WO2012163017A1 - Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle - Google Patents

Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle Download PDF

Info

Publication number
WO2012163017A1
WO2012163017A1 PCT/CN2011/081116 CN2011081116W WO2012163017A1 WO 2012163017 A1 WO2012163017 A1 WO 2012163017A1 CN 2011081116 W CN2011081116 W CN 2011081116W WO 2012163017 A1 WO2012163017 A1 WO 2012163017A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
access
subpage
memory
current instruction
Prior art date
Application number
PCT/CN2011/081116
Other languages
English (en)
Chinese (zh)
Inventor
邱军
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2011/081116 priority Critical patent/WO2012163017A1/fr
Priority to CN2011800021229A priority patent/CN102439567A/zh
Publication of WO2012163017A1 publication Critical patent/WO2012163017A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0806Multiuser, multiprocessor or multiprocessing cache systems
    • G06F12/0815Cache consistency protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • G06F12/1027Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
    • G06F12/1036Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB] for multiple virtual address spaces, e.g. segmentation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • G06F12/109Address translation for multiple virtual address spaces, e.g. segmentation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45583Memory management, e.g. access or allocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/15Use in a specific computing environment
    • G06F2212/151Emulated environment, e.g. virtual machine

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a processing method for a distributed virtual machine access exception and a virtual machine monitor. Background technique
  • a virtual machine is a complete computer system that runs through a software and has a complete hardware system function and runs in a completely isolated environment.
  • Distributed virtualization technology is a technology that reassembles resources from multiple physical machines into a virtual machine in a virtual way. When the operating system installed on the virtual machine runs and uses these virtual resources, it is deployed in each A distributed virtual machine monitor (D VMM) on a physical machine intercepts sensitive access behaviors to ensure the correct use of virtual resources by virtual machines.
  • D VMM distributed virtual machine monitor
  • DSM Distributed Shared Memory
  • DVMM capture processor access to remote memory or local cache requires the use of a processor's Page Fault (PF) or Nested Page Fault (Nested Page Fault) mechanisms, and these exceptions are physical Page size (for example, 4KB, 2MB, or 1 GB) is generated, that is, the processor accessing any data in this physical page will generate an exception, which leads to False Sharing.
  • PF Page Fault
  • Nested Page Fault Nested Page Fault
  • the processor on two different physical nodes needs to access one byte of the same memory address. In order to maintain the memory of this byte, the DSM is consistent with the two processors, and the processor needs to intercept the memory address.
  • the technical problem to be solved by the embodiments of the present invention is to provide a processing method for a distributed virtual machine access exception and a virtual machine monitor, which can reduce the generation of false sharing, thereby improving the performance of the distributed virtual machine memory.
  • a method for processing a distributed virtual machine access exception includes:
  • the memory can access the subpage where the access exception occurs and re-execute the current instruction.
  • a virtual machine monitor including:
  • a sub-page search module configured to obtain an in-page offset address of a sub-page of a physical page in which an access abnormality occurs according to an address of a physical page that accesses an abnormality when the virtual machine executes the current instruction and accesses the virtual machine memory, and according to the page Internal offset address, find a subpage where an access exception occurs, and the physical page includes several subpages;
  • An access authority determining module configured to determine whether the virtual machine has the access right of the subpage with the abnormal access,
  • a distributed shared memory configured to determine, in the virtual machine, the access permission of the subpage that has the access exception, repair the subpage where the access exception occurs, and enable the virtual machine memory to access the subpage with the access exception And re-execute the current instruction
  • An instruction emulation execution module configured to: execute, by the virtual machine, an access permission of the subpage having the access exception, execute the current instruction, and return an execution result to a virtual machine execution context, so that the virtual machine completes The execution of the current instruction.
  • a distributed virtual machine includes a plurality of physical servers connected through a network, and each of the physical servers is provided with a virtual machine monitor, and the virtual machine monitor includes:
  • a sub-page search module configured to obtain an in-page offset address of a sub-page of a physical page in which an access abnormality occurs according to an address of a physical page that accesses an abnormality when the virtual machine executes the current instruction and accesses the virtual machine memory, and according to the page Internal offset address, find a subpage where an access exception occurs, and the physical page includes several subpages;
