| CPC G06F 21/577 (2013.01) [G06F 11/0793 (2013.01); G06F 21/74 (2013.01)] | 20 Claims |

|
1. A data processing method, applied to a target device in which a Linux operating system is running, wherein a first program is deployed in the Linux operating system, and the method comprises:
loading a target loading and invasion machine into a first memory space of the first program, and acquiring a vulnerability repair library for the first program through the target loading and invasion machine;
creating, in the first memory space, a second memory space for the target loading and invasion machine, and configuring a second runtime environment isolated from a first runtime environment of the first program, wherein the second memory space is simply available to the target loading and invasion machine and to a program loadable by the target loading and invasion machine;
loading the vulnerability repair library in the second memory space based on the second runtime environment, and performing a vulnerability repair on the first program by using the vulnerability repair library.
|