码农知识堂 - 1000bd
  •   Python
  •   PHP
  •   JS/TS
  •   JAVA
  •   C/C++
  •   C#
  •   GO
  •   Kotlin
  •   Swift
  • hypervisor相关的知识点


    1、QNX网站

    http://www.qnx.com/developers/docs/7.1/index.html#com.qnx.doc.hypervisor.safety.user/topic/virt/pdevs.html

    2、guest os之间的通信方式

    shared-memory

    Memory sharing

    Guests in a hypervisor system can share memory regions through which they can pass data to each other.

    In a QNX Hypervisor system, client applications running in guests create and manage shared memory, and can use shared memory regions to share data. If data needs to be shared between a guest or guests and the hypervisor host domain, applications running in the hypervisor host domain can also create shared memory regions, or attach to regions created by guests.

    Assuming that all sharing is between guests, and not with the hypervisor host, to set up memory sharing in your hypervisor system:

    1. Edit the qvm configuration files (*.qvmconf) for the VMs hosting the guests that will share memory to enable shared memory services (see “Configuring the VMs” below).
    2. Create a client application that runs in the guests and uses shared memory services, and run it on multiple guests.

    The hypervisor-shmem-examples-march31.tgz archive available in the QNX Hypervisor package includes source code for example memory sharing programs: ghstest.c for a QNX guest, and for the hypervisor host.

    The binaries for a QNX Neutrino OS 7.0 guest are included in the hypervisor files. If you want to try this shared memory program with a QNX Neutrino OS 6.6 guest, you can download and unpack the example program binary files (see “Additional files for QNX Neutrino OS 6.6 guests” in the “Assembling a Hypervisor System and Its Components” chapter).

    How shared memory works

    To use shared memory, a client (an application running in a guest or in the hypervisor host) needs:

    • a mapping of the shared memory region
    • a hardware interrupt it can use to signal other users of the shared memory regions that this region has been updated

    The hypervisor includes the vdev-shmem vdev, which implements setting up the shared memory mapping and the interrupts you need to use shared memory. This vdev provides additional functionality to simplify using shared memory. These include:

    • shared memory region names (a hypervisor system may include multiple named shared regions)
    • selective signaling (e.g., signal Guest 0, but not Guest 3)
    • signal knowledge (the ability to know which guests have been signaled)

    The figure below illustrates memory sharing between two guests. Guest 0 attempts to attach to a 128 MB shared memory area first. Since no such area exists at the specified location, the attempt to attach creates the area and allows the guest to attach to it. Guest 1 can simply attach to the same name to share data memory with Guest 0.

     Figure 1. A 128 MB memory allocation shared by Guest 0 and Guest 1

    For more information about shared memory regions, see “Factory and control pages” below.

    All the connections to a shared memory region are peers. That is, there is no distinction between the guest that creates a shared memory region and the guest that attaches to it. Simply, the first attempt to attach to a shared memory region creates the region. As far as the guest is concerned, it simply attaches to the region.

    This design avoids ordering problems where the system designer would have to make sure that one guest always comes up and creates the shared memory region before another guest tries to attach to it.


     

  • 相关阅读:
    【实用技巧】Unity中的Image组件
    普乐蛙VR航天航空体验馆VR双人旋转座椅元宇宙VR飞船
    Vue框架的学习(Vue操作指令学习三 V-bind )第三课
    Xilinx ZYNQ 7000学习笔记五(Xilinx SDK 烧写镜像文件)
    腾讯云2核4G服务器5M带宽 218元一年 优惠价格明细表
    【Redis学习笔记】第十一章 Redis主从复制
    为什么分片,尽量选择客户端分片架构
    调用第三方API超时如何区分是连接超时还是响应超时
    面向对象的三大特性之——封装
    java毕业设计创新创业竞赛管理系统2021Mybatis+系统+数据库+调试部署
  • 原文地址:https://blog.csdn.net/yudelian/article/details/126140766
  • 最新文章
  • 攻防演习之三天拿下官网站群
    数据安全治理学习——前期安全规划和安全管理体系建设
    企业安全 | 企业内一次钓鱼演练准备过程
    内网渗透测试 | Kerberos协议及其部分攻击手法
    0day的产生 | 不懂代码的"代码审计"
    安装scrcpy-client模块av模块异常,环境问题解决方案
    leetcode hot100【LeetCode 279. 完全平方数】java实现
    OpenWrt下安装Mosquitto
    AnatoMask论文汇总
    【AI日记】24.11.01 LangChain、openai api和github copilot
  • 热门文章
  • 十款代码表白小特效 一个比一个浪漫 赶紧收藏起来吧!!!
    奉劝各位学弟学妹们,该打造你的技术影响力了!
    五年了,我在 CSDN 的两个一百万。
    Java俄罗斯方块,老程序员花了一个周末,连接中学年代!
    面试官都震惊,你这网络基础可以啊!
    你真的会用百度吗?我不信 — 那些不为人知的搜索引擎语法
    心情不好的时候,用 Python 画棵樱花树送给自己吧
    通宵一晚做出来的一款类似CS的第一人称射击游戏Demo!原来做游戏也不是很难,连憨憨学妹都学会了!
    13 万字 C 语言从入门到精通保姆级教程2021 年版
    10行代码集2000张美女图,Python爬虫120例,再上征途
Copyright © 2022 侵权请联系2656653265@qq.com    京ICP备2022015340号-1
正则表达式工具 cron表达式工具 密码生成工具

京公网安备 11010502049817号