random Access Memory, SRAM) and the like.
- the hard disk 107 is used to provide storage resources, such as storing data. It may be a magnetic disk or another type of storage medium, such as a solid state disk (solid state disk, SSD) or a shingled magnetic recording hard disk.
- solid state disk solid state disk, SSD
- SSD solid state disk
- FIG. 2 shows a schematic structural diagram of a storage device 200 .
- the storage device 200 includes a controller 210 and a storage medium 220, and the controller 210 is used to control the storage medium 220.
- the storage device 200 may also include a high-speed memory, a power supply, and optionally a power-down protection circuit.
- the controller 210 may include a host interface module 211 , a mapping management module 212 , and a nonvolatile memory control module 213 ; the storage medium 220 may include at least one nonvolatile storage medium 221 .
- the non-volatile memory 221 can be Nand Flash or phase change memory (phase change memory, PCM), etc., and the high-speed memory can be DRAM or SRAM, etc., and the controller 210 can be realized by pure hardware, or a combination of software and hardware. way to achieve.
- the storage medium 104 may be connected to a CPU or a host through a host interface module 211 to implement command interaction, such as read and write commands and management commands.
- the mapping management module 212 is used for managing the mapping between the visible logical block address in the computer system and the physical address space of the non-volatile memory on the disk.
- the non-volatile memory control module 213 is used for controlling data reading and writing to the non-volatile memory.
- the storage device includes a controller and a storage medium.
- the controller can be the controller 210 in FIG.
- the medium may be the non-volatile memory 221 in FIG. 2 .
- the storage device 200 includes a controller 210 and a storage medium 220 .
- the controller 210 is configured to create a first virtual storage, the first address space of the first virtual storage corresponds to the first physical address space of the storage medium, and the first physical address space is used for installing the first operating system.
- the host interface module 211 in the controller 210 receives first creation information from the BIOS, where the first creation information is used to instruct the controller 210 to create the first virtual storage.
- the controller 210 is further configured to create a second virtual memory, the second address space of the second virtual memory corresponds to the second physical address space of the storage medium, and the second physical address space is used for installing the second operating system.
- the host interface module 211 in the controller 210 receives second creation information from the BIOS, where the second creation information is used to instruct the controller 210 to create the second virtual storage.
- the controller 210 is also used to access one of the first operating system and the second operating system.
- the non-volatile memory control module 213 in the controller 210 is used to access one of the first operating system and the second operating system.
- the controller when accessing the first operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
- each virtual storage corresponds to a different physical storage medium. Address space, each physical address space can be used to install different operating systems, when the controller 210 accesses one of the operating systems, the controller is configured to prohibit access to other operating systems.
- the controller 210 when creating the first virtual storage, is specifically configured to allocate the first physical address space of the storage medium to the first address space of the first virtual storage according to the first creation information.
- the first creation information is also used to indicate the size of the first physical address space.
- the controller 210 allocates a physical address space of 300MB for the first virtual memory according to the first creation information.
- the address space of the virtual storage can be understood as the address space displayed by the virtual storage and accessible by users.
- the first address space of the first virtual memory starts from zero.
- the first address space of the first virtual storage is externally presented as a continuous space starting from zero, or in other words, the first address space of the first virtual storage is externally presented as a continuous space from sector 0 to the maximum limit.
- the controller 210 may use the following two methods to access the first operating system, which will be introduced respectively in conjunction with FIG. 3 and FIG. 4 .
- the controller 210 When accessing the first operating system, the controller 210 directly converts the first address space into the first physical address space, and accesses the first operating system according to the first physical address space.
- the mapping management module 212 of the controller 210 allocates an independent physical address space for each virtual memory, referring to Figure 3, the first address space of the first virtual memory corresponds to the first physical address space, the first The Nth address space of the N virtual memory corresponds to the Nth physical address space, and each physical address space can only store data of a corresponding operating system.
- the controller 210 can independently manage the address space of each virtual memory and the corresponding physical address space. For example, when accessing one of the operating systems, the controller 210 will use the The address space of the system is directly converted into the corresponding physical address space, and the operating system is accessed according to the physical address space.
- the controller 210 may assign a corresponding physical address space to the address space of each virtual memory based on the structure of the storage medium. For example, taking Nand Flash as an example, it can be allocated in units of physical blocks, or in units of LUN, Die, or Plane. In other words, the controller 210 can allocate the address space of each virtual memory based on different granularities. Allocate the corresponding physical address space.
- the first virtual storage has a first lifetime.
- Each virtual memory can have its own life cycle. In the life cycle, the physical address space corresponding to the virtual memory can always belong to the virtual memory, and other virtual memories cannot be used.
- the first address space when at least part of valid data in the first physical address space is erased, the first address space is set to correspond to the third physical address space, and the first physical address space is different from the third physical address space.
- the address space of the virtual memory can be reset to correspond to other physical address spaces, for example, the erased part of the first physical address space can be allocated
- the third physical address space may be a part of the first physical address space where data has not been erased.
- the controller 210 When accessing the first operating system, the controller 210 converts the first address space into a first logical address space, further converts the first logical address space into a first physical address space, and accesses the first physical address space according to the first physical address space. an operating system.
- the mapping management module 212 of the controller 210 allocates an independent logical address space for each virtual memory, referring to Figure 4, the first address space of the first virtual memory corresponds to the first logical address space, the first The Nth address space of the N virtual memory corresponds to the N logical address space.
- the controller 210 may translate the logical address space into a corresponding physical address space.
- the controller 210 may independently manage the address space of each virtual memory and the corresponding logical address space, and then perform unified management on each logical address space and the corresponding physical address space. For example, when accessing one of the operating systems, the controller 210 converts the address space of the virtual memory where the operating system is located into a corresponding logical address space, and then converts the logical address space into a corresponding physical address space, and according to the physical address space access the operating system.
- the controller 210 can directly convert the address space of the virtual memory where the operating system is located into a physical address space, and access the first operating system according to the physical address space.
- the operating system may also first convert the address space of the virtual memory where the operating system is located into a virtual address space, then convert the virtual address space into a physical address space, and access the operating system to the physical address space.
- the description that the controller 210 accesses other operating systems is similar to the above description of accessing the first operating system, and for simplicity, details are not repeated here.
- a virtual memory management interface can be set on the host interface module 211 , the virtual memory management interface is used to receive the creation information from the BIOS.
- the virtual memory management interface can be a software-configured communication protocol, for example, can be based on standard small computer system interface (small computer system interface, SCSI)/serial attached SCSI (serial attached SCSI, SAS), advanced technology additional interface (advanced technology attachment, ATA) / serial ATA (serial ATA, SATA) or non-volatile memory host controller interface specification (non-volatile memory express, NVMe) / peripheral component interconnect standard extension (peripheral component interconnect express, PCIe) Interface protocol custom command implementation.
- standard small computer system interface small computer system interface
- SCSI small computer system interface
- SCSI serial attached SCSI
- SAS advanced technology additional interface
- ATA advanced technology additional interface
- ATA serial ATA
- non-volatile memory host controller interface specification non-volatile memory express, NVMe
- peripheral component interconnect standard extension peripheral component interconnect express, PCIe
- controller 210 can also obtain the creation information through other software modules, for example, it can reuse other software modules on the computer system or use a separately established software module to send information to the controller through I2C, serial interface or IO interface. 210 Send creation information.