  • An access authority determining module configured to determine whether the virtual machine has the access permission of the subpage with the abnormal access
  • a distributed shared memory configured to determine, in the virtual machine, the access permission of the subpage that has the access exception, repair the subpage where the access exception occurs, and enable the virtual machine memory to access the subpage with the access exception And re-execute the current instruction
  • An instruction emulation execution module configured to: execute, by the virtual machine, an access permission of the subpage having the access exception, execute the current instruction, and return an execution result to a virtual machine execution context, so that the virtual machine completes The execution of the current instruction.
  • the controller divides the physical page into several sub-pages, and when an access exception occurs on the physical page, other sub-pages other than the sub-page where the access abnormality occurs can be normally accessed, thereby reducing the occurrence of sharing.
  • the virtual machine memory can access the subpage having the access exception; when determining the access authority of the subpage, simulating the execution of the current access exception instruction, and returning the execution result to the virtual machine execution context, so that the The virtual machine completes the execution of the current instruction, which can effectively solve the access exception problem and improve the performance of the virtual machine memory.
  • FIG. 2 is a schematic diagram of a virtual machine monitor according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a command simulation execution module in an embodiment of the present invention.
  • a pseudo-machine monitor can reduce the generation of false shares, thereby improving the performance of distributed virtual machine memory.
  • the first embodiment of the server comprises: a central processing unit (CPU), a virtual machine memory, a network card, and a high-speed input/output (I/O) device.
  • each physical server is provided with a virtual machine monitor, and the virtual machine monitors communicate with each other, so that the processor of each physical server can access the resources of other physical servers, thereby forming a virtual Aggregated hardware platform.
  • the virtual machine memory is an isolated, zero-based and contiguous pseudo-physical memory space for the virtual machine. This memory space corresponds to a piece of physical memory allocated by each physical server.
  • the virtual machine monitor establishes a distributed virtual machine on each physical server.
  • the P2M (Pseudo-physical Address to Machine Physical Address) table converts the GFN into an MFN.
  • a part of the GFN in the P2M table is mapped to the memory of the local server; since the processor of the local physical server cannot directly access the memory of other physical servers, the GFN mapping mapping the memory of other physical servers is cached locally, and this cache stores the memory on the remote physical server. Content. In order to ensure the consistency of the local cache and remote memory, you need to set the distributed shared memory in the virtual machine monitor.
  • This embodiment provides a processing method for a distributed virtual machine access exception. As shown in FIG. 1, the method includes:
  • Step 101 An access address occurs when the virtual machine executes the current instruction and accesses the virtual machine memory, and finds a subpage with an access exception according to the in-page offset address, where the physical page includes several subpages.
  • the DSM needs to intercept this processor's access to this memory address.
  • This embodiment divides the physical page into a number of sub-pages to reduce the intercept granularity and assign sub-page addresses to the sub-pages. Therefore, when an access exception occurs on a physical page, a subpage with an exception can be found, and other subpages other than the subpage where the access exception occurs in the physical page can be normally accessed, thereby greatly improving the efficiency of the memory. , reducing the phenomenon of false sharing.
  • the in-page offset address refers to the address of the subpage relative to the physical page where it is located, that is, the difference between the subpage address and the start address of the physical page. Access The address of the abnormal physical page minus the starting address of the physical page is the offset address of the subpage where the exception occurred. Based on the calculated in-page offset address, you can find the subpage where the access exception occurred.
  • Step 102 Determine whether the virtual machine has the access right of the subpage where the access abnormality occurs.
  • the embodiment sets a sub-page management module in the virtual machine monitor for storing the permission information of the sub-pages, as shown in FIG. 2, wherein the physical page permissions are all sub-pages. Permissions for the least privileged subpage.
  • the permission information includes Read Write, Read Only, and Unreadable (INV), and the level of permissions decreases. Per-page permissions can be changed through distributed shared memory. The permissions information for a subpage is updated when the virtual machine monitor maintains shared memory consistency.
  • a processor needs to write to the virtual machine memory, after reading the contents of the subpage management module, it is found that the permission to access the abnormal subpage is readable and unwritable, that is, the processor cannot access the memory. The write operation is performed, so the processor at this time does not have access to this subpage.
