CN102799480A - Method and device for closing interrupt in virtualization system - Google Patents

Method and device for closing interrupt in virtualization system Download PDF

Info

Publication number
CN102799480A
CN102799480A CN2012102071375A CN201210207137A CN102799480A CN 102799480 A CN102799480 A CN 102799480A CN 2012102071375 A CN2012102071375 A CN 2012102071375A CN 201210207137 A CN201210207137 A CN 201210207137A CN 102799480 A CN102799480 A CN 102799480A
Authority
CN
China
Prior art keywords
guest
interrupt identification
interrupt
interface
bit register
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102071375A
Other languages
Chinese (zh)
Other versions
CN102799480B (en
Inventor
马彬
郑章孝
白云鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANTONG HANGDA ELECTRONIC TECHNOLOGY Co.,Ltd.
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201210207137.5A priority Critical patent/CN102799480B/en
Publication of CN102799480A publication Critical patent/CN102799480A/en
Priority to PCT/CN2013/070810 priority patent/WO2013189180A1/en
Application granted granted Critical
Publication of CN102799480B publication Critical patent/CN102799480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4812Task transfer initiation or dispatching by interrupt, e.g. masked
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45583Memory management, e.g. access or allocation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Memory System Of A Hierarchy Structure (AREA)

Abstract

The invention provides a method and device for closing interrupt in a virtualization system, which aim to better support the open/close interrupt of a Guest OS (Operating System) and reduce the influence on system operating efficiency. The method comprises the following steps of: offering an interface to the Guest OS of the virtualization operating system so as to allow the Guest OS to call the interface to set an interrupt flag for an interrupt flag register corresponding to the Guest OS in shared memory; checking the interrupt flag register; and avoiding sending virtual interrupt to the Guest OS if the interrupt flag register indicates that the Guest OS requires interrupt closing. The method provided by the invention does not rely on co-compiling of Hypervisor and the Guest OS, the Hypervisor has no need of sharing code sections with the Guest OS, and the access to the shared memory is realized through a virtual address, so that the interrupt closing/opening is quick, and the system operating efficiency is high.

