Sharing a java virtual machine

ABSTRACT

A virtual machine shared by tenants triggers an accept wrapper for an accept operation. The virtual machine, in response to the accept operation bound to a particular address call for binding a particular tenant to a particular IP address and a shared port, creating a first socket to listen to a particular IP address assigned to a particular tenant and creating a second socket to listen to another port. The virtual machine, in response to a connection occurring on the first socket, creating a first thread and forwarding the first thread to the accept wrapper from the particular IP address and in response to the connection occurring on the second socket, creating a second thread and forwarding the second thread to the accept wrapper from the another port. The virtual machine returns at least one of the first thread and the second thread in response to the accept operation call.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of commonly assigned U.S. patent Ser. No. 15/588,644, filed May 6, 2017, which is a continuation of commonly assigned U.S. patent application Ser. No. 14/510,887, filed Oct. 9, 2014, which claims priority under 35 U.S.C. § 119 from Chinese Patent Application No. 201310511235.2, filed Oct. 25, 2013, the entire contents of each of which are hereby incorporated herein by reference.

BACKGROUND

1. Technical Field

The invention relates to virtualization technology. More particularly, the invention relates to a method and system for sharing a JAVA virtual machine (JVM).

2. Description of the Related Art

Multi-tenant JAVA virtual machine (JVM) (JAVA is a registered trademark of Oracle America, Inc.) technology allows multiple tenant programs to run in a shared JAVA virtual machine. This technology will play an important role in high-density deployment within a cloud environment.

However, current multi-tenant JAVA virtual machines can not realize network isolation among multiple tenants. If a tenant is not configured correctly, network resources (such as ports) will have conflicts. In addition, since network isolation is not realized, the ability to control network resource over the tenants is very limited. For example, without isolation, it is hard to configure different firewall strategies for different tenants.

SUMMARY

Therefore, there is a need for a method and system for sharing a JAVA virtual machine, which can realize network isolation among multiple tenants sharing a JAVA virtual machine.

One or more embodiments of the invention provide a method for, in response to receiving an accept operation call for a particular tenant of a plurality of tenants, triggering, by a computer system, an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants. The method comprises, in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: creating, by the computer system, a first socket to listen to the particular IP address assigned to the particular tenant; creating, by the computer system, a second socket to listen to another port; in response to a connection occurring on the first socket, creating, by the computer system, a first thread and forwarding the first thread to the accept wrapper from the particular IP address; in response to the connection occurring on the second socket, creating, by the computer system, a second thread and forwarding the second thread to the accept wrapper from the another port; and returning, by the computer system, at least one of the first thread and the second thread in response to the accept operation call.

According an embodiment of the invention, if an IP address of a tenant is bound to IPADDR_ANY, the method further comprise binding localhost of that tenant to another port which is different from a localhost port shared by all tenants and establishing a mapping between the another port and the localhost port shared by all tenants.

One or more embodiments of the invention also provide a system comprising at least one processor coupled to a memory and operative, in response to receiving an accept operation call for a particular tenant of a plurality of tenants, to trigger an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants. The system comprises the at least one processor, in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: operative to create a first socket to listen to the particular IP address assigned to the particular tenant; operative to create a second socket to listen to another port; operative, in response to a connection occurring on the first socket, to create a first thread and forward the first thread to the accept wrapper from the particular IP address; operative, in response to the connection occurring on the second socket, to create a second thread and forward the second thread to the accept wrapper from the another port; and operative to return at least one of the first thread and the second thread in response to the accept operation call.

According to another embodiment of the invention, a computer program product comprises a non-transitory computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to, in response to receiving an accept operation call for a particular tenant of a plurality of tenants, triggering, by a computer system, an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants. The program instructions are executable by a computer to cause the computer to, in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: creating, by the computer system, a first socket to listen to the particular IP address assigned to the particular tenant; creating, by the computer system, a second socket to listen to another port; in response to a connection occurring on the first socket, creating, by the computer system, a first thread and forwarding the first thread to the accept wrapper from the particular IP address; in response to the connection occurring on the second socket, creating, by the computer system, a second thread and forwarding the second thread to the accept wrapper from the another port; and returning, by the computer system, at least one of the first thread and the second thread in response to the accept operation call.

