Information scheduling method from secure container operating system to virtual machine monitor
A technology of virtual machine monitor and security container, applied in the direction of instrument, program control design, program control device, etc., can solve the problems of poor performance and high cost, and achieve the effect of improving execution efficiency
Pending Publication Date: 2020-07-28
孙宇霖
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention discloses an information scheduling method from a secure container operating system to a virtual machine monitor. The invention provides a scheduling method from a security container toa virtual machine monitor. The scheduling method comprises the steps: providing the virtual machine monitor and a security container kernel share a memory space; constructing a shared memory-based message queue between the two security container kernels and the virtual machine monitor, wherein a memory pointer of the Hyper Call of the security container kernel is placed in the message queue; enabling the virtual machine monitor to process the Hyper Call in the shared memory; and putting the processed Hyper Call thread ID into a message queue, and obtaining the processed Hyper Call thread ID bythe scheduler. Through the information exchange mode of the queue, when the virtual CPU (vCPU) of the security container needs to call the Hyper Call, the context switching between the kernel of thesecurity container and the monitor of the virtual machine is not needed, so that the execution efficiency of the super call can be greatly improved.
Application Domain
Interprogram communicationSoftware simulation/interpretation/emulation
Technology Topic
Virtual machineMessage queue +7
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Design method of NES (Nintendo Entertainment System) emulator used on TV set top box
Owner:FUJIAN NEWLAND COMM SCI TECH
Method for allocating tasks to operator and device thereof
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
Method for calling plug-in board by browser, plug-in board manager and browser
Owner:BEIJING QIHOO TECH CO LTD
Methods and systems for external connection of tables of database
Owner:BEIJING OCEANBASE TECH CO LTD
User identity authentication method and device
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Classification and recommendation of technical efficacy words
- Improve execution efficiency
Computing group structure for superlong instruction word and instruction flow multidata stream fusion
Owner:NAT UNIV OF DEFENSE TECH
Sql (Structured query language) injection detection method and device
Owner:重庆云流未来科技有限公司
Instruction classified multi-emitting method based on SPRAC V8 instruction set
Owner:BEIJING MXTRONICS CORP +1
Protection method for side channel attack and fault attack
Owner:STATE GRID CORP OF CHINA +4