Description

Close the method and apparatus of interruption in the virtualization system
Technical field
The present invention relates to computer realm, relate in particular to the method and apparatus of closing interruption in the virtualization system.
Background technology
In order to prevent that important system-program code from not interrupted when carrying out or in order to guarantee data consistency, (Operating System OS) needs to carry out the operation of closing interruption to operating system.
Under non-virtualized environment, OS can directly close physical hardware and interrupt.Yet, be Hypervisor in case disposed real-time embedded virtual member, the distribution of interruption is just by the Hypervisor unified management, and OS can not directly remove to close physical hardware and interrupt.For example; At virtualization system; A plurality of client operating systems (Guest OS) can operate in single physical central processing unit (Central Processing Unit; CPU) on, single Guest OS carries out and closes the operation that can not influence other Guest OS on the same physical cpu when interrupting, and this just need be handled to close and interrupt this operation by the Hypervisor united and coordinating.
In the virtualization system of having disposed Hypervisor; A kind of interrupt method of closing that prior art provides is: Hypervisor and Guest OS independent compilation, link reflection; Through boot (BootLoader) reflection of Hypervisor and Guest OS is loaded into internal memory; BootLoader starts Hypervisor, and Hypervisor starts each Guest OS more respectively.Because in virtualization system, interruption is by the unified distribution of Hypervisor, therefore, need Hypervisor that the communication modes of interrupt notification (Hyper Call) is provided, that is, Guest OS sends the request of closing interruption through Hyper Call to Hypervisor.After Hypervisor receives the request of closing interruption, be provided with again and forbid interrupting, promptly close interruption to relevant Guest OS kernel distribution.
Hyper Call generally be applied in not share a code segment the scene of striding the reflection interface interchange (for example; XEN provides strides the reflection interface interchange) and different level of privilege pattern between the scene (for example, the syscall that Linux provides calls) etc. of interface interchange, at present; Under above-mentioned application scenarios; There is multiple implementation in Hyper Call, for example, and through the message communication, through interrupting communication or through realizing the interface interchange function etc. between the cross-module formula.Because the implementation of Hyper Call generally all relates to the application to universal communications such as internal memory and formation mechanism; Therefore; If Guest OS needs to carry out continually to open or close to interrupt this operation, the interrupt method of closing that then above-mentioned prior art provides makes running efficiency of system lower.
Summary of the invention
The embodiment of the invention provides the method and apparatus of closing interruption in the virtualization system, interrupts to support Guest OS ON/OFF better, reduces the influence to running efficiency of system simultaneously.
The embodiment of the invention provides the method for closing interruption in a kind of virtualization system; Said method comprises: to virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set; Said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification, and Guest OS and the shared memory headrooms of said Hypervisor different in the said shared drive are isolated mutually; Check said interrupt identification bit register; If said interrupt flag bit register shows that said Guest OS need close interruption, then forbid sending virtual interruption to said Guest OS.
The embodiment of the invention provides the device of closing interruption in a kind of virtualization system; Said device comprises: interface provides module; Be used for interface being provided and interrupt identification be set so that said Guest OS calls the said interface interrupt identification bit register that shared drive is corresponding with said Guest OS to virtualizing operating systems Guest OS; Said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification, and Guest OS and the shared memory headrooms of said Hypervisor different in the said shared drive are isolated mutually; Zone bit inspection module is used to check said interrupt identification bit register; The interrupt holdoff sending module is used for then forbidding sending virtual interruption to said Guest OS if the said interrupt flag bit register of said zone bit inspection module check shows that said Guest OS need close interruption.
Can know from the invention described above embodiment; Because real-time embedded virtual member Hypervisor provides interface to virtualizing operating systems Guest OS, said Guest OS physical memory that is can be with Hypervisor shared with at least one Guest OS and that be used for writing down interrupt identification is that shared drive is provided with interrupt identification with the corresponding interrupt identification bit register of said Guest OS.Compare with the method that prior art is closed interruption through the communication modes that interrupt notification is provided, the method that the embodiment of the invention provides does not rely on Hypervisor and Guest OS compiles jointly, and Hypervisor does not need to share code segment with Guest OS; Because virtualization layer separates with Guest OS reflection, and the visit of shared drive is carried out through virtual address, therefore, speed is fast when close is interrupted, and running efficiency of system is high.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention; To do to introduce simply to the accompanying drawing of required use in prior art or the embodiment description below; Obviously; Accompanying drawing in describing below only is some embodiments of the present invention, to those skilled in the art, can also obtain it like these accompanying drawings
His accompanying drawing.
Fig. 1 is the method flow synoptic diagram of closing interruption in the virtualization system that provides of the embodiment of the invention;
Fig. 2 is that last a plurality of Guest OS of operation of single physical CPU and the single Guest OS that the embodiment of the invention provides runs on the scene synoptic diagram on a plurality of physical cpus;
Fig. 3 is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of the embodiment of the invention;
Fig. 4 is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of another embodiment of the present invention;
Fig. 5 is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of another embodiment of the present invention;
Fig. 6 a is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of another embodiment of the present invention;
Fig. 6 b is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of another embodiment of the present invention;
Fig. 7 is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of another embodiment of the present invention.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those skilled in the art obtained belongs to the scope that the present invention protects.
Seeing also accompanying drawing 1, is the method flow synoptic diagram of closing interruption in the virtualization system that provides of the embodiment of the invention, mainly comprises step S101, step S102 and step S103:
S101; To virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set, said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification.
In embodiments of the present invention; Guest OS is a kind of virtualizing operating systems; This type operating system and general operation system difference are; Not only to move such virtualizing operating systems or such virtualizing operating systems on the single physical CPU only to operate on the single physical CPU, promptly be not directly to run on the hardware layer (Hardware), but run on the real-time embedded virtual member Hypervisor on the hardware layer; Shown in accompanying drawing 2, be that single physical CPU goes up a plurality of Guest OS of operation and single Guest OS runs on the scene synoptic diagram on a plurality of physical cpus.For example, Guest OS 0With Guest OS 1Run on physical cpu through Hypervisor 0(Core 0) on, and Guest OS nRun on physical cpu through Hypervisor 1(Core 1), physical cpu 2(Core 2) and physical cpu n(Core n) on.
Close through the communication modes of interrupt notification (Hyper Call) with prior art and to interrupt differently, in embodiments of the present invention, real-time embedded virtual member Hypervisor provides one deck intermediate address, and this intermediate address is managed with shadow page table; Set up the mapping that Guest OS sets up intermediate address to physical memory addresses to the mapping and the Hypervisor of intermediate address by Guest OS; Here Guest OS is called the ground floor map addresses to the mapping of intermediate address, the mapping of intermediate address to physical memory addresses is called second layer map addresses.The effect of ground floor map addresses be real-time embedded virtual member Hypervisor can the real-time embedded virtual member Hypervisor of perception on all Guest OS to the demand and the unified management of physical memory; The effect of second layer map addresses is that real-time embedded virtual member Hypervisor can have planning property ground to divide the physical memory resource according to the demand of Guest OS to physical memory.
Set up after ground floor map addresses and the second layer map addresses, can set up the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification.In following explanation; For the convenience of describing; Real-time embedded virtual member Hypervisor and at least one Guest OS are shared and the physical memory that is used to write down interrupt identification abbreviates " shared drive " as, and obviously, shared drive is the part of physical memory.Shown in accompanying drawing 3, be the synoptic diagram of having set up shared drive in the method that provides of the embodiment of the invention at physical memory.Shared drive can be by Hypervisor and at least one Guest OS common access; And; Guest OS and the shared memory headrooms of said Hypervisor different in the said shared drive are isolated mutually, and the memory headroom that promptly any Guest OS and Hypervisor share in the shared drive is isolation mutually with another Guest OS and the shared memory headroom of Hypervisor.For example, in accompanying drawing 3, Guest OS 0The physical memory of sharing with Hypervisor and being used for writing down interrupt identification is the " VM of shared drive 0The interrupt identification bit space ", Guest OS 1The physical memory of sharing with Hypervisor and being used for writing down interrupt identification is the " VM of shared drive 1The interrupt identification bit space " and Guest OS 2The physical memory of sharing with Hypervisor and being used for writing down interrupt identification is the " VM of shared drive 2The interrupt identification bit space " be to isolate mutually.