With the method and system of the illustrative embodiments, network isolation among multiple tenants sharing a JAVA virtual machine can be realized.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The novel features believed characteristic of one or more embodiments of the invention are set forth in the appended claims. The one or more embodiments of the invention itself however, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:

FIG. 1 shows one example of a block diagram of a computer system or server system in which one embodiment of the invention may be implemented;

FIGS. 2A-2B show one example of a block diagram of a shared, multi-tenant JVM and a flowchart illustrating a method for sharing a JAVA virtual machine according to an embodiment of the invention;

FIG. 3 shows one example of a block diagram of a system for sharing a JAVA virtual machine according to an embodiment of the invention; and

FIG. 4 illustrates one example of a high level logic flowchart of a process and program for handling an accept transmission.

DETAILED DESCRIPTION

In the following description, for purposes of explanation, one or more embodiments will be described in more detail with reference to the accompanying drawings, in which one or more embodiments of the present invention have been illustrated. It will be apparent, however, to one skilled in the art that the present invention can be implemented in various manners, and thus should not be construed to be limited to the embodiments disclosed herein.

Referring now to FIG. 1, in which a block diagram of a computer system/server 12, which is applicable to implement one or more embodiments of the present invention, is shown. Computer system/server 12 is only illustrative and is not intended to suggest any limitation as to the scope of use or functionality of the one or more embodiments described herein.

As shown in FIG. 1, computer system/server 12 is shown in the form of a general-purpose computing device. The components of computer system/server 12 may include, but are not limited to, one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including system memory 28 to processor 16.

Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. For example, such architectures may include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.

Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12, and it includes both volatile and non-volatile media, removable and non-removable media.

System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32. Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected to bus 18 by one or more data media interfaces. As will be further depicted and described below, memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.

Program/utility 40, having a set of at least one of program modules 42, may be stored in memory 28, by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules 42 generally carry out the functions and/or methodologies of one or more embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more external devices 14 including, but not limited to, a keyboard, a pointing device, a display 24, one or more devices that enable a user to interact with computer system/server 12, and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22. In addition, computer system/server 12 may communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20. As depicted, network adapter 20 communicates with the other components of computer system/server 12 via bus 18. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12. Examples of other hardware and/or software components may include, but are not limited to, microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems.

In addition to conventional computer system/server 12 shown in FIG. 1, one or more mobile electric devices may also be included for achieving one or more embodiments of the invention, including, but not limited to, mobile telephone, PDA, tablet computer and others. Typically, a mobile electric device has one or more input devices, including, but not limited to, a touch input device, such as, touch screen, touch panel, and others.

With respect to FIG. 1, the present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.

Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.

Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.

These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.

The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.

The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.

Those of ordinary skill in the art will appreciate that the hardware depicted in FIG. 1 may vary. Furthermore, those of ordinary skill in the art will appreciate that the depicted example is not meant to imply architectural limitations with respect to the present invention.

FIGS. 2A-2B illustrate one example of a flowchart of a method 200 for sharing a JAVA virtual machine (JVM) according to an embodiment of the invention is shown. In the method illustrated in FIG. 2, the JVM is a multi-tenant JVM 226 that has multiple tenants 220, 222, and 224, operating on a network 228. In one example, method 200 starts at block 202. Next, method 200 proceeds to block 204. Block 204 illustrates allocating an IP address to each of the multiple tenants, respectively. For example, an IP address may be allocated to each of tenant 220, tenant 222, and tenant 224. According to an embodiment of the invention, Dynamic Host Configuration Protocol (DHCP) protocol may be utilized to allocate an IP address to each of the tenants, and the IP address of each tenant may be different from each other. In addition, any other possible approaches in the art may also be utilized to allocate an IP address to each of the multiple tenants.

Next, method 200 proceeds to a block 206. Block 206 illustrates creating a separate virtual network interface for each of the multiple tenants and configuring the separate virtual network interface with the allocated IP address, respectively. For example, at block 206, a separate virtual network interface 230 may be created for tenant 220 and configured to the IP address allocated to tenant 220, a separate virtual network interface 232 may be created for tenant 222 and configured to the IP address allocated to tenant 222, and a separate virtual network 234 may be created for tenant 224 and configured to the IP address allocated to tenant 224. Next, block 208 illustrates, for each of the multiple tenants, performing each tenant's network operation via the virtual network interface created for that tenant.