- the creation information includes an authentication password. If the authentication password is correct, the controller 210 creates the first virtual storage according to the first creation information.
- the controller 210 can authenticate the creation information, and only when the user inputs a correct authentication password, the controller 210 creates a virtual storage according to the creation information.
- the authentication password may be pre-configured by the computer system, or pre-agreed by the user and the controller. For example, when using the function of the virtual storage for the first time, the user can enter the configuration interface of the virtual storage without an authentication password, and agree on the authentication password on the configuration interface, and then the user enters the configuration interface of the virtual storage again or enters the creation information Need to include the authentication password.
- the controller 210 can also activate virtual storage.
- the controller 210 may set the virtual storage to an active state or an inactive state. For example, when the controller 210 receives the activation information for activating a certain virtual storage, if other virtual storages are in the activated state, they can change them to the inactive state by themselves.
- the controller 210 when the first operating system needs to be accessed, the controller 210 is also configured to receive activation information, and the activation information is used to activate the first virtual storage, so that the first operating system on the first virtual storage supports read and write access , the controller 210 controls the first virtual storage to be in an active state, and other virtual storages to be in an inactive state, and the operating system on the virtual storage in the inactive state does not support read and write access.
- the controller 210 receives the activation information, and presents the first address space of the first virtual storage to the user according to the activation information, and the controller 210 controls the address spaces of other virtual storages not to be presented to the user, so that the address spaces on the first virtual storage
- the operating system supports read and write access, and the operating system of other virtual storage does not support read and write access.
- the host interface module 211 in the controller 210 is configured to receive the activation information
- the mapping management module 212 in the controller 210 is configured to activate the first virtual storage according to the activation information.
- the controller 210 can control the state of each virtual memory to be active or inactive, so that the operating system of the virtual memory in the active state supports read and write access, and the operating system of the virtual memory in the inactive state does not support read and write access. For example, when the controller 210 receives the activation information indicating to activate the first virtual storage, it may set the other virtual storages to an inactive state. Therefore, the multiple virtual memories in the system can only be accessed by the operating system on at most one virtual memory at the same time, or the address space of at most one virtual memory is presented to the outside world, that is, the multiple virtual memories in the system can be accessed at most at the same time Only one virtual storage can be active.
- the controller 210 When the controller 210 acquires information for starting the system, the controller 210 loads the operating system on the virtual storage in an activated state.
- controller 210 can also delete the virtual storage.
- the controller 210 is further configured to receive deletion information, and the deletion information is used to delete the first virtual storage;
- the controller 210 is also configured to delete the first virtual storage according to the deletion information.
- the host interface module 211 in the controller 210 is configured to receive the deletion information
- the mapping management module 212 in the controller 210 is configured to delete the first virtual storage according to the deletion information.
- the controller 210 may modify the capacity of the virtual storage by deleting the virtual storage and recreating the virtual storage.
- the deletion information includes a correct authentication password
- the content executed by the controller 210 is similar to the description of including the authentication password in the creation information, and for simplicity, details are not repeated here.
- the controller 210 may support querying whether the storage device has the capability of creating a virtual storage.
- the user can first query whether the storage device has the ability to create a virtual storage.
- the controller 210 is also used to receive query information, and the query information is used to query whether the storage device It has the ability to create a virtual storage; the controller 210 is also used to query according to the query information; the controller 210 is also used to return the result of the query.
- the host interface module 211 in the controller 210 is used to receive query information sent by the user, and the host interface module 211 is also used to determine whether the storage device has the ability to create a virtual storage according to the supported communication interface, for example, the host interface module 211 inquires whether there is a communication interface that supports receiving creation information, and if so, the host interface module 211 can return to the user the query result that the storage device supports the creation of virtual storage; or the mapping management module 212 in the controller 210 determines the Whether the storage device has the ability to create a virtual memory, for example, the mapping management module 212 inquires whether it has the ability of independent mapping management, and if so, the host interface module 211 can return the query result that the storage device supports creating a virtual memory to the user; or not
- the volatile memory control module 213 determines whether the storage device has the ability to create a virtual memory according to the storage conditions in the storage medium.
- the interface module 211 may return to the user a query result that the storage device supports creating virtual storage.
- the controller 210 may support enabling the ability to create a virtual store, activate a virtual store, or delete a virtual store.
- the controller 210 is also configured to receive enabling information; the controller 210 is further configured to enable the storage device to have the capability of creating virtual storage, activating virtual storage, or deleting virtual storage according to the enabling information.
- the host interface module 211 in the controller 210 is used to obtain the enabling information, and the mapping management module 212 or the non-volatile memory control module 213 in the controller 210 opens the storage device according to the enabling information to create a virtual memory, activate Virtual storage or the ability to delete virtual storage.
- the storage device provided by the embodiment of the present application has been described above, and the storage device can improve the security and privacy of the supported operating system.
- the method for configuring multiple operating systems proposed in the embodiment of the present application will be described below.
- FIG. 5 shows a method 500 for configuring multiple operating systems provided by this application.
- S501 Create a first virtual storage, where a first address space of the first virtual storage corresponds to a first physical address space of a storage medium, and the first physical address space is used to install a first operating system.
- the controller may receive first creation information, where the first creation information is used to indicate to create the first virtual storage in the storage medium of the storage device.
- the system loads and runs the BIOS, and the user can input (for example, press a specific key on the keyboard) through the keyboard and/or mouse to enter the BIOS setup menu, and the user inputs the first creation information to the BIOS through the keyboard and/or mouse , the BIOS sends the first creation information to the controller through the virtual memory management interface.
- the first creation information also includes an authentication password.
- the first creation information includes an authentication password and an instruction for creating the first virtual storage, wherein the controller may obtain the authentication password first, and then receive the instruction for creating the first virtual storage from the BIOS if the authentication password is correct. Instructions for the first virtual memory.
- the first creation information also includes capacity information of the virtual storage.
- the BIOS can obtain the capacity information of the virtual memory through keyboard and/or mouse input, and when the BIOS sends an instruction for creating a certain virtual memory to the controller, it can simultaneously indicate the capacity of the virtual memory.
- the first creation information is also used to indicate the capacity of the first virtual storage.
- the BIOS can obtain the capacity information of the first virtual storage through keyboard and/or mouse input, and when the BIOS sends an instruction for creating the first virtual storage to the controller, it can simultaneously indicate the capacity of the first virtual storage.
- the manner in which the controller creates the second virtual storage is similar to the manner in which the first virtual storage is described in S501, and for simplicity, details are not repeated here.
- the controller when accessing the first operating system, the controller is configured to prohibit access to the second operating system; when accessing the second operating system, the controller is configured to prohibit access to the first operating system.
- the controller when accessing the first operating system, directly converts the first address space into the first physical address space, and accesses the first operating system according to the first physical address space.
- the controller when accessing the first operating system, converts the first address space into a first logical address space, further converts the first logical address space into a first physical address space, and accesses the first operating system according to the first physical address space. an operating system.
- step S503 the method 500 further includes step S504.
- the controller accesses the first operating system, the activation information is used to indicate activation of the first virtual storage. If in S503, the controller accesses the second operating system, the activation information is used to indicate activation of the second virtual storage.
- controller activating the virtual storage is similar to the description in FIG. 2 , and for simplicity, details are not repeated here.
- the controller When the controller obtains the information for starting the system, the controller loads the operating system on the virtual storage in an active state.
- the computer system when the computer system is started, the computer system will only display the first operating system, and the controller will load the first virtual storage The first operating system on the .
- the user needs to access other operating systems, for example, the second operating system on the second virtual storage, the user needs to send activation information to the controller to indicate activation of the second virtual storage, so that the second virtual storage is in an active state, and other virtual storage
- the memory is in an inactive state, and when the computer system is started again, the controller will load the second operating system on the second virtual memory. Therefore, the computer system only displays at most one operating system at a time, which protects the privacy of each operating system.
- B corresponding to A means that B is associated with A, and B can be determined according to A.
- determining B according to A does not mean determining B only according to A, and B may also be determined according to A and/or other information.
- sequence numbers of the above-mentioned processes do not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present application.
- the implementation process constitutes any limitation.
- the disclosed systems, devices and methods may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the modules is only a logical function division. In actual implementation, there may be other division methods.
- multiple modules or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or modules may be in electrical, mechanical or other forms.
- the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or may also be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional module in each embodiment of the present application may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server, or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
- the computer-readable storage medium may be any available medium that can be read by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium, (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital versatile disc (digital video disc, DVD)) or a semiconductor medium (for example, a solid state disk (solid state disk, SSD) )wait.
- a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
- an optical medium for example, a digital versatile disc (digital video disc, DVD)
- a semiconductor medium for example, a solid state disk (solid state disk, SSD)
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
一种支持多操作系统的存储设备、配置方法以及计算机系统,能够提高多个操作系统之间的安全性与私密性。其中,存储设备包括控制器和存储介质,控制器用于:创建第一虚拟存储器(S501),第一虚拟存储器的第一地址空间与存储介质的第一物理地址空间对应,第一物理地址空间用于安装第一操作系统;创建第二虚拟存储器(S502),第二虚拟存储器的第二地址空间与存储介质的第二物理地址空间对应,第二物理地址空间用于安装第二操作系统;以及访问第一操作系统和第二操作系统中的一个;其中,在访问第一操作系统时,控制器被配置为禁止访问第二操作系统;在访问第二操作系统时,控制器被配置为禁止访问第一操作系统(S503)。
Description
本申请涉及计算机领域,具体地,涉及支持多操作系统的存储设备、配置方法以及计算机系统。
在一些场景中,需要一台计算机支持多个操作系统,例如,对于办公人群,需要一台计算机上可以既支持用于工作的操作系统,又支持用于私人生活的操作系统。
目前,常见的支持多操作系统的计算机系统有如下几种。第一种,采用常用的硬盘分区的方式,在不同的分区上安装不同的操作系统,计算机启动时,启动装载会选择其中一个操作系统进行加载。这种方法,无论是启动哪一个操作系统,用户都可以访问每个分区上的数据,对于一些保密程度要求较高的应用场景,该方法会增加暴露和安全风险。第二种方式是在硬盘上安装虚拟机管理软件,并虚拟出多个虚拟机,分别在多个虚拟机上安装操作系统。然而,通过虚拟机管理软件仍然可以访问所有虚拟机的数据,仍然有一定的暴露风险和安全风险。因此,亟需一种支持多操作系统的存储设备、配置方法以及计算机系统,能够提高多个操作系统之间的安全性与私密性。
