Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control module, virtual machine monitor and access control method

An access control and virtual machine technology, applied in the computer field, can solve problems such as increasing processor load, reducing the data exchange efficiency between IO master devices and computer systems, and limited address translation space for non-transparent bridges

Active Publication Date: 2020-06-16
HYGON INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, usually the address translation space of a non-transparent bridge is limited, resulting in that the IO master can only use part of the computer system resources
For computer resources that do not correspond to the computer address domain converted by the non-transparent bridge, the IO master device cannot be directly used, but requires the processor in the computer system to perform data relocation, which increases the load on the processor and reduces the Data Exchange Efficiency Between IO Master Device and Computer System

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control module, virtual machine monitor and access control method
  • Access control module, virtual machine monitor and access control method
  • Access control module, virtual machine monitor and access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] A virtual machine (Virtual Machine, VM) refers to a complete computer system that is simulated by software and has complete hardware system functions and runs in a completely isolated environment.

[0061] Such as figure 1 As shown, it is a schematic diagram of a hierarchical structure of computer system virtualization in the embodiment of this specification, wherein the computer system 10 includes: computer system resources 11, and virtual machines 1-N running on the computer system. The corresponding virtual machine operating systems can run on ~N respectively, that is, the virtual machine 1 operating system to the virtual machine N operating system. The virtual machines 1-N share the underlying computer system resources 11 through a virtual machine monitor (Virtual Machine Monitor, VMM) 12, and the virtual machine monitor can monitor the behavior of the virtual machines 1-N to realize the resource sharing between the virtual machines 1-N. isolation, so that no confl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control module, a virtual machine monitor and an access control method, the access control module comprises: a first IO interface used as a communication interface between IO main equipment and a computer system, wherein the IO main equipment forms an IO virtual machine by establishing an association relationship with a preset first virtual machine in the computersystem. The module also comprises a first memory management unit suitable for converting a virtual address of an access space contained in a data access request into a corresponding physical addresswhen receiving the data access request from the first IO interface, and sending the data access request containing the physical address to the physical address routing unit; and a physical address routing unit suitable for routing the data access request to the corresponding access space according to the physical address contained in the received data access request. By adopting the scheme, the load of the processor in the computer system can be reduced, and the data exchange efficiency of the IO main equipment and the computer system is improved.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to an access control module, a virtual machine monitor, and an access control method. Background technique [0002] In the existing input / output virtualization (IOV) technology, the input / output (IO) device can be connected to the non-transparent bridge (NTB, Non-Transparent Bridge) through the IO interface of the computer system, and then used as The IO master device is connected to the computer system. [0003] The IO master device and the computer system belong to two operating systems, and they have completely different address domains. Therefore, the non-transparent bridge performs address conversion between the address of the IO master device address domain and the address domain of the computer system. [0004] However, usually the address translation space of the non-transparent bridge is limited, resulting in that the IO master can only use par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45579Y02D10/00
Inventor 姜莹王海洋
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products