According to an embodiment of the invention, multi-tenant JVM 226 may include a virtualization technology application program interface (API) for creating a separate virtual network interface for each of the multiple tenants on demand and configuring the separate virtual network interface with the allocated IP address for each respective tenant. An example of the virtualization technology application program interface may be libvirt. In one example, a libvirt layer may reside atop a linux host layer, which resides atop a node layer. Libvirt is an API that can create tools to manage guest OSs, which provides a VM monitoring program unknown by the native JVM API, to securely manage guest OSs running on a host. XML codes for configuring a virtual network by utilizing libvirt are given below. The codes below may be embodied as JAVA native invocation (JNI) as a tenant aware class library for supporting network isolation of tenants. By embodying the code as JNI, multi-tenant JVM 226 can utilize the JNI to create a virtual network interface for a tenant, on demand.

-   -   For network configuration:

  <network>  <name>Example Network</name>  <bridge name=“virbr100” />  <forward mode=“route” />  <ip address=“10.10.120.1” netmask=“255.255.255.0” /> </network>

-   -   For creating a virtual IP network:     -   virNetworkPtr network;     -   network=virNetworkCreateXML(conn, xml)     -   For destroying a virtual IP network:     -   int virNetworkDestroy(virNetworkPtr network)     -   One of ordinary skill in the art will appreciate that the         example codes given above are merely illustrative. Similarly,         the example of libvirt as an API given above is also for         illustration, and the one or more embodiments of the invention         are not limited to libvirt. Those skilled in the art may utilize         other suitable API in the art, such as Microsoft® Windows®         Hyper-v, to create a virtual network interface with the         allocated IP address for each of the multiple tenants,         respectively; the description given above should not be used to         limit protection scope of claims. In addition, libvert may         support virtualization to create a virtual network interface         with the allocated IP address for each of the multiple tenants         through a bridged mode, such as a shared physical device, where         internally, the option to run in a routing mode or a bridged         mode may be chosen at runtime, depending on the customer network         environment.

According to an embodiment of the invention, next, block 208 illustrates performing each tenant's network operation via the virtual network interface created for that tenant. After an IP address is allocated and a separate virtual network interface is created for a tenant and the allocated IP address is configured, all network operations of the tenant will be intercepted and redirected transparently to the virtual network interface created for that tenant. Multi-tenant JVM 226 may identify a tenant via tenant context information. The tenant context information refers to, for a certain network operation request, identification describing a particular tenant related to that request. The tenant context describes to which tenant a network operation request belongs. The tenant context may be represented by a unique tenant identifier. With tenant context information, multi-tenant JVM 226 identifies a particular tenant related to a certain network operation request, and in turn redirects that network operation request to a virtual network interface created for that particular tenant, such that network operation of the tenant is performed via the virtual network interface created for that particular tenant.

According to an embodiment of the invention, next, block 210 illustrates a determination whether any tenant is terminated. At block 210, if a tenant is terminated, then the process passes to block 212. Block 212 illustrates reclaiming network resources allocated to a tenant, including, but not limited to, reclaiming the IP address allocated to that tenant and reclaiming the virtual network interface created for that tenant, and the process ends.