发明内容
本申请提供了一种支持多操作系统的存储设备、配置方法以及计算机系统,能够提高多个操作系统之间的安全性与私密性。
第一方面,提供了一种支持多操作系统的存储设备,所述存储设备包括控制器和存储介质,所述控制器用于:创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与所述存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统;以及访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述控制器被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述控制器被配置为禁止访问所述第一操作系统。
该存储介质用于存储该多个操作系统,还可以用于存储所管理的用户数据。
从而,在本申请中,控制器可以在存储介质中创建多个虚拟存储器,每个虚拟存储器的地址空间分别对应互不重叠的物理地址空间,每个物理地址空间可以分别安装互相隔离的操作系统,当访问其中一个操作系统时,控制器会被配置为禁止访问其他操作系统,可以提高多个操作系统之间的安全性与私密性。
结合第一方面,在第一方面的某些实现方式中,控制器还用于:在访问所述第一操作系统时,将所述第一地址空间直接转换为所述第一物理地址空间,并根据所述第一物理地 址空间访问所述第一操作系统。
从而,在本申请中,可以直接将虚拟存储器的地址空间直接转化为物理地址空间,并根据该物理地址空间访问对应的操作系统,操作可靠。
结合第一方面,在第一方面的某些实现方式中,所述控制器用于:在访问所述第一操作系统时,将所述第一地址空间转换为第一逻辑地址空间,进一步将所述第一逻辑地址空间转换为第一物理地址空间,根据所述第一物理地址空间访问所述第一操作系统。
从而,在本申请中,可以先将虚拟存储器的地址空间转化为逻辑地址空间,再进一步将逻辑地址空间转化为物理地址空间,并根据该物理地址空间访问对应的操作系统,操作方便。
结合第一方面,在第一方面的某些实现方式中,所述第一虚拟存储器具有第一生命周期。
从而,在本申请中,可以设置虚拟存储器具有生命周期,在生命周期内,虚拟存储器的地址空间与物理地址空间的对应关系保持不变,提高多个操作系统之间的私密性与安全性。
结合第一方面,在第一方面的某些实现方式中,所述控制器用于:当所述第一物理地址空间上的至少部分有效数据被擦除时,设置所述第一地址空间与所述存储介质的第三物理地址空间对应,所述第一物理地址空间与所述第三物理地址空间不同。
从而,在本申请中,当虚拟存储器的地址空间对应的物理空间上的至少部分有效数据被擦除时,可以重新给该虚拟存储器的地址空间设置对应的物理地址空间,例如,可以将被擦除的物理地址空间分配给其它地址空间,可以使得每个物理地址空间的磨损均衡,提高存储设备的整体寿命。
结合第一方面,在第一方面的某些实现方式中,所述第一地址空间或所述第二地址空间从零开始。
例如,虚拟存储器的地址空间对外呈现为从零开始的连续空间,或者说,虚拟存储器的地址空间对外呈现为从扇区0到最大限值的连续空间,因此,存储设备同一时间至多呈现一个虚拟存储器的地址空间。
从而,在本申请中,鉴于虚拟存储器的地址空间从零开始,虚拟存储器对用户呈现的特性与独立的硬盘一致,可以提高操作系统的安全性。
结合第一方面,在第一方面的某些实现方式中,结合第一方面,在第一方面的某些实现方式中,接收激活信息,所述激活信息用于指示激活所述第一虚拟存储器或所述第二虚拟存储器;访问所述第一虚拟存储器对应的所述第一操作系统或所述第二虚拟存储器对应的所述第二操作系统。
或者,控制器用于接收激活信息,并根据该激活信息设置第一地址空间或第二地址空间对外呈现。
其中,对外呈现的虚拟存储器的地址空间支持读写访问。
结合第一方面,在第一方面的某些实现方式中,所述控制器还用于:接收删除信息,所述删除信息用于指示删除所述第一虚拟存储器和所述第二虚拟存储器中的至少一个虚拟存储器;根据删除信息删除所述至少一个虚拟存储器。
从而,在本申请中,控制器可以删除不需要的虚拟存储器,提高存储设备配置的灵活 性。
结合第一方面,在第一方面的某些实现方式中,该控制器用于:从基本输入输出系统BIOS接收激活信息;和/或该控制器用于:从BIOS接收该删除信息。
可选地,在包括该控制器的存储设备和BIOS之间配置虚拟存储器管理接口,控制器通过该虚拟存储器管理接口从BIOS获取激活信息或是删除信息。
从而,在本申请中,用户可以通过BIOS与硬盘进行交互,提高了配置虚拟存储器的灵活性。
第二方面,提供了一种多操作系统的配置方法,方法包括:创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统;以及访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述控制器被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述控制器被配置为禁止访问所述第一操作系统。
从而,在本申请中,控制器可以在存储介质中创建多个虚拟存储器,每个虚拟存储器的地址空间分别对应互不重叠的物理地址空间,每个物理地址空间可以分别安装互相隔离的操作系统,当访问其中一个操作系统时,控制器会被配置为禁止访问其他操作系统,可以提高多个操作系统之间的安全性与私密性。
结合第二方面,在第二方面的某些实现方式中,所述方法还包括:在访问所述第一操作系统时,将所述第一地址空间直接转换为所述第一物理地址空间,并根据所述第一物理地址空间访问所述第一操作系统。
结合第二方面,在第二方面的某些实现方式中,所述方法还包括:在访问所述第一操作系统时,将所述第一地址空间转换为第一逻辑地址空间,进一步将所述第一逻辑地址空间转换为第一物理地址空间,根据所述第一物理地址空间访问所述第一操作系统。
结合第二方面,在第二方面的某些实现方式中,所述第一虚拟存储器具有第一生命周期。
结合第二方面,在第二方面的某些实现方式中,所述方法还包括:当所述第一物理地址空间上的至少部分有效数据被擦除时,设置所述第一地址空间与所述存储介质的第三物理地址空间对应,所述第一物理地址空间与所述第三物理地址空间不同。
结合第二方面,在第二方面的某些实现方式中,所述第一地址空间或所述第二地址空间从零开始。
结合第二方面,在第二方面的某些实现方式中,所述方法还包括:接收激活信息,所述激活信息用于指示激活所述第一虚拟存储器或所述第二虚拟存储器;访问所述第一虚拟存储器对应的所述第一操作系统或所述第二虚拟存储器对应的所述第二操作系统。
结合第二方面,在第二方面的某些实现方式中,所述方法包括:接收删除信息,所述删除信息用于指示删除所述第一虚拟存储器和所述第二虚拟存储器中的至少一个虚拟存储器;根据所述删除信息删除所述至少一个虚拟存储器。
第三方面,提供了一种配置多操作系统的装置,所述装置包括映射管理模块和非易失存储模块;其中:所述映射管理模块,用于创建第一虚拟存储器,所述第一虚拟存储器的 第一地址空间与所述存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;所述映射管理模块,还用于创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统;所述非易失存储模块,用于访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述非易失存储模块被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述非易失存储模块被配置为禁止访问所述第一操作系统。
从而,在本申请中,控制器可以在存储介质中创建多个虚拟存储器,每个虚拟存储器的地址空间分别对应互不重叠的物理地址空间,每个物理地址空间可以分别安装互相隔离的操作系统,当访问其中一个操作系统时,控制器会被配置为禁止访问其他操作系统,可以提高多个操作系统之间的安全性与私密性。
第四方面,提供了一种BIOS,该BIOS用于向存储设备发送第一创建信息,该第一创建信息用于指示存储设备创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与所述存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;该BIOS还用于向存储设备发送第二创建信息,该第二创建信息用于指示存储设备创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统。
在本申请中,BIOS与存储设备之间可以配置虚拟存储器管理接口,并且,该BIOS可以支持读写功能,从而,BIOS可以接收用户输入的创建信息,并将该创建信息发送给存储设备以创建虚拟存储器。
第五方面,提供了一种计算机系统,该计算机系统包括第一方面任意实现方式中的存储设备。