As one embodiment of the invention; To virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set can be: real-time embedded virtual member Hypervisor provides interface so that said Guest OS calls said interface to Guest OS; The intermediate address information that provides according to said interface; Through ground floor map addresses visit intermediate address; Visit said shared drive according to said intermediate address and through second layer map addresses, the interrupt identification bit register corresponding with said Guest OS is provided with interrupt identification, for example; Use logical zero to represent to close interruption, use logical one to represent to open interruption.Need to prove, because real-time embedded virtual member Hypervisor has set up ground floor map addresses and second layer map addresses, therefore; Guest OS when interrupt identification is set, though be the interface accessing intermediate address that provides through aforementioned ground floor map addresses and real-time embedded virtual member Hypervisor, then; Finally have access to shared drive through second layer map addresses; But it is not in system's operational process,, different with direct visit shared drive as far as Guest OS; Be that Guest OS thinks directly to visit shared drive, interrupt identification bit register that will be corresponding with this Guest OS is provided with interrupt identification.
S102 checks said interrupt identification bit register.
As one embodiment of the invention, when checking said interrupt identification bit register, the abnormality processing function that can be the appointment of execute exception vector is to check said interrupt identification bit register.Particularly; The physical discontinuity that hardware produces, for example, general physical discontinuity or rapid physical interruption etc. at first are routed to physics nuclear through GIC; Physics nuclear is gone up operation Hypervisor program; Enter into the exception vector table of Hypervisor then, and jump to the abnormality processing function of the exception vector appointment of Hypervisor, the content of inspection interrupt identification bit register in the Interrupt Process process of Hypervisor.
In the embodiment of above-mentioned inspection interrupt identification bit register; It can be the clock that provides according to real-time embedded virtual member Hypervisor; Periodically the said interrupt identification bit register of poll is promptly initiatively checked said interrupt identification bit register, also can be under the triggering of the physical discontinuity that hardware produces; Check said interrupt identification bit register, the said interrupt identification bit register of promptly passive inspection.
S103 if said interrupt flag bit register shows that said Guest OS need close interruption, then forbids sending virtual interruption to said Guest OS.
For example, if use logical zero to represent to close interruption, use logical one to represent to open interruption, the content that then is checked through the interrupt identification bit register is a logical zero, then forbids sending the physical discontinuity that hardware produces to said Guest OS.
From the virtualization system that the invention described above embodiment provides, closing the method for interruption can know; Because real-time embedded virtual member Hypervisor provides interface to virtualizing operating systems Guest OS, said Guest OS physical memory that is can be with Hypervisor shared with at least one Guest OS and that be used for writing down interrupt identification is that shared drive is provided with interrupt identification with the corresponding interrupt identification bit register of said Guest OS.Compare with the method that prior art is closed interruption through the communication modes that interrupt notification is provided, the method that the embodiment of the invention provides does not rely on Hypervisor and Guest OS compiles jointly, and Hypervisor does not need to share code segment with Guest OS; Because virtualization layer separates with Guest OS reflection, and the visit of shared drive is carried out through virtual address, therefore, speed is fast when close is interrupted, and running efficiency of system is high.
Seeing also accompanying drawing 4, is the apparatus structure synoptic diagram of closing interruption in the virtualization system that provides of the embodiment of the invention.For the ease of explanation, only show the part relevant with the embodiment of the invention.The device of closing interruption in the virtualization system of accompanying drawing 4 examples comprises that interface provides module 401, zone bit inspection module 402 and interrupt holdoff sending module 403, wherein:
Interface provides module 401; Be used for interface being provided and interrupt identification be set so that said Guest OS calls the said interface interrupt identification bit register that shared drive is corresponding with said Guest OS to virtualizing operating systems Guest OS; Said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification; Wherein, different Guest OS and the shared memory headrooms of said Hypervisor isolated mutually in the said shared drive.
Zone bit inspection module 402 is with the said interrupt identification bit register of inspection.
Interrupt holdoff sending module 403 is used for then forbidding sending virtual interruption to said Guest OS if the said interrupt flag bit register of said zone bit inspection module 402 inspections shows that said Guest OS need close interruption.
Need to prove; Close in the above virtualization system in the embodiment of device of interruption, the division of each functional module only illustrates, can be as required in the practical application; For example the facility of the realization of the configuration requirement of corresponding hardware or software is considered; And above-mentioned functions is distributed by the different functional completion, the inner structure that is about to said cable modem eedle threader is divided into different functional, to accomplish all or part of function of above description.And; In the practical application; Corresponding functional modules in the present embodiment can be to be realized by relevant hardware, also can carry out corresponding software by relevant hardware and accomplish, for example; Aforesaid interface provides module; Can be have carry out aforementioned to virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS the hardware of interrupt identification is set, for example interface provides device, thereby also can be to carry out perhaps other hardware devices of general processor that the corresponding computer program accomplishes aforementioned functional; Aforesaid for another example zone bit inspection module; Can be to have the hardware of carrying out the said interrupt flag bit register functions of aforementioned inspection; Zone bit detector for example, thus also can be to carry out general processor or other hardware devices (each embodiment that this instructions provides can use the foregoing description principle) that the corresponding computer program is accomplished aforementioned functional.
The interface of accompanying drawing 4 examples provides module 401 can comprise that interface interchange unit 501 and interrupt identification are provided with unit 502, closes the device of interruption in the virtualization system that another embodiment of the present invention provides shown in accompanying drawing 5, wherein:
Interface interchange unit 501 is used for interface being provided so that said Guest OS calls said interface to virtualizing operating systems Guest OS;
Interrupt identification is provided with unit 502; Be used for the intermediate address information that provides according to said interface; Through ground floor map addresses visit intermediate address; According to said intermediate address and through second layer map addresses, the interrupt identification bit register corresponding with said Guest OS is provided with interrupt identification, said ground floor map addresses is the mapping of said Guest OS to intermediate address; Said second layer map addresses is the mapping of said intermediate address to physical memory addresses, and said physical memory comprises said shared drive.
The device of closing interruption in the virtualization system of accompanying drawing 4 or accompanying drawing 5 examples can also comprise that module 601 is set up in mapping and shared drive is set up module 602; Close the device of interruption in the virtualization system that another embodiment of the present invention provides shown in accompanying drawing 6a or accompanying drawing 6b, wherein:
Module 601 is set up in mapping, is used to set up Guest OS to the mapping of intermediate address and the mapping of said intermediate address to physical memory addresses.
Shared drive is set up module 602, is used to set up said shared drive, and Guest OS and the shared memory headrooms of said Hypervisor different in the said shared drive are isolated mutually.
The clock that the zone bit of accompanying drawing 4 examples inspection module 402 can provide according to real-time embedded virtual member Hypervisor; The said interrupt identification bit register of poll periodically; Also can under the triggering of the physical discontinuity that hardware produces, check said interrupt identification bit register.Zone bit inspection module 402 can comprise first performance element 701, closes the device of interruption in the virtualization system that another embodiment of the present invention provides shown in accompanying drawing 7,
Performance element 701, the abnormality processing function that is used for the appointment of execute exception vector is to check said interrupt identification bit register.Particularly; The physical discontinuity that hardware produces; For example; General physical discontinuity or rapid physical interruption etc. at first are routed to physics nuclear through GIC, and physics nuclear is gone up operation Hypervisor program, enter into the exception vector table of Hypervisor then; And jump to the abnormality processing function of the exception vector appointment of Hypervisor, in the Interrupt Process process of Hypervisor in the performance element 701 execute exception vector tables abnormality processing function of exception vector appointment with the content of inspection interrupt identification bit register.
Need to prove; Contents such as the information interaction between each module/unit of said apparatus, implementation; Since with the inventive method embodiment based on same design; Its technique effect that brings is identical with the inventive method embodiment, and particular content can repeat no more referring to the narration among the inventive method embodiment here.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to accomplish through program, such as following the whole bag of tricks one or more or all:
To virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set, said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification;
Check said interrupt identification bit register;
If said interrupt flag bit register shows that said Guest OS need close interruption, then forbid sending virtual interruption to said Guest OS.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to accomplish through program; This program can be stored in the computer-readable recording medium; Storage medium can comprise: ROM (read-only memory) (ROM; Read Only Memory), RAS (RAM, Random Access Memory), disk or CD etc.
More than close interruption in the virtualization system that the embodiment of the invention is provided method and apparatus carried out detailed introduction; Used concrete example among this paper principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that on embodiment and range of application, all can change, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. close the method for interruption in the virtualization system, it is characterized in that said method comprises:
To virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set; Said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification, and different Guest OS and the shared memory headrooms of said Hypervisor isolated mutually in the said shared drive;
Check said interrupt identification bit register;
If said interrupt flag bit register shows that said Guest OS need close interruption, then forbid sending virtual interruption to said Guest OS.
2. the method for claim 1; It is characterized in that; Said to virtualizing operating systems Guest OS interface is provided so that said Guest OS call said interface with shared drive in the interrupt identification bit register corresponding with said Guest OS interrupt identification is set, comprising:
Interface is provided so that said Guest OS calls said interface to virtualizing operating systems Guest OS;
The intermediate address information that provides according to said interface; Through ground floor map addresses visit intermediate address; Visit said shared drive according to said intermediate address and through second layer map addresses, the interrupt identification bit register corresponding with said Guest OS is provided with interrupt identification.
3. method as claimed in claim 2 is characterized in that, said to virtualizing operating systems Guest OS interface is provided so that said Guest OS with shared drive in the interrupt identification bit register corresponding with said Guest OS be provided with and also comprise before the interrupt identification:
Set up Guest OS to the mapping of intermediate address and the mapping of said intermediate address to physical memory addresses;
Set up said shared drive.
4. the method for claim 1 is characterized in that, the said interrupt identification bit register of said inspection comprises:
The clock that provides according to said Hypervisor, the periodically said interrupt identification bit register of poll; Perhaps
Under the triggering of the physical discontinuity that hardware produces, check said interrupt identification bit register.
5. method as claimed in claim 4 is characterized in that, the said interrupt identification bit register of said inspection comprises:
The abnormality processing function of execute exception vector appointment is to check said interrupt identification bit register.
6. close the device of interruption in the virtualization system, it is characterized in that said device comprises:
Interface provides module; Be used for interface being provided and interrupt identification be set so that said Guest OS calls the said interface interrupt identification bit register that shared drive is corresponding with said Guest OS to virtualizing operating systems Guest OS; Said shared drive is the physical memory that real-time embedded virtual member Hypervisor and at least one Guest OS share and be used to write down interrupt identification, and Guest OS and the shared memory headrooms of said Hypervisor different in the said shared drive are isolated mutually;
Zone bit inspection module is used to check said interrupt identification bit register;
The interrupt holdoff sending module is used for then forbidding sending virtual interruption to said Guest OS if the said interrupt flag bit register of said zone bit inspection module check shows that said Guest OS need close interruption.
7. device as claimed in claim 6 is characterized in that, said interface provides module to comprise:
The interface interchange unit is used for interface being provided so that said Guest OS calls said interface to virtualizing operating systems Guest OS;
Interrupt identification is provided with the unit; Be used for the intermediate address information that provides according to said interface; Through ground floor map addresses visit intermediate address; Visit said shared drive according to said intermediate address and through second layer map addresses, the interrupt identification bit register corresponding with said Guest OS is provided with interrupt identification.
8. like claim 6 or 7 described devices, it is characterized in that said device also comprises:
Module is set up in mapping, is used to set up Guest OS to the mapping of intermediate address and the mapping of said intermediate address to physical memory addresses;
Shared drive is set up module, is used to set up said shared drive.
9. device as claimed in claim 6 is characterized in that, the clock that said zone bit inspection module provides according to said Hypervisor, the periodically said interrupt identification bit register of poll; Perhaps
Zone bit inspection module is checked said interrupt identification bit register under the triggering of the physical discontinuity that hardware produces.
10. device as claimed in claim 9 is characterized in that, said zone bit inspection module comprises:
Performance element, the abnormality processing function that is used for the appointment of execute exception vector is to check said interrupt identification bit register.
CN201210207137.5A 2012-06-21 2012-06-21 Method and device for closing interrupt in virtualization system Active CN102799480B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210207137.5A CN102799480B (en) 2012-06-21 2012-06-21 Method and device for closing interrupt in virtualization system
PCT/CN2013/070810 WO2013189180A1 (en) 2012-06-21 2013-01-22 Method and device for disabling interruption in virtualization system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210207137.5A CN102799480B (en) 2012-06-21 2012-06-21 Method and device for closing interrupt in virtualization system

