Abstract:
A resource configuration method of a virtual machine and a communications device. When an actual requirement of the virtual machine for the network resource is dynamically changed, the communications device may dynamically configure a communication manner corresponding to the virtual machine such that a virtual machine with a relatively low requirement for the network resource may use the manner of sharing the physical network interface card, and a virtual machine with a relatively high requirement for the network resource may use the pass-through manner, which does not cause a situation in which network resources of some virtual machines are wasted and network resources of some virtual machines are insufficient. As a result, network resources of virtual machines are properly allocated.
Abstract:
A system includes a first subsystem and a second subsystem that are used in a same chip. A security level of a first physical resource included in the first subsystem is higher than a security level of a second physical resource included in the second subsystem. The first subsystem includes an interrupt controller, and the interrupt controller is configured to manage an interrupt of a peripheral of the second subsystem. Embodiments of this application are for isolation between subsystems of different security levels in a chip.
Abstract:
A resource configuration method of a virtual machine and a communications device. When an actual requirement of the virtual machine for the network resource is dynamically changed, the communications device may dynamically configure a communication manner corresponding to the virtual machine such that a virtual machine with a relatively low requirement for the network resource may use the manner of sharing the physical network interface card, and a virtual machine with a relatively high requirement for the network resource may use the pass-through manner, which does not cause a situation in which network resources of some virtual machines are wasted and network resources of some virtual machines are insufficient. As a result, network resources of virtual machines are properly allocated.
Abstract:
Method and systems for executing a non-maskable interrupt are provided. In one aspect, a method for executing a non-maskable interrupt includes: obtaining an interrupt request in a non-secure mode, and interrupting an operation of an operating system (OS); saving, in a secure mode, a status of the OS when the operation of the OS is interrupted; executing, in the non-secure mode, a procedure defined for the interrupt request; resume, in the secure mode, the status of the OS; and after resuming the status of the OS, continue executing the operation of the OS in the non-secure mode.
Abstract:
The present invention discloses a method and an apparatus for executing a non-maskable interrupt. The method includes: obtaining a secure interrupt request in a non-secure mode, and interrupting an operation of an operating system OS, where the secure interrupt request cannot be masked; entering a secure mode by using the secure interrupt request, and saving, in the secure mode, an interrupt context of an OS status when the operation of the OS is interrupted; returning to the non-secure mode to execute user-defined processing; after the user-defined processing is completed, entering the secure mode again, and resuming the OS status in the secure mode according to the interrupt context; and returning to the non-secure mode again, and continuing to execute an operation of the OS. The method and the apparatus for executing a non-maskable interrupt in embodiments of the present invention can easily implement an NMI mechanism without depending on hardware.
Abstract:
A method and an apparatus execute a non-maskable interrupt. The method includes: obtaining a secure interrupt request in a non-secure mode, and interrupting an operation of an operating system OS, where the secure interrupt request cannot be masked; entering a secure mode by using the secure interrupt request, and saving, in the secure mode, an interrupt context of an OS status when the operation of the OS is interrupted; returning to the non-secure mode to execute user-defined processing; after the user-defined processing is completed, entering the secure mode again, and resuming the OS status in the secure mode according to the interrupt context; and returning to the non-secure mode again, and continuing to execute an operation of the OS. The method and the apparatus for executing a non-maskable interrupt in embodiments of the present invention can easily implement an NMI mechanism without depending on hardware.