可选地,该计算机系统还包括第四方面任意实现方式中的BIOS。
第六方面,提供了一种装置,该装置包括处理单元、发送单元和接受单元。可选地,该发送单元和接受单元还可以为收发单元。该装置用于执行第二方面的任意实现方式中的方法。
第七方面,提供了一种装置,包括处理器和接口电路,接口电路用于接收来自该装置之外的其它装置的信号并传输至该处理器或将来自该处理器的信号发送给该装置之外的其它装置,该处理器通过逻辑电路或执行代码指令用于实现前述第二方面任意可能的实现方式中的方法。
第八方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序或指令,当该计算机程序或指令被执行时,实现前述第二方面任意可能的实现方式中的方法。
第九方面,提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述第二方面任意可能的实现方式中的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
第十方面,提供了一种计算机可执行指令的计算机程序产品,当计算机可执行指令在计算机上运行时,实现前述第二方面任意可能的实现方式中的方法。
图1是适用于本申请实施例的计算机系统的示意图;
图2是本申请实施例提供的硬盘的示意图;
图3是本申请实施例提供的一种映射管理方式的示意性结构图;
图4是本申请实施例提供的另一种映射管理方式的示意性结构图;
图5是本申请实施例提供的多个操作系统的配置方法。
下面将结合附图,对本申请中的技术方案进行描述。
在本申请中,附图中的虚线表示其对应的步骤为可选的步骤,或其对应的模块为可选的模块。
本申请实施例的技术方案可以应用于计算系统中,为便于理解本申请实施例,首先结合图1详细说明适用于本申请实施例提供的方法的一种计算机系统。图1示出了适用于本申请实施例提供的方法的计算机系统100的示意图。如图1所示,该计算机系统100可以包括中央处理器(central processing unit,CPU)101,显示器102,桥接芯片103,输入输出(input/output,IO)接口104,板载闪存(flash)105,内存106以及硬盘107。CPU101可以用于处理数据访问请求,示例性的,CPU接收用户发送的写数据请求时,会将这些数据请求中的数据暂时保存在内存106中。当内存106的数据总量达到一定阈值时,CPU 101将内存106中存储的数据发送给硬盘107进行持久化存储。另外,CPU 101还可以用于对数据进行计算或处理,例如元数据管理、重复数据删除、数据压缩、数据校验、虚拟化存储空间以及地址转换等。
图1中仅示出了一个CPU 101,在实际应用中,CPU的数量可以有多个。本实施例不对CPU的数量进行限定。显示器102则可以用于对用户显示数据。IO接口104可以包括鼠标、键盘、网口或通用串行总线(universal serial bus,USB)等,IO接口104可以通过桥接芯片103与CPU 101相连。板载闪存105上可以存有基本输入输出系统(basic input output system,BIOS),BIOS是计算机加电后最先执行的程序,完成对系统的各个硬件设备初始化设置和测试等功能,以确保系统能够正常工作。
内存106是指与处理器直接交换数据的内部存储器,它可以随时读写数据,而且速度很快,作为操作系统或其它正在运行中的程序的临时数据存储器。内存包括至少两种存储器,例如内存既可以是随机存取存储器,也可以是只读存储器(Read Only Memory,ROM)。举例来说,随机存取存储器是动态随机存取存储器(Dynamic Random Access Memory,DRAM),或者存储级存储器(Storage Class Memory,SCM)。DRAM是一种半导体存储器,与大部分随机存取存储器(Random Access Memory,RAM)一样,属于一种易失性存储器(volatile memory)设备。然而,DRAM和SCM在本实施例中只是示例性的说明,内存还可以包括其他随机存取存储器,例如静态随机存取存储器(Static Random Access Memory,SRAM)等。
硬盘107用于提供存储资源,例如存储数据。它可以是磁碟或者其它类型的存储介质,例如固态硬盘(solid state disk,SSD)或者叠瓦式磁记录硬盘等。
图2示出了一种存储设备200的示意性结构图。该存储设备200包括控制器210和存 储介质220,该控制器210用于控制存储介质220。另外,可选地,虽然图2并未画出,该存储设备200还可以包括高速存储器,电源,以及可选地还可以包括掉电保护电路等。其中,控制器210可以包括主机接口模块211,映射管理模块212,以及非易失存储器控制模块213;存储介质220可以包括至少一个非易失存储介质221。其中,非易失存储器221可以是Nand Flash或相变存储器(phase change memory,PCM)等,高速存储器可以是DRAM或SRAM等,控制器210可以采用纯硬件实现,也可以采用软硬件相结合的方式实现。存储介质104可以通过主机接口模块211与CPU或者说是主机相连,实现命令交互,例如读写类命令和管理类命令等。映射管理模块212用于管理计算机系统中可见的逻辑块地址和盘内非易失存储器物理地址空间之间的映射。非易失存储器控制模块213用于对非易失存储器进行数据读写的控制。
在一些场景中,需要一台计算机支持多个操作系统,例如,对于办公人群,需要一台计算机上可以既支持用于工作的操作系统,又支持用于私人生活的操作系统。
本申请提出可以支持多操作系统的存储设备,能够提高多个操作系统之间的安全性与私密性,该存储设备包括控制器和存储介质,控制器可以是图2中的控制器210,存储介质可以是图2中的非易失存储器221。
以下结合图2对本申请实施例提出的存储设备进行说明,该存储设备200包括控制器210和存储介质220。
控制器210用于创建第一虚拟存储器,第一虚拟存储器的第一地址空间与存储介质的第一物理地址空间对应,第一物理地址空间用于安装第一操作系统。
例如,控制器210中的映射管理模块212用于创建第一虚拟存储器。
在一种可能的实现方式中,控制器210中的主机接口模块211从BIOS接收第一创建信息,该第一创建信息用于指示控制器210创建第一虚拟存储器。
控制器210还用于创建第二虚拟存储器,第二虚拟存储器的第二地址空间与存储介质的第二物理地址空间对应,第二物理地址空间用于安装第二操作系统。
例如,控制器210中的映射管理模块212用于创建第二虚拟存储器。
在一种可能的实现方式中,控制器210中的主机接口模块211从BIOS接收第二创建信息,该第二创建信息用于指示控制器210创建第二虚拟存储器。
控制器210还用于访问第一操作系统和第二操作系统中的一个。
例如,控制器210中的非易失存储器控制模块213用于访问第一操作系统和第二操作系统中的一个。
其中,在访问第一操作系统时,控制器被配置为禁止访问第二操作系统;在访问第二操作系统时,控制器被配置为禁止访问第一操作系统。
应理解,本申请对控制器210创建虚拟存储器的数量不作特别限定,当控制器210创建三个或三个以上的虚拟存储器时,每个虚拟存储器的地址空间都分别对应存储介质的不同的物理地址空间,每个物理地址空间都可以分别用于安装不同的操作系统,当控制器210访问其中一个操作系统时,控制器被配置为禁止访问其他操作系统。
为了清楚,以下以创建第一虚拟存储器以及访问第一操作系统进行举例说明。
例如,在创建第一虚拟存储器时,该控制器210具体用于根据该第一创建信息为第一虚拟存储器的第一地址空间分配存储介质的第一物理地址空间。
可选地,第一创建信息还用于指示第一物理地址空间的大小。
例如,存储设备的总物理地址空间大小为1GB,第一创建信息指示创建300MB的第一虚拟存储器,则控制器210根据第一创建信息为第一虚拟存储器分配300MB的物理地址空间。
需要说明的是,在本申请中,虚拟存储器的地址空间可以理解为虚拟存储器对外显示的,用户可以访问的地址空间。
可选地,第一虚拟存储器的第一地址空间从零开始。
例如,第一虚拟存储器的第一地址空间对外呈现为从零开始的连续空间,或者说,第一虚拟存储器的第一地址空间对外呈现为从扇区0到最大限值的连续空间。
控制器210访问第一操作系统可以采用如下两种方式,以下结合图3和图4分别进行介绍。
在第一实现方式中:
在访问第一操作系统时,控制器210将第一地址空间直接转换为第一物理地址空间,并根据第一物理地址空间访问该第一操作系统。
例如,如图3所示,控制器210的映射管理模块212为每个虚拟存储器分配一个独立的物理地址空间,参见图3,第一虚拟存储器的第一地址空间对应第一物理地址空间,第N虚拟存储器的第N地址空间对应第N物理地址空间,每个物理地址空间只能存储对应的操作系统的数据。
在该第一实现方式中,控制器210可以针对每个虚拟存储器的地址空间与对应的物理地址空间进行独立的管理,例如,在访问其中一个操作系统时,控制器210将操作系统所在虚拟存储器的地址空间直接转换为对应的物理地址空间,并根据该物理地址空间访问该操作系统。