Publications (2)

Publication Number Publication Date
CN102799480A true CN102799480A (en) 2012-11-28
CN102799480B CN102799480B (en) 2015-06-17

Family

ID=47198595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210207137.5A Active CN102799480B (en) 2012-06-21 2012-06-21 Method and device for closing interrupt in virtualization system

Country Status (2)

Country Link
CN (1) CN102799480B (en)
WO (1) WO2013189180A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013189180A1 (en) * 2012-06-21 2013-12-27 华为技术有限公司 Method and device for disabling interruption in virtualization system
CN111240898A (en) * 2020-01-09 2020-06-05 中瓴智行(成都)科技有限公司 Hypervisor-based black box implementation method and system
CN116382856A (en) * 2023-06-02 2023-07-04 麒麟软件有限公司 Method for enhancing system instantaneity based on virtualized nesting

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060005190A1 (en) * 2004-06-30 2006-01-05 Microsoft Corporation Systems and methods for implementing an operating system in a virtual machine environment
CN101620547A (en) * 2009-07-03 2010-01-06 中国人民解放军国防科学技术大学 Virtual physical interrupt processing method of X86 computer
CN102279769A (en) * 2011-07-08 2011-12-14 西安交通大学 Embedded-Hypervisor-oriented interruption virtualization operation method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398768B (en) * 2008-10-28 2011-06-15 北京航空航天大学 Construct method of distributed virtual machine monitor system
CN102799480B (en) * 2012-06-21 2015-06-17 华为技术有限公司 Method and device for closing interrupt in virtualization system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060005190A1 (en) * 2004-06-30 2006-01-05 Microsoft Corporation Systems and methods for implementing an operating system in a virtual machine environment
CN101620547A (en) * 2009-07-03 2010-01-06 中国人民解放军国防科学技术大学 Virtual physical interrupt processing method of X86 computer
CN102279769A (en) * 2011-07-08 2011-12-14 西安交通大学 Embedded-Hypervisor-oriented interruption virtualization operation method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013189180A1 (en) * 2012-06-21 2013-12-27 华为技术有限公司 Method and device for disabling interruption in virtualization system
CN111240898A (en) * 2020-01-09 2020-06-05 中瓴智行(成都)科技有限公司 Hypervisor-based black box implementation method and system
CN111240898B (en) * 2020-01-09 2023-08-15 中瓴智行(成都)科技有限公司 Method and system for realizing black box based on Hypervisor
CN116382856A (en) * 2023-06-02 2023-07-04 麒麟软件有限公司 Method for enhancing system instantaneity based on virtualized nesting
CN116382856B (en) * 2023-06-02 2023-09-26 麒麟软件有限公司 Method for enhancing system instantaneity based on virtualized nesting

Also Published As

Publication number Publication date
CN102799480B (en) 2015-06-17
WO2013189180A1 (en) 2013-12-27

Similar Documents

Publication Publication Date Title
JP6864749B2 (en) Intermediate host integrated circuit between virtual machine instance and customer programmable logic circuit
US10901772B2 (en) Virtualization exceptions
US9529650B2 (en) Method and apparatus for accessing hardware resource
RU2659472C2 (en) Page error insertion in virtual machines
US8312452B2 (en) Method and apparatus for a guest to access a privileged register
US8151264B2 (en) Injecting virtualization events in a layered virtualization architecture
US10592434B2 (en) Hypervisor-enforced self encrypting memory in computing fabric
US9244710B2 (en) Concurrent hypervisor replacement
US20140053272A1 (en) Multilevel Introspection of Nested Virtual Machines
US20190188028A1 (en) Paravirtualized access for device assignment by bar extension
US8370559B2 (en) Executing a protected device model in a virtual machine
US11163597B2 (en) Persistent guest and software-defined storage in computing fabric
US20130326519A1 (en) Virtual machine control structure shadowing
US10956188B2 (en) Transparent interpretation of guest instructions in secure virtual machine environment
US10489185B2 (en) Hypervisor-assisted approach for locating operating system data structures based on attribute matching
US20100169884A1 (en) Injecting transactions to support the virtualization of a physical device controller
US20180267818A1 (en) Hypervisor-assisted approach for locating operating system data structures based on notification data
US11734430B2 (en) Configuration of a memory controller for copy-on-write with a resource controller
CN113391881B (en) Interrupt management method and device, electronic equipment and computer storage medium
EP2810162B1 (en) Optimization of resource usage in a multi-environment computing system
CN102799480A (en) Method and device for closing interrupt in virtualization system
US20130263157A1 (en) Method to utilize cores in different operating system partitions
Chen Smartphone virtualization: Status and challenges
US9747118B2 (en) Guest-specific microcode
US8291415B2 (en) Paging instruction for a virtualization engine to local storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191225

Address after: Room 302, No. 8319, Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co., Ltd

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: Huawei Technologies Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201016

Address after: 226000 No. 998 Century Avenue, hi tech Zone, Jiangsu, Nantong

Patentee after: NANTONG HANGDA ELECTRONIC TECHNOLOGY Co.,Ltd.

Address before: Room 302, No. 8319, Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.

TR01 Transfer of patent right