G06F9/45554

USING PHYSICAL AND VIRTUAL FUNCTIONS ASSOCIATED WITH A NIC TO ACCESS AN EXTERNAL STORAGE THROUGH NETWORK FABRIC DRIVER

Some embodiments provide a method of providing distributed storage services to a host computer from a network interface card (NIC) of the host computer. At the NIC, the method accesses a set of one or more external storages operating outside of the host computer through a shared port of the NIC that is not only used to access the set of external storages but also for forwarding packets not related to an external storage. In some embodiments, the method accesses the external storage set by using a network fabric storage driver that employs a network fabric storage protocol to access the external storage set. The method presents the external storage as a local storage of the host computer to a set of programs executing on the host computer. In some embodiments, the method presents the local storage by using a storage emulation layer on the NIC to create a local storage construct that presents the set of external storages as a local storage of the host computer.

Virtual non-uniform memory access (NUMA) locality table for NUMA systems

Various approaches for exposing a virtual Non-Uniform Memory Access (NUMA) locality table to the guest OS of a VM running on NUMA system are provided. These approaches provide different tradeoffs between the accuracy of the virtual NUMA locality table and the ability of the system's hypervisor to migrate virtual NUMA nodes, with the general goal of enabling the guest OS to make more informed task placement/memory allocation decisions.

Extension application mechanisms through intra-process operation systems

The present disclosure relates to computer-implemented methods, software, and systems for providing extension application mechanisms. Memory is allocated for a virtual environment to run in an address space of an application that is to be extended with extension logic in a secure manner. The virtual environment is configured for execution of commands related to an extension functionality of the application. A virtual processor for an execution of a command of the commands is initialized at the virtual environment. The virtual processor is operable to manage one or more guest operating systems (OS). A first guest OS is loaded at the allocated memory and application logic of the extension functionality is copied into the allocated memory. The virtual environment is started to execute the first guest OS and the application logic of the extension functionality in relation to associated data of the application in the allocated memory.

System and method of application transitions between information handling systems

In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: execute a first application within a first operating system (OS) virtualization on a first information handling system (IHS); suspend the first application at a point of execution; determine one or more statuses associated with the first application, in which the one or more statuses includes the point of execution where the first application was suspended; provide the one or more statuses to a second IHS; configure a second application and a second OS virtualization with the one or more statuses associated with the first application within the first OS virtualization; establish input/output associated with the second application with one or more components of the first IHS via the network; and execute the second application within the second OS virtualization on the second IHS at the point of execution.

FUNCTION VIRTUALIZATION FACILITY FOR BLOCKING INSTRUCTION FUNCTION OF A MULTI-FUNCTION INSTRUCTION OF A VIRTUAL PROCESSOR

In a processor supporting execution of a plurality of functions of an instruction, an instruction blocking value is set for blocking one or more of the plurality of functions, such that an attempt to execute one of the blocked functions, will result in a program exception and the instruction will not execute, however the same instruction will be able to execute any of the functions that are not blocked functions.

Secure Interface Disablement

Various embodiments include methods and devices for implementing secure peripheral interface disablement on a computing device. Various embodiments may include receiving a trigger to disable a peripheral interface associated with a peripheral device of the computing device, identifying a physical address of the peripheral interface, and securely removing a mapping of an intermediate physical address of the peripheral interface to the physical address