可选地,控制器210可以基于存储介质的结构为每个虚拟存储器的地址空间分配对应的物理地址空间。例如,以Nand Flash为例,可以按照物理块为单位进行分配,也可以按照LUN,Die或Plane为单位进行分配,换句话说,控制器210可以基于不同的粒度为每个虚拟存储器的地址空间分配对应的物理地址空间。
可选地,第一虚拟存储器具有第一生命周期。
每个虚拟存储器可以有自己的生命周期,在生命周期内,虚拟存储器对应的物理地址空间可以一直属于该虚拟存储器,其他虚拟存储器不可以使用。
可选地,当第一物理地址空间上的至少部分有效数据被擦除时,设置第一地址空间与第三物理地址空间对应,第一物理地址空间与第三物理地址空间不同。
当虚拟存储器对应的物理地址空间上的至少部分有效数据被擦除时,可以重新设置该虚拟存储器的地址空间与其他物理地址空间对应,例如,可以将被擦除的部分第一物理地址空间分配给其他虚拟存储器使用,第三物理地址空间可以是第一物理地址空间中未被擦除数据的部分空间。
在第二实现方式中:
在访问第一操作系统时,控制器210将第一地址空间转化为第一逻辑地址空间,进一步将第一逻辑地址空间转化为第一物理地址空间,并根据该第一物理地址空间访问该第一操作系统。
例如,如图4所示,控制器210的映射管理模块212为每个虚拟存储器分配一个独立的逻辑地址空间,参见图4,第一虚拟存储器的第一地址空间对应第一逻辑地址空间,第N虚拟存储器的第N地址空间对应地N逻辑地址空间。控制器210可以将逻辑地址空间转化为对应的物理地址空间。
在该第二实现方式中,控制器210可以针对每个虚拟存储器的地址空间与对应的逻辑地址空间进行独立的管理,再针对每个逻辑地址空间与对应的物理地址空间进行统一的管理。例如,在访问其中一个操作系统时,控制器210将操作系统所在的虚拟存储器的地址空间转化为对应的逻辑地址空间,再将逻辑地址空间转化为对应的物理地址空间,并根据该物理地址空间访问该操作系统。
以上对控制器210对如何访问第一操作系统进行了说明,在本申请中,控制器210可以直接将操作系统所在的虚拟存储器的地址空间转化为物理地址空间,并根据该物理地址空间访问该操作系统,也可以先将操作系统所在的虚拟存储器的地址空间转化为虚拟地址空间,再将该虚拟地址空间转化为物理地址空间,并对该物理地址空间访问该操作系统。控制器210访问其他操作系统的描述与上述描述访问第一操作系统类似,为了简便,在此不再赘述。
在控制器210的主机接口模块211从BIOS接收用于指示创建虚拟存储器的创建信息(例如,第一创建信息或第二创建信息)的情况下,可以在主机接口模块211上设置虚拟存储器管理接口,该虚拟存储器管理接口用于从BIOS接收该创建信息。
例如,该虚拟存储器管理接口可以是软件配置的通信协议,例如,可以基于标准小型计算机系统接口(small computer system interface,SCSI)/串行SCSI(serial attached SCSI,SAS)、高级技术附加接口(advanced technology attachment,ATA)/串行ATA(serial ATA,SATA)或者非易失存储器主机控制器接口规范(non-volatile memory express,NVMe)/外设部件互连标准扩展(peripheral component interconnect express,PCIe)接口协议自定义命令实现。
需要说明的是,控制器210也可以通过其它软件模块获取创建信息,例如,可以复用计算机系统上的其它软件模块或者使用单独设立的软件模块通过I2C、串行接口或IO接口等向控制器210发送创建信息。
可选地,该创建信息包括鉴权密码,在该鉴权密码正确的情况下,控制器210根据第一创建信息创建第一虚拟存储器。
用户通过BIOS向控制器210发送创建信息时,控制器210可以对该创建信息进行鉴权,当用户输入正确的鉴权密码时,控制器210才根据该创建信息创建虚拟存储器。
该鉴权密码可以是计算机系统预先配置的,也可以是用户和控制器预先约定的。例如,当初次使用虚拟存储器的功能时,用户可以不需要鉴权密码就进入虚拟存储器的配置界面,并在该配置界面约定鉴权密码,之后该用户再次进入虚拟存储器的配置界面或者输入创建信息时需要包括该鉴权密码。
控制器210还可以激活虚拟存储器。
具体地,控制器210可以设置虚拟存储器为激活状态,或者非激活状态。例如,控制器210在接收用于激活某一虚拟存储器的激活信息的时候,若有其它虚拟存储器处于激活态,则可自行将其更改为非激活状态。
例如,在需要访问第一操作系统时,该控制器210还用于接收激活信息,该激活信息用于激活该第一虚拟存储器,以使得第一虚拟存储器上的第一操作系统支持读写访问,控制器210控制该第一虚拟存储器为激活状态,其它虚拟存储器为非激活状态,处于非激活状态的虚拟存储器上的操作系统不支持读写访问。
或者说,控制器210接收激活信息,并根据该激活信息使得第一虚拟存储器的第一地址空间对用户呈现,控制器210控制其他虚拟存储器的地址空间不对用户呈现,使得第一虚拟存储器上的操作系统支持读写访问,其他虚拟存储器的操作系统不支持读写访问。
例如,控制器210中的主机接口模块211用于接收该激活信息,该控制器210中的映射管理模块212用于根据激活信息激活该第一虚拟存储器。
控制器210可以控制各个虚拟存储器的状态为激活状态或者非激活状态,使得处于激活状态的虚拟存储器的操作系统支持读写访问,处于非激活状态的虚拟存储器的操作系统不支持读写访问。例如,控制器210在接收到指示激活第一虚拟存储器的激活信息时,可以将其他虚拟存储器设置为非激活状态。从而,系统中的多个虚拟存储器在同一时间内至多只有一个虚拟存储器上的操作系统支持访问,或者至多只有一个虚拟存储器的地址空间对外呈现,即系统中的多个虚拟存储器在同一时间内至多只有一个虚拟存储器可以处于激活状态。
当控制器210获取用于启动系统的信息时,控制器210加载处于激活状态的虚拟存储器上的操作系统。
此外,控制器210还可以删除虚拟存储器。
具体地,在多个虚拟存储器中的至少一个虚拟存储器(例如,第一虚拟存储器)需要被删除时,该控制器210还用于接收删除信息,该删除信息用于删除该第一虚拟存储器;该控制器210还用于根据该删除信息删除该第一虚拟存储器。
例如,控制器210中的主机接口模块211用于接收该删除信息,该控制器210中的映射管理模块212用于根据删除信息删除该第一虚拟存储器。
另外,在一种可能的实现方式中,控制器210可以通过删除虚拟存储器并重新创建虚拟存储器实现虚拟存储器容量的修改。
可选地,该删除信息中包括正确的鉴权密码,控制器210执行的内容与创建信息中包括鉴权密码的描述类似,为了简便,在此不再赘述。
控制器210可以支持查询存储设备是否具有创建虚拟存储器的能力。
具体地,当用户需要创建虚拟存储器之前,用户可以先查询该存储设备是否具有创建虚拟存储器的能力,此时,该控制器210还用于接收查询信息,该查询信息用于查询该存储设备是否具有创建虚拟存储器的能力;该控制器210还用于根据该查询信息进行查询;该控制器210还用于返回查询的结果。
例如,控制器210中的主机接口模块211用于接收用户发送的查询信息,主机接口模块211还用于根据所支持的通信接口确定该存储设备是否具有创建虚拟存储器的能力,例如,主机接口模块211查询是否具有支持接收创建信息的通信接口,若有,则主机接口模块211可以向用户返回存储设备支持创建虚拟存储器的查询结果;或者控制器210中的映射管理模块212根据映射管理能力确定该存储设备是否具有创建虚拟存储器的能力,例如,映射管理模块212查询是否具有独立的映射管理的能力,若有,则主机接口模块211可以 向用户返回存储设备支持创建虚拟存储器的查询结果;或者非易失存储器控制模块213根据存储介质中的存储状况确定该存储设备是否具有创建虚拟存储器的能力,例如,非易失存储器控制模块213查询是否具有需要创建的虚拟存储器的容量,若有,则主机接口模块211可以向用户返回存储设备支持创建虚拟存储器的查询结果。
控制器210可以支持开启创建虚拟存储器、激活虚拟存储器或者删除虚拟存储器的能力。
具体地,若在创建虚拟存储器、激活虚拟存储器或者删除虚拟存储器之前需要开启该存储设备创建虚拟存储器、激活虚拟存储器或者删除虚拟存储器的能力,控制器210还用于接收使能信息;该控制器210还用于根据该使能信息使得该存储设备具有创建虚拟存储器、激活虚拟存储器或者删除虚拟存储器的能力。
例如,控制器210中的主机接口模块211用于获取该使能信息,控制器210中的映射管理模块212或非易失存储器控制模块213根据该使能信息开启该存储设备创建虚拟存储器、激活虚拟存储器或删除虚拟存储器的能力。
以上对本申请实施例提出的存储设备进行了说明,该存储设备能够提高所支持的操作系统的安全性与私密性。以下对本申请实施例提出的多操作系统的配置方法进行说明。
图5示出了本申请提供的一种多操作系统的配置方法500。
