CA2265567A1 - A method and system for device virtualization based on an interrupt request in a dos-based environment - Google Patents

A method and system for device virtualization based on an interrupt request in a dos-based environment

Info

Publication number
CA2265567A1
CA2265567A1 CA002265567A CA2265567A CA2265567A1 CA 2265567 A1 CA2265567 A1 CA 2265567A1 CA 002265567 A CA002265567 A CA 002265567A CA 2265567 A CA2265567 A CA 2265567A CA 2265567 A1 CA2265567 A1 CA 2265567A1
Authority
CA
Canada
Prior art keywords
dos
interrupt
protected
processor
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002265567A
Other languages
French (fr)
Other versions
CA2265567C (en
Inventor
Joseph T. Friel
Andrew P. Weir
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Creative Technology Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2265567A1 publication Critical patent/CA2265567A1/en
Application granted granted Critical
Publication of CA2265567C publication Critical patent/CA2265567C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/10Program control for peripheral devices
    • G06F13/105Program control for peripheral devices where the programme performs an input/output emulation function
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage

Abstract

A technique for providing device virtualization in an MS-DOS based operating environment (212), using an interrupt request (e.g., a non-maskable interrupt), is described. The technique includes executing an application on a processor within the MS-DOS based operating environment (212) and, when the application attempts to address the device to be emulated, causing a processor interrupt to occur. In response to the interrupt, the processor executes code representing the virtualization of a device. The code for servicing the interrupt and emulating the device are written in protected mode-code, stored in the extended memory area (114), and made available by making appropriate entries into the interrup descriptor tables (318) for the protected-mode context established for the DOS extender (410). The entries made into IDT
(318) for the protected-mode context established for the DOS extender are accomplished by intercepting communications between the DOS extender and the virtual control program interface (314).
CA002265567A 1996-09-11 1997-09-08 A method and system for device virtualization based on an interrupt request in a dos-based environment Expired - Fee Related CA2265567C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/712,363 US5790837A (en) 1996-09-11 1996-09-11 Method and system for device virtualization based on an interrupt request in a dos-based environment
US08/712,363 1996-09-11
PCT/US1997/015813 WO1998011489A1 (en) 1996-09-11 1997-09-08 A method and system for device virtualization based on an interrupt request in a dos-based environment

Publications (2)

Publication Number Publication Date
CA2265567A1 true CA2265567A1 (en) 1998-03-19
CA2265567C CA2265567C (en) 2001-04-24

Family

ID=24861801

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002265567A Expired - Fee Related CA2265567C (en) 1996-09-11 1997-09-08 A method and system for device virtualization based on an interrupt request in a dos-based environment

Country Status (7)

Country Link
US (1) US5790837A (en)
EP (1) EP1019834A4 (en)
AU (1) AU718803B2 (en)
CA (1) CA2265567C (en)
MY (1) MY133787A (en)
TW (1) TW344814B (en)
WO (1) WO1998011489A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6804232B1 (en) 2000-03-27 2004-10-12 Bbnt Solutions Llc Personal area network with automatic attachment and detachment
US7188347B2 (en) * 2002-05-24 2007-03-06 Nokia Corporation Method, apparatus and system for connecting system-level functionality of domestic OS of a mobile phone to any application operating system
US7827558B2 (en) 2004-06-30 2010-11-02 Devicevm, Inc. Mechanism for enabling a program to be executed while the execution of an operating system is suspended

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4926322A (en) * 1987-08-03 1990-05-15 Compag Computer Corporation Software emulation of bank-switched memory using a virtual DOS monitor and paged memory management
US5303378A (en) * 1991-05-21 1994-04-12 Compaq Computer Corporation Reentrant protected mode kernel using virtual 8086 mode interrupt service routines
US5293590A (en) * 1992-04-06 1994-03-08 International Business Machines Corp. Personal computer with interface controller
US5390332A (en) * 1992-09-15 1995-02-14 Sun Microsystems, Inc. Method and apparatus for performing a takeover of a microprocessor
US5459869A (en) * 1994-02-17 1995-10-17 Spilo; Michael L. Method for providing protected mode services for device drivers and other resident software

Also Published As

Publication number Publication date
EP1019834A1 (en) 2000-07-19
AU718803B2 (en) 2000-04-20
CA2265567C (en) 2001-04-24
US5790837A (en) 1998-08-04
WO1998011489A1 (en) 1998-03-19
MY133787A (en) 2007-11-30
EP1019834A4 (en) 2000-09-20
AU4257997A (en) 1998-04-02
TW344814B (en) 1998-11-11

Similar Documents

Publication Publication Date Title
US5812820A (en) Virtual UART
US5459869A (en) Method for providing protected mode services for device drivers and other resident software
US9804904B2 (en) High-performance virtual machine networking
US7272831B2 (en) Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US8612992B2 (en) Operating systems
US7478394B1 (en) Context-corrupting context switching
DE60141173D1 (en) LOGICAL REPLACEMENT OF PROCESSING IN A EMULATED COMPUTER ENVIRONMENT
US20070078891A1 (en) Operating systems
EP0232960A3 (en) Method for automatically extending the size of a segment in a page segmented virtual memory data processing system
CA2577493A1 (en) Operating systems
US5937185A (en) Method and system for device virtualization based on an interrupt request in a DOS-based environment
US5603014A (en) Protected mode simulation of a real mode interupt based programming interface in a computer system
US5390332A (en) Method and apparatus for performing a takeover of a microprocessor
US7930524B1 (en) Method for executing a 32-bit flat address program during a system management mode interrupt
JPH05151003A (en) System control program and information processing system
CA2265567A1 (en) A method and system for device virtualization based on an interrupt request in a dos-based environment
WO2002050664A3 (en) Logical substitution of processor control in an emulated computing environment
US5918056A (en) Segmentation suspend mode for real-time interrupt support
EP1673697A2 (en) Operating systems
JPH1069393A (en) Virtual computer emulator, virtual computer emulating method, and recording medium where virtual computer emultating program is recorded
JPH05216690A (en) Computer apparatus and computer-apparatus operating method
Klemets Mach 3.0 as an Operating System for the MINT
EP1059585A3 (en) Virtual 16550 uart
CA2540658A1 (en) Operating systems
Dion A User-Level Unix Server for the SPIN Operating System

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed