MANAGING SAFE REMOVAL OF A PASSTHROUGH DEVICE IN A VIRTUALIZATION SYSTEM
First Claim
1. A method, comprising:
- receiving, by a hypervisor, a request from a guest for access to a passthrough device;
setting in a memory, by the hypervisor, a last accessed state associated with a virtual machine executing the guest;
forwarding, by the hypervisor, the request to the passthrough device;
configuring, by the hypervisor, a host central processing unit (CPU) to send a subsequent access request directly to the passthrough device; and
in response to a virtual machine reset, clearing the last accessed state and instructing the host CPU to send a post-reset access request to the hypervisor.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for managing a removal of a passthrough device from a guest managed by a hypervisor in virtualized computing environment. A hypervisor receives a request from the guest for access to a passthrough device. The hypervisor sets, in a memory, a last accessed state associated with a virtual machine executing the guest. The hypervisor forwards the request to the passthrough device and configures the host CPU to send a subsequent access request directly to the passthrough device. In response to a virtual machine reset, the hypervisor clears the last accessed state and instructs the host CPU to send a post-reset access request to the hypervisor.
-
Citations
21 Claims
-
1. A method, comprising:
-
receiving, by a hypervisor, a request from a guest for access to a passthrough device; setting in a memory, by the hypervisor, a last accessed state associated with a virtual machine executing the guest; forwarding, by the hypervisor, the request to the passthrough device; configuring, by the hypervisor, a host central processing unit (CPU) to send a subsequent access request directly to the passthrough device; and in response to a virtual machine reset, clearing the last accessed state and instructing the host CPU to send a post-reset access request to the hypervisor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform operations comprising:
-
receiving, by a hypervisor, a request from a guest for access to a passthrough device; setting in a memory, by the hypervisor, a last accessed state associated with a virtual machine executing the guest; forwarding, by the hypervisor, the request to the passthrough device; configuring, by the hypervisor, a host CPU to send a subsequent access request directly to the passthrough device; and in response to a virtual machine reset, clearing the last accessed state and instructing the host CPU to send a post-reset access request to the hypervisor. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer system comprising:
-
a memory; a processing device, coupled to the memory; and a hypervisor hosted by the computer system, having access to the memory and use of the processing device, the hypervisor configured to; receive a request from a guest for access to a passthrough device, set in the memory a last accessed state associated with a virtual machine executing the guest, forward the request to the passthrough device, configure a host central processing unit (CPU) to send a subsequent access request directly to the passthrough device, and in response to a virtual machine reset, clear the last accessed state and instructing the host CPU to send a post-reset access request to the hypervisor. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computing system comprising
a memory; - and
a hardware bus coupled to the memory, the hardware bus comprising hardware device unplug logic configured to; maintain in the memory a bit representing a last accessed state associated with an operating system of the computing system, wherein the last accessed state is cleared by the hardware bus when the computing system is reset, and wherein the last accessed state is set by the hardware bus when the hardware bus detects a request from the operating system to access a device, receive a request to remove the device, and remove the device without receiving an acknowledgment from a firmware of the device when the last accessed state is clear. - View Dependent Claims (21)
- and
Specification