S501,创建第一虚拟存储器,第一虚拟存储器的第一地址空间与存储介质的第一物理地址空间对应,第一物理地址空间用于安装第一操作系统。
具体地,控制器可以接收第一创建信息,第一创建信息用于指示在存储设备的存储介质中创建第一虚拟存储器。
例如,系统上电后,系统加载运行BIOS,用户可以通过键盘和/或鼠标输入(例如在键盘上按特定按键),进入BIOS设置菜单,用户通过键盘和/或鼠标向BIOS输入第一创建信息,BIOS将该第一创建信息通过虚拟存储器管理接口发送给控制器。
可选地,该第一创建信息还包括鉴权密码。
例如,该第一创建信息包括鉴权密码和用于创建第一虚拟存储器的指令,其中,控制器可以先获取鉴权密码,在该鉴权密码正确的情况下,再从BIOS接收用于创建第一虚拟存储器的指令。
可选地,该第一创建信息还包括虚拟存储器的容量信息。
例如,BIOS可以通过键盘和/或鼠标输入获得虚拟存储器的容量信息,BIOS向控制器发送用于创建某个虚拟存储器的指令时,可以同时指示该虚拟存储器的容量。
可选地,该第一创建信息还用于指示第一虚拟存储器的容量。
例如,BIOS可以通过键盘和/或鼠标输入获得第一虚拟存储器的容量信息,BIOS向控制器发送用于创建第一虚拟存储器的指令时,可以同时指示该第一虚拟存储器的容量。
S502,创建第二虚拟存储器,第二虚拟存储器的第二地址空间与存储介质的第二物理地址空间对应,第二物理地址空间用于安装第二操作系统。
具体地,控制器创建第二虚拟存储器的方式与S501中描述创建第一虚拟存储器的方式类似,为了简便,在此不再赘述。
S503,访问第一操作系统和第二操作系统中的一个。
其中,在访问第一操作系统时,控制器被配置为禁止访问第二操作系统;在访问第二 操作系统时,控制器被配置为禁止访问第一操作系统。
可选地,在访问第一操作系统时,控制器将第一地址空间直接转换为第一物理地址空间,并根据第一物理地址空间访问第一操作系统。
可选地,在访问第一操作系统时,控制器将第一地址空间转换为第一逻辑地址空间,进一步将第一逻辑地址空间转换为第一物理地址空间,根据第一物理地址空间访问第一操作系统。
具体地,控制器访问操作系统的方式与图2中的描述类似,为了简便,在此不再赘述。
可选地,在步骤S503之前,方法500还包括步骤S504。
S504,接收激活信息,该激活信息用于指示激活第一虚拟存储器或第二虚拟存储器。
例如,若在S503中,控制器访问第一操作系统,则该激活信息用于指示激活第一虚拟存储器。若在S503中,控制器访问第二操作系统,则该激活信息用于指示激活第二虚拟存储器。
具体地,控制器激活虚拟存储器的描述与图2中的描述类似,为了简便,在此不再赘述。
当控制器获取用于启动系统的信息时,控制器加载处于激活状态的虚拟存储器上的操作系统。
例如,若第一操作系统所在的第一虚拟存储器处于激活状态,其他虚拟存储器处于非激活状态,则启动计算机系统时,计算机系统只会显示该第一操作系统,控制器会加载第一虚拟存储器上的第一操作系统。如果用户需要访问其它操作系统,例如,第二虚拟存储器上的第二操作系统,用户需要向控制器发送用于指示激活第二虚拟存储器的激活信息,使得第二虚拟存储器为激活状态,其它虚拟存储器为非激活状态,再次启动计算机系统时,控制器便会加载第二虚拟存储器上的第二操作系统。从而,该计算机系统在一个时间内至多只显示一个操作系统,保护了各个操作系统的私密性。
应理解,在本申请实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个模块或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或模块的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的 部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够读取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital video disc,DVD))或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (19)
- 一种支持多操作系统的存储设备,其特征在于,所述存储设备包括控制器和存储介质,所述控制器用于:创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与所述存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统;以及访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述控制器被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述控制器被配置为禁止访问所述第一操作系统。
- 如权利要求1所述的存储设备,其特征在于,所述控制器还用于:在访问所述第一操作系统时,将所述第一地址空间直接转换为所述第一物理地址空间,并根据所述第一物理地址空间访问所述第一操作系统。
- 如权利要求1所述的存储设备,其特征在于,所述控制器用于:在访问所述第一操作系统时,将所述第一地址空间转换为第一逻辑地址空间,进一步将所述第一逻辑地址空间转换为第一物理地址空间,根据所述第一物理地址空间访问所述第一操作系统。
- 如权利要求1至3中任一项所述的存储设备,其特征在于,所述第一虚拟存储器具有第一生命周期。
- 如权利要求1至4中任一项所述的存储设备,其特征在于,所述控制器用于:当所述第一物理地址空间上的至少部分有效数据被擦除时,设置所述第一地址空间与所述存储介质的第三物理地址空间对应,所述第一物理地址空间与所述第三物理地址空间不同。
- 如权利要求1至5中任一项所述的存储设备,其特征在于,所述第一地址空间或所述第二地址空间从零开始。
- 如权利要求1至6中任一项所述的存储设备,其特征在于,所述控制器还用于:接收激活信息,所述激活信息用于指示激活所述第一虚拟存储器或所述第二虚拟存储器;访问所述第一虚拟存储器对应的所述第一操作系统或所述第二虚拟存储器对应的所述第二操作系统。
- 如权利要求1至7中任一项所述的存储设备,其特征在于,所述控制器还用于:接收删除信息,所述删除信息用于指示删除所述第一虚拟存储器和所述第二虚拟存储器中的至少一个虚拟存储器;根据删除信息删除所述至少一个虚拟存储器。
- 一种多操作系统的配置方法,其特征在于,所述方法包括:创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物 理地址空间对应,所述第二物理地址空间用于安装第二操作系统;以及访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述控制器被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述控制器被配置为禁止访问所述第一操作系统。
- 如权利要求9所述的方法,其特征在于,所述方法还包括:在访问所述第一操作系统时,将所述第一地址空间直接转换为所述第一物理地址空间,并根据所述第一物理地址空间访问所述第一操作系统。
- 如权利要求9所述的方法,其特征在于,所述方法还包括:在访问所述第一操作系统时,将所述第一地址空间转换为第一逻辑地址空间,进一步将所述第一逻辑地址空间转换为第一物理地址空间,根据所述第一物理地址空间访问所述第一操作系统。
- 如权利要求9至11中任一项所述的方法,其特征在于,所述第一虚拟存储器具有第一生命周期。
- 如权利要求9至12中任一项所述的方法,其特征在于,所述方法还包括:当所述第一物理地址空间上的至少部分有效数据被擦除时,设置所述第一地址空间与所述存储介质的第三物理地址空间对应,所述第一物理地址空间与所述第三物理地址空间不同。
- 如权利要求9至13中任一项所述的方法,其特征在于,所述第一地址空间或所述第二地址空间从零开始。
- 如权利要求9至14中任一项所述的方法,其特征在于,所述方法还包括:接收激活信息,所述激活信息用于指示激活所述第一虚拟存储器或所述第二虚拟存储器;访问所述第一虚拟存储器对应的所述第一操作系统或所述第二虚拟存储器对应的所述第二操作系统。
- 如权利要求9至15中任一项所述的方法,其特征在于,所述方法包括:接收删除信息,所述删除信息用于指示删除所述第一虚拟存储器和所述第二虚拟存储器中的至少一个虚拟存储器;根据所述删除信息删除所述至少一个虚拟存储器。
- 一种配置多操作系统的装置,其特征在于,所述装置包括映射管理模块和非易失存储器控制模块;其中:所述映射管理模块,用于创建第一虚拟存储器,所述第一虚拟存储器的第一地址空间与所述存储介质的第一物理地址空间对应,所述第一物理地址空间用于安装第一操作系统;所述映射管理模块,还用于创建第二虚拟存储器,所述第二虚拟存储器的第二地址空间与所述存储介质的第二物理地址空间对应,所述第二物理地址空间用于安装第二操作系统;所述非易失存储器控制模块,用于访问所述第一操作系统和所述第二操作系统中的一个;其中,在访问所述第一操作系统时,所述非易失存储器控制模块被配置为禁止访问所述第二操作系统;在访问所述第二操作系统时,所述非易失存储器控制模块被配置为禁止 访问所述第一操作系统。