  • Step 103 If the virtual machine does not have the access permission of the subpage that has an access exception, repair the subpage where the access exception occurs, enable the virtual machine memory to access the subpage with the access exception and re-execute the current instruction. .
  • the virtual machine monitor After determining that the access permission of the abnormal subpage is not accessed, the virtual machine monitor calls the distributed shared memory to repair the subpage, so that the subpage can be accessed by the virtual machine memory, that is, the permission of the subpage is modified to be Read or writable. After the repair is completed, the virtual machine's processor re-executes the abnormal instruction. Since the virtual machine memory is readable or writable, the instruction can be executed smoothly, reducing the time for the virtual machine monitor to handle the exception.
  • Step 104 If the virtual machine has the access permission of the subpage that has an access exception, execute the current instruction, and return the execution result to the virtual machine execution context. The virtual machine completes execution of the current instruction.
  • the context is a static description of the whole process of the process execution activity.
  • the contents of the executed process instructions and data in the relevant registers and the stack are referred to as the above, and the contents of the executed instructions and data in the registers and the stack are called
  • the text, the contents of the instructions and data to be executed in the register and the stack are referred to below.
  • the virtual machine execution context in this embodiment includes virtual machine registers, content in virtual machine memory, and virtual machine control information.
  • the virtual machine monitor After determining that the virtual machine has access rights to access the abnormal subpage, the virtual machine monitor further executes the current instruction, and returns the execution result to the virtual machine execution context, so that the virtual machine completes execution of the current instruction, the virtual machine After receiving the instruction simulation result, execute the next instruction of the current instruction.
  • the virtual machine memory saves the original execution result of the current instruction
  • the current instruction is decoded to obtain the instruction operation code and the operand; according to the instruction operation code, the corresponding operation is performed on the operand, and after the operation is successful, a new execution result is obtained, and the operand related to the current instruction is obtained. Update to the virtual machine execution context.
  • the process returns from the virtual machine monitor to the virtual machine and updates the execution results saved in the execution context of the virtual machine.
  • the virtual machine monitor can replace the virtual machine to process the abnormal access instruction, and can quickly repair the abnormal virtual machine memory, thereby improving the efficiency of the virtual machine memory.
  • the embodiment further includes the following steps;
  • Step 105 Determine whether there is an access right of the memory operand of the current instruction, and step 106, if there is no access right of the memory operand of the current instruction, repair the subpage where the memory operand is located, so that the Memory operands can be accessed. After repairing the subpage where the memory operand is located, the virtual machine monitor can execute the current access exception instruction.
  • the embodiment provides a virtual machine monitoring machine, as shown in FIG. 2, including: a subpage search module 1 1 , an access authority judging module 12, a distributed shared memory 13 and an instruction emulation execution module 14 , wherein
  • the sub-page search module 1 1 is configured to obtain an intra-page offset address of a sub-page of the physical page where the access abnormality occurs, according to the address of the physical page where the abnormality occurs when the virtual machine executes the current instruction and accesses the virtual machine memory, and according to the Describe an in-page offset address, find a subpage where an access exception occurs, and the physical page includes a plurality of subpages;
  • the access authority judging module 12 is configured to determine whether the virtual machine has the access right of the sub-page with the abnormal access
  • the distributed shared memory 13 is configured to: when determining that the virtual machine does not have the access permission of the subpage that has the access exception, repair the subpage where the access exception occurs, so that the virtual machine memory can access the subpage with the access exception and Re-execute the current instruction;
  • the instruction simulation execution module 14 is configured to: when determining that the virtual machine has the access authority of the subpage having the access exception, execute the current instruction, and return the execution result to the virtual machine execution context, so that the virtual machine completes the Execution of the current instruction.
  • the virtual machine execution context in this embodiment includes a virtual machine register, a content in a virtual machine memory, and a virtual machine control letter. Interest.
  • the access authority determining module 12 is further configured to: determine whether the access authority of the memory operand of the current instruction is available;
  • the distributed shared memory 13 is further configured to: when determining that there is no access permission of the memory operand, repair a subpage where the memory operand is located, so that the memory operand can be accessed.
  • the virtual machine monitoring machine of this embodiment further includes a subpage management module 10 for storing permission information of the subpage.
  • the access authority determining module 12 is further configured to read the permission information of the subpage in the subpage management module, and the access authority of the physical page is not greater than the access authority of the subpage included in the subpage.
  • the rights information includes: readable and writable, readable and writable, and unreadable and unwritable.
  • the instruction emulation execution module 14 of this embodiment specifically includes: a decoding unit 141, configured to decode the current instruction according to the instruction set encoding, to obtain an instruction opcode and an operand;
  • the executing unit 142 is configured to perform a corresponding operation on the operand according to the instruction opcode. After the operation is successful, the execution result is obtained, and the operand related to the current instruction is updated to the virtual machine execution context.
  • the virtual machine monitoring machine of this embodiment when the physical page is divided into a plurality of sub-pages, when an access abnormality occurs on the physical page, other sub-pages other than the sub-page where the access abnormality occurs can be normally accessed, thereby reducing the occurrence of the false sharing.
  • the access authority judgment module when determining that the virtual machine does not have access rights to access the abnormal subpage, the distributed shared memory repairs the subpage that accesses the exception, so that the subpage with the access exception is allowed to be accessed by the virtual machine memory;
  • the instruction emulation execution module executes the current instruction, and the execution result is executed. Returning to the virtual machine execution context, enabling the virtual machine to complete the execution of the current instruction, effectively solving the access exception and improving the performance of the virtual machine memory.
  • the embodiment provides a distributed virtual machine.
  • the system includes a plurality of physical servers connected through a network.
  • Each of the physical servers is provided with a virtual machine monitor.
  • the virtual machine monitor includes:
  • the sub-page search module 1 1 is configured to obtain an intra-page offset address of a sub-page of the physical page where the access abnormality occurs, according to the address of the physical page where the abnormality occurs when the virtual machine executes the current instruction and accesses the virtual machine memory, and according to the Describe an in-page offset address, find a subpage where an access exception occurs, and the physical page includes a plurality of subpages;
  • the access authority judging module 12 is configured to determine whether the virtual machine has the access right of the sub-page with the abnormal access
  • the distributed shared memory 13 is configured to: when determining that the virtual machine does not have the access permission of the subpage that has the access exception, repair the subpage where the access exception occurs, so that the virtual machine memory can access the subpage with the access exception and Re-execute the current instruction;
  • the instruction simulation execution module 14 is configured to: when determining that the virtual machine has the access authority of the subpage having the access exception, execute the current instruction, and return the execution result to the virtual machine execution context, so that the virtual machine completes the Execution of the current instruction.
  • the virtual machine execution context in this embodiment includes virtual machine registers, content in virtual machine memory, and virtual machine control information.
  • the virtual machine monitor of this embodiment further includes:
  • a subpage management module 10 configured to store permission information of the subpage
  • the communication module 15 is configured to implement communication between the virtual machine monitors in the distributed virtual machine to ensure consistency of information in the same memory address on different physical servers.
  • the working principle of each part of the virtual machine monitoring machine of this embodiment is similar to that of the first embodiment, and is no longer
  • the distributed virtual machine in this embodiment divides the physical page into a plurality of sub-pages, and when an access abnormality occurs on the physical page, the other sub-pages other than the sub-page where the access abnormality occurs can be normally accessed, thereby reducing the occurrence of the false sharing.
  • the access authority judgment module of the virtual machine monitor when the virtual machine does not have the access right of the access subpage of the abnormality, the distributed shared memory repairs the subpage that accesses the abnormality, so that the subpage that has the access abnormality is allowed to be virtualized.
  • the instruction emulation execution module executes the current instruction, and returns the execution result to the virtual machine execution context, so that the virtual machine completes the execution of the current instruction, which can be effective Resolve access exceptions and improve the performance of virtual machine memory.
  • the present invention can be implemented by means of software plus necessary general hardware, and of course, by hardware, but in many cases, the former is a better implementation. .
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk or the like includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Abstract

La présente invention concerne un procédé de traitement d'une exception d'accès à une machine virtuelle répartie et un moniteur de machine virtuelle, qui relèvent du domaine technique des ordinateurs et permettent de réduire le nombre de partages erronés, pour ainsi améliorer les performances d'une mémoire de la machine virtuelle répartie. Le procédé de traitement d'une exception d'accès à une machine virtuelle répartie proposé par le mode de réalisation de la présente invention consiste : à trouver une sous-page dans laquelle se produit une exception d'accès conformément à une adresse d'une page physique à laquelle se produit l'exception d'accès lorsque la machine virtuelle exécute une instruction actuelle et accède à une mémoire de la machine virtuelle ; à évaluer si la machine virtuelle a le droit d'accéder à la sous-page dans laquelle se produit l'exception d'accès ; si la machine virtuelle ne dispose pas du droit d'accès, à réparer la sous-page dans laquelle se produit l'exception d'accès de manière à ce que la mémoire de la machine virtuelle puisse accéder à la sous-page dans laquelle se produit l'exception d'accès et puisse ré-exécuter l'instruction actuelle ; et si la machine virtuelle possède le droit d'accès, à exécuter l'instruction actuelle et renvoyer un résultat d'exécution à un contexte d'exécution de la machine virtuelle de manière à ce que la machine virtuelle mène à bien l'exécution de l'instruction actuelle.
PCT/CN2011/081116 2011-10-21 2011-10-21 Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle WO2012163017A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2011/081116 WO2012163017A1 (fr) 2011-10-21 2011-10-21 Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle
CN2011800021229A CN102439567A (zh) 2011-10-21 2011-10-21 分布式虚拟机访问异常的处理方法以及虚拟机监控器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/081116 WO2012163017A1 (fr) 2011-10-21 2011-10-21 Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle

Publications (1)

Publication Number Publication Date
WO2012163017A1 true WO2012163017A1 (fr) 2012-12-06

Family

ID=45986237

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/081116 WO2012163017A1 (fr) 2011-10-21 2011-10-21 Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle

Country Status (2)

Country Link
CN (1) CN102439567A (fr)
WO (1) WO2012163017A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102866929B (zh) * 2012-07-23 2015-08-19 上海斐讯数据通信技术有限公司 内存坏块修复方法
US9678883B2 (en) * 2013-07-26 2017-06-13 Futurewei Technologies, Inc. System and method for detecting false sharing
US9547599B2 (en) 2013-07-26 2017-01-17 Futurewei Technologies, Inc. System and method for predicting false sharing
CN105468434A (zh) * 2015-12-11 2016-04-06 浪潮(北京)电子信息产业有限公司 一种处理虚拟机异常的方法及装置
WO2018119811A1 (fr) 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Procédé, dispositif et appareil électronique pour le fonctionnement simultané de multiples machines virtuelles
CN108540341B (zh) * 2018-03-19 2021-01-29 云宏信息科技股份有限公司 资源监控方法及装置
CN112363796B (zh) * 2020-10-19 2022-11-11 海光信息技术股份有限公司 一种虚拟机共享内存分配方法、装置及电子设备
CN114844833A (zh) * 2022-03-30 2022-08-02 阿里云计算有限公司 报文处理方法和系统,存储介质及计算机终端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398768A (zh) * 2008-10-28 2009-04-01 北京航空航天大学 一种分布式虚拟机监视器系统的构建方法
CN101477495A (zh) * 2008-10-28 2009-07-08 北京航空航天大学 分布式内存虚拟化技术的实现方法
US7596654B1 (en) * 2006-01-26 2009-09-29 Symantec Operating Corporation Virtual machine spanning multiple computers
CN101620573A (zh) * 2009-07-03 2010-01-06 中国人民解放军国防科学技术大学 X86体系结构内存管理单元虚拟化方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100527098C (zh) * 2007-11-27 2009-08-12 北京大学 一种虚拟机管理器的动态内存映射方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7596654B1 (en) * 2006-01-26 2009-09-29 Symantec Operating Corporation Virtual machine spanning multiple computers
CN101398768A (zh) * 2008-10-28 2009-04-01 北京航空航天大学 一种分布式虚拟机监视器系统的构建方法
CN101477495A (zh) * 2008-10-28 2009-07-08 北京航空航天大学 分布式内存虚拟化技术的实现方法
CN101620573A (zh) * 2009-07-03 2010-01-06 中国人民解放军国防科学技术大学 X86体系结构内存管理单元虚拟化方法

Also Published As

Publication number Publication date
CN102439567A (zh) 2012-05-02

Similar Documents

Publication Publication Date Title
WO2012163017A1 (fr) Procédé de traitement d'exceptions d'accès à une machine virtuelle répartie et moniteur de machine virtuelle
JP5936640B2 (ja) 協調設計されたプロセッサへの、隔離された実行環境の作成
US9785352B2 (en) Transparent code patching
US9171159B2 (en) Performing security operations using binary translation
US10877793B2 (en) Extending the base address register by modifying the number of read-only bits associated with a device to be presented to a guest operating system
JP5541036B2 (ja) メモリアクセス制御プログラム、メモリアクセス制御方法、及び情報処理装置
RU2562372C2 (ru) Активация/деактивация адаптеров вычислительной среды
US20160350244A1 (en) Memory sharing for direct memory access by a device assigned to a guest operating system
US9891936B2 (en) Method and apparatus for page-level monitoring
US7506096B1 (en) Memory segment emulation model for virtual machine
US20160092371A1 (en) Method and Apparatus For Deterministic Translation Lookaside Buffer (TLB) Miss Handling
TWI790242B (zh) 位址轉譯資料的無效化
WO2011039084A1 (fr) Facilitation d'accès à la mémoire
US10061918B2 (en) System, apparatus and method for filtering memory access logging in a processor
CN112148641A (zh) 用于跟踪由cpu或设备进行的物理地址访问的系统和方法
TWI812798B (zh) 用於控制記憶體存取的裝置及方法
US20220014356A1 (en) Seamless access to trusted domain protected memory by virtual machine manager using transformer key identifier
US7904693B2 (en) Full virtualization of resources across an IP interconnect using page frame table
JP2021512405A (ja) メモリ・アクセスにおける保護タグ・チェックの制御
US11010311B2 (en) Processing device and method for controlling processing device
JP2010198398A (ja) 計算機装置および制御方法
CN114840299A (zh) 一种申威架构下的改进嵌套页表内存虚拟化方法与系统
JP2022502729A (ja) メモリ・アクセス制御

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180002122.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11866503

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11866503

Country of ref document: EP

Kind code of ref document: A1