Abstract:
PURPOSE: A method and a system for controlling the input/output of a disk are provided to supply input/output bandwidth predictable by each process or a process group. CONSTITUTION: A determining unit(521) determines whether a case, when the number of spent tokens is not larger than the minimum number of input/output tokens, exists. The minimum number of input/output tokens corresponds to the minimum bandwidth for input/output of a disk preset by a process or a process group. When the number of spent tokens is not larger than the minimum number of input/output tokens, a time slice unit(522) assigns a time slice by each process or process group in the order of the processes or process groups.
Abstract:
PURPOSE: A system, a device, and a method for transferring data are provided to transfer data between one user process and a kernel at a proper time. CONSTITUTION: A data transfer system includes a user process region(100), a kernel region(200), and a hardware region. User processes are executed in the user process region. The kernel area comprises a kernel thread(240). The hardware region performs input/output according to an input/output request of each user process. When the user process is being executed, the kernel thread copies input data to the user process region from the kernel region.
Abstract:
An apparatus and a method for automatically generating security policy of SELinux(Security Enhanced Linux) based on SELT(SELinux Template) are provided to automatically generate security policy by using an operation pattern of designated application. A check module stores an inputted file name to a binary list(S201). The check module checks an execution state of a process of binary based on the binary list(S202). The check module finishes a corresponding process of an executing binary(S203). A system call log traced by generating the process is stored(S204,S205). The traced system call log is refined into a data required for generating the security policy(S206~S208). Objects are grouped(S209). A SELT security policy file is recorded in a system(S210). A redundancy and collision are detected between the generated SELT security policy and existing security policies inside the system(S211,S212).