- 一种计算机系统,其特征在于,包括:控制器,所述控制器用于执行如权利要求9至16中任意一项所述的方法。
- 一种包含计算机可执行指令的计算机程序产品,其特征在于,当所述计算机可执行指令在计算机上运行时,使得如权利要求9至16中任一项所述的方法被执行。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/129358 WO2023077519A1 (zh) | 2021-11-08 | 2021-11-08 | 支持多操作系统的存储设备、配置方法以及计算机系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/129358 WO2023077519A1 (zh) | 2021-11-08 | 2021-11-08 | 支持多操作系统的存储设备、配置方法以及计算机系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023077519A1 true WO2023077519A1 (zh) | 2023-05-11 |
Family
ID=86240613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/129358 WO2023077519A1 (zh) | 2021-11-08 | 2021-11-08 | 支持多操作系统的存储设备、配置方法以及计算机系统 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023077519A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004171477A (ja) * | 2002-11-22 | 2004-06-17 | Ntt Data Corp | マルチオペレーティングシステム制御方法、およびその方法をコンピュータに実行させるプログラム、ならびにマルチオペレーティングシステム制御装置 |
CN1920731A (zh) * | 2005-08-23 | 2007-02-28 | 北京软通科技有限责任公司 | 一种实现操作系统隔离的系统及方法 |
CN101477476A (zh) * | 2008-01-02 | 2009-07-08 | 联想(北京)有限公司 | 多操作系统之间切换显示的控制方法和计算机系统 |
CN102117184A (zh) * | 2010-01-05 | 2011-07-06 | 联想(北京)有限公司 | 用于多存储器的控制器、终端设备及其启动和访问方法 |
CN102346818A (zh) * | 2010-08-02 | 2012-02-08 | 南京壹进制信息技术有限公司 | 一种用软件实现的计算机网络环境隔离系统 |
-
2021
- 2021-11-08 WO PCT/CN2021/129358 patent/WO2023077519A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004171477A (ja) * | 2002-11-22 | 2004-06-17 | Ntt Data Corp | マルチオペレーティングシステム制御方法、およびその方法をコンピュータに実行させるプログラム、ならびにマルチオペレーティングシステム制御装置 |
CN1920731A (zh) * | 2005-08-23 | 2007-02-28 | 北京软通科技有限责任公司 | 一种实现操作系统隔离的系统及方法 |
CN101477476A (zh) * | 2008-01-02 | 2009-07-08 | 联想(北京)有限公司 | 多操作系统之间切换显示的控制方法和计算机系统 |
CN102117184A (zh) * | 2010-01-05 | 2011-07-06 | 联想(北京)有限公司 | 用于多存储器的控制器、终端设备及其启动和访问方法 |
CN102346818A (zh) * | 2010-08-02 | 2012-02-08 | 南京壹进制信息技术有限公司 | 一种用软件实现的计算机网络环境隔离系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3457288B1 (en) | Computer system and storage access device | |
CN110633048B (zh) | 闪存存储装置的命名空间操作方法 | |
US8924659B2 (en) | Performance improvement in flash memory accesses | |
US20240419345A1 (en) | Gradually Reclaim Storage Space Occupied by a Proof of Space Plot in a Solid State Drive | |
KR101579941B1 (ko) | 가상머신 i/o 관리 방법 및 장치 | |
CN115904212A (zh) | 数据处理的方法、装置、处理器和混合内存系统 | |
JP2022034455A (ja) | 計算機システムおよび管理方法 | |
US20250013583A1 (en) | Managed nand flash memory region control against endurance hacking | |
US20240086092A1 (en) | Method for managing namespaces in a storage device and storage device employing the same | |
US10671307B2 (en) | Storage system and operating method thereof | |
US11093175B1 (en) | Raid data storage device direct communication system | |
CN115757207A (zh) | 缓存状态管理方法、装置、通信设备及存储介质 | |
CN109992536A (zh) | 数据处理方法、固态硬盘以及计算机设备 | |
US20250028468A1 (en) | Reading a master boot record for a namespace after reformatting the namespace | |
WO2017107163A1 (zh) | 基于异构混合内存的内存管理方法和系统 | |
WO2024222800A1 (zh) | 一种内存管理的方法以及设备 | |
WO2023077519A1 (zh) | 支持多操作系统的存储设备、配置方法以及计算机系统 | |
CN115185450A (zh) | 用于迁移、复制和备份的基于阵列的拷贝机制 | |
WO2022222977A1 (zh) | 用于运行云业务实例的物理服务器的内存管理方法和装置 | |
CN107851062A (zh) | 一种主机集群中缓存管理方法及主机 | |
WO2017208360A1 (ja) | 計算機システム | |
US20250117324A1 (en) | Storage device, operating method of storage device, and operating method of storage system | |
US20240256317A1 (en) | Systems and methods for backend architecture provisioning and emulation | |
US20240311024A1 (en) | Storage controller and method of operating electronic system including the same | |
US20250036321A1 (en) | Software-raid-protected boot data vsan system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21963028 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21963028 Country of ref document: EP Kind code of ref document: A1 |