According to an embodiment of the invention, returning to block 206, method 200 may include a process included in block 206, and starting at block 214. Block 214 illustrates a determination whether any IP address of any tenant is bound to a local host. At block 214, if any IP address of any tenant is bound to a local host, method 200 further comprises the steps at block 216 of binding the localhost of that tenant to another port that is different from a localhost port shared by all tenants. Next, block 218 illustrates establishing a mapping between the another port and the localhost port shared by all tenants. Binding to IPADDR_ANY means binding a tenant to both the IP address allocated for a tenant and the localhost of a tenant itself. Since the localhost is shared by all tenants in a JVM, isolation among multiple tenants may be realized by binding the localhost of that tenant to another port which is different from a localhost port shared by all tenants, and establishing a mapping between the another port and the localhost port shared by all tenants. For example, if the IP address of a tenant is bound to IPADDR_ANY, it means that the tenant has bound its network operation to both of the allocated IP address and its localhost. In one example, in a JVM, the localhost port shared by all tenants is 8080. In order to realize isolation among multiple tenants, the localhost of each tenant may be bound to another port which is different from localhost port 8080 shared by all tenants, for example, the localhost of a tenant may be bound to port 9000 and a mapping between port 8080 and port 9000 established at the tenant. In performing network operations, data sent onto the localhost of that tenant (i.e. data sent via localhost port 8080) is actually sent onto localhost port 9000. In addition, when receiving data from local host port 8080, the tenant receives data from local host port 9000, with multi-tenant JVM 226 assisting with an update of a source address once data is received. Similarly, if the IP address of another tenant is also bound to IPADDR_ANY, it means that the IP address of that tenant is also bound to its localhost. In order to realize isolation between the tenant mentioned above and the another tenant, the localhost of the another tenant may be bound to another port which is different from localhost port 8080 shared by all tenants and port 9000 bound to localhost of the tenant mentioned above. For example, the localhost of the tenant is bound to port 12000, and a mapping between port 8080 and port 12000 is established at the another tenant. In performing network operations, data sent to the localhost of the another tenant (i.e. data sent via localhost port 8080) is actually sent via localhost port 12000. Isolation among multiple tenants is realized by multi-tenant JVM 226 by ensuring that the localhost of each of the multiple tenants bound to IPADDR_ANY has a different port range from each other. The mapping port is not visible to external parties.

In one example, in a class library of a JVM wrappers are included for bind, accept, receive and send. In one embodiment, the JVM wrappers of multi-tenant JVM 226 are updated to support network isolation for each tenant. In one implementation of a Bind method at the JAVA underlying layer, unlike conventional JDK, the Bind method of one embodiment of the invention, in response to the operation relates to an address of IPADDR_ANY, does nothing until real network transmission (such as Accept) occurs. In one example, FIG. 4 illustrates a high-level logic flowchart of a process and program for handling an accept transmission. In one example, the process starts at block 400 and proceeds to block 402. At block 402, when real network transmission (such as Accept) occurs, an accept wrapper is triggered. Next, at block 404, if it is determined that the operation does not relate to an address of IPADDR_ANY, the process passes to block 416. Block 416 illustrates handling the accept wrapper without a setting to IPADDR_ANY, and the process ends. Otherwise, at block 404, if it is determined that the operation relates to an address of IPADDR_ANY, then the process passes to block 406. Block 406 illustrates querying the IP allocation information from the tenant context. Next block 408 illustrates creating two sockets, with one socket used to listen to IP address allocated for tenant and the other socket used to listen to localhost. At block 410, if the connection occurs on the first socket, a first thread is created and forwarded to the accept wrapper from the designated IP address and at block 412, if the connection occurs on the second socket, a second thread is created and forwarded to the accept wrapper from the local host. Block 414 illustrates returning any socket thread created, to the caller. For example, assuming that a tenant performs an Accept operation through Bind IPADDR_ANY, if a remote connection occurs on an IP address allocated to that tenant, then a socket matching with that IP address is returned, and no special processing will be performed for any subsequent network operations occurring on that socket. Otherwise, if the connection occurs on the localhost, a socket matching with the localhost of that tenant is returned, wherein, the port in the socket matching with the localhost is the aforementioned another port which is different from the localhost port shared by all tenants, and the another port may be determined via the mapping as mentioned above.

FIG. 3 illustrates one example of a block diagram of a system 300 for sharing a JAVA virtual machine according to an embodiment of the invention, wherein the JAVA virtual machine has multiple tenants. As shown, system 300 for sharing a JAVA virtual machine comprises an allocating unit 302 configured to allocate an IP address to each of multiple tenants, respectively. In addition, system 300 comprises a creating unit 304 configured to create a separate virtual network interface for each of the multiple tenants and configure the allocated IP address, respectively, wherein, for each of the multiple tenants, its network operation is performed via the virtual network interface created for that tenant.

According to an embodiment of the invention, creating unit 304 utilizes a virtualization technology application program interface to create a separate virtual network interface for each of the multiple tenants and configure the allocated IP address, respectively. An example of a virtualization technology application program interface includes but not limited to libvirt.

According to an embodiment of the invention, system 300 further comprises a reclaiming unit 306 configured to reclaim network resources allocated to a tenant in response to the tenant being terminated, including, but not limited to, reclaiming the IP address allocated for that tenant and reclaiming the virtual network interface created for that tenant.

According to an embodiment of the invention, the multiple tenants are each identified via tenant context information 312.

According to an embodiment of the invention, if an IP address of a tenant is bound to IPADDR_ANY, system 300 further comprises a binding unit 308 configured to bind the localhost of that tenant to another port that is different from a localhost port shared by all tenants and an establishing unit 310 configured to establish a mapping between the another port and the localhost port shared by all tenants.

The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. 

What is claimed is:
 1. A method, comprising: in response to receiving an accept operation call for a particular tenant of a plurality of tenants, triggering, by a computer system, an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants; and in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: creating, by the computer system, a first socket to listen to the particular IP address assigned to the particular tenant; creating, by the computer system, a second socket to listen to another port; in response to a connection occurring on the first socket, creating, by the computer system, a first thread and forwarding the first thread to the accept wrapper from the particular IP address; in response to the connection occurring on the second socket, creating, by the computer system, a second thread and forwarding the second thread to the accept wrapper from the another port; and returning, by the computer system, at least one of the first thread and the second thread in response to the accept operation call.
 2. The method according to claim 1, further comprising: allocating, by the computer system, through a virtualization technology application programming interface for the virtual machine, the plurality of IP addresses among the plurality of tenants through a Dynamic Host Configuration Protocol (DHCP) protocol; creating, by the computer system, through the virtualization technology application programming interface, a separate virtual network interface for each of the plurality of tenants from among a plurality of virtual network interfaces; configuring, by the computer system, through the virtualization technology application programming interface, each separate virtual network interface for each separate tenant with the separate IP address allocated for the separate tenant; and performing, by the computer system, network operations for each separate tenant via the separate virtual network interface for each separate tenant, wherein the virtual machine intercepts the network operations, identifies a tenant context identifying each separate tenant for each separate network operation, and transparently redirects network operations for each separate tenant to the separate virtual network interface for each separate tenant.
 3. The method according to claim 2, further comprising: running, by the computer system, the virtualization technology application program interface on top of an operating system host layer hosting the virtual machine which resides on top of a node layer.
 4. The method according to claim 1, further comprising: in response to determining the accept operation call relates to an IP address not bound to the particular address call, handling, by the computer system, the accept wrapper without a setting to the particular address call.
 5. The method according to claim 1, further comprising: querying, by the computer system, IP allocation information for a particular tenant identifier specified in a tenant context of the accept operation call, wherein each separate tenant is identified by a separate identifier from among a plurality of identifiers.
 6. The method according to claim 1, further comprising: binding, by the computer system, a local host of the particular tenant to the another port which is different from the localhost port shared by all of the plurality of tenants; establishing, by the computer system, a mapping between the another port and the localhost port shared by all of the plurality of the tenants.
 7. The method according to claim 1, further comprising: in response to a termination of the particular tenant from among the plurality of tenants, reclaiming, by the computer system, the particular IP address allocated to the particular tenant from among the plurality of IP addresses and reclaiming a particular virtual network interface allocated to the particular tenant from among a plurality of virtual network interfaces.
 8. A system, comprising: at least one processor coupled to a memory and operative, in response to receiving an accept operation call for a particular tenant of a plurality of tenants, to trigger an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants; and the at least one processor, in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: operative to create a first socket to listen to the particular IP address assigned to the particular tenant; operative to create a second socket to listen to another port; operative, in response to a connection occurring on the first socket, to create a first thread and forward the first thread to the accept wrapper from the particular IP address; operative, in response to the connection occurring on the second socket, to create a second thread and forward the second thread to the accept wrapper from the another port; and operative to return at least one of the first thread and the second thread in response to the accept operation call.
 9. The system according to claim 8, further comprising: the at least one processor operative to allocate, through a virtualization technology application programming interface for the virtual machine, the plurality of IP addresses among the plurality of tenants through a Dynamic Host Configuration Protocol (DHCP) protocol; the at least one processor operative to create, through the virtualization technology application programming interface, a separate virtual network interface for each of the plurality of tenants from among a plurality of virtual network interfaces; the at least one processor operative to configure, through the virtualization technology application programming interface, each separate virtual network interface for each separate tenant with the separate IP address allocated for the separate tenant; and the at least one processor operative to perform network operations for each separate tenant via the separate virtual network interface for each separate tenant, wherein the virtual machine intercepts the network operations, identifies a tenant context identifying each separate tenant for each separate network operation, and transparently redirects network operations for each separate tenant to the separate virtual network interface for each separate tenant.
 10. The system according to claim 9, further comprising: the at least one processor operative to run the virtualization technology application program interface on top of an operating system host layer hosting the virtual machine which resides on top of a node layer.
 11. The system according to claim 8, further comprising: the at least one processor operative, in response to determining the accept operation call relates to an IP address not bound to the particular address call, to handle the accept wrapper without a setting to the particular address call.
 12. The system according to claim 8, further comprising: the at least one processor operative to query IP allocation information for a particular tenant identifier specified in a tenant context of the accept operation call, wherein each separate tenant is identified by a separate identifier from among a plurality of identifiers.
 13. The system according to claim 8, further comprising: the at least one processor operative to bind a local host of the particular tenant to the another port which is different from the localhost port shared by all of the plurality of tenants; the at least one processor operative to establish a mapping between the another port and the localhost port shared by all of the plurality of the tenants.
 14. The system according to claim 8, further comprising: the at least one processor operative, in response to a termination of the particular tenant from among the plurality of tenants, to reclaim the particular IP address allocated to the particular tenant from among the plurality of IP addresses and reclaiming a particular virtual network interface allocated to the particular tenant from among a plurality of virtual network interfaces.
 15. A computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computer to cause the computer to: in response to receiving an accept operation call for a particular tenant of a plurality of tenants, triggering, by a computer system, an accept wrapper by a virtual machine shared by the plurality of tenants, each of the plurality of tenants allocated a separate IP address from among a plurality of IP addresses, each of the plurality of tenants sharing a localhost port, the accept wrapper for supporting network isolation for the plurality of tenants; and in response to determining the accept operation call relates to an IP address bound to a particular address call binding the particular tenant to a particular IP address from among the plurality of IP addresses and to the localhost port: creating, by the computer system, a first socket to listen to the particular IP address assigned to the particular tenant; creating, by the computer system, a second socket to listen to another port; in response to a connection occurring on the first socket, creating, by the computer system, a first thread and forwarding the first thread to the accept wrapper from the particular IP address; in response to the connection occurring on the second socket, creating, by the computer system, a second thread and forwarding the second thread to the accept wrapper from the another port; and returning, by the computer system, at least one of the first thread and the second thread in response to the accept operation call.
 16. The computer program product according to claim 15, further comprising program instructions executable by the computer to cause the computer to: allocate, by the computer, through a virtualization technology application programming interface for the virtual machine, the plurality of IP addresses among the plurality of tenants through a Dynamic Host Configuration Protocol (DHCP) protocol; create, by the computer, through the virtualization technology application programming interface, a separate virtual network interface for each of the plurality of tenants from among a plurality of virtual network interfaces; configure, by the computer, through the virtualization technology application programming interface, each separate virtual network interface for each separate tenant with the separate IP address allocated for the separate tenant; and perform, by the computer, network operations for each separate tenant via the separate virtual network interface for each separate tenant, wherein the virtual machine intercepts the network operations, identifies a tenant context identifying each separate tenant for each separate network operation, and transparently redirects network operations for each separate tenant to the separate virtual network interface for each separate tenant.
 17. The computer program product according to claim 16, further comprising program instructions executable by the computer to cause the computer to: run, by the computer, the virtualization technology application program interface on top of an operating system host layer hosting the virtual machine which resides on top of a node layer.
 18. The computer program product according to claim 15, further comprising program instructions executable by the computer to cause the computer to: in response to determining the accept operation call relates to an IP address not bound to the particular address call, handle, by the computer, the accept wrapper without a setting to the particular address call.
 19. The computer program product according to claim 15, further comprising program instructions executable by the computer to cause the computer to: query, by the computer, IP allocation information for a particular tenant identifier specified in a tenant context of the accept operation call, wherein each separate tenant is identified by a separate identifier from among a plurality of identifiers.
 20. The computer program product according to claim 15, further comprising program instructions executable by the computer to cause the computer to: bind, by the computer, a local host of the particular tenant to the another port which is different from the localhost port shared by all of the plurality of tenants; establish, by the computer, a mapping between the another port and the localhost port shared by all of the plurality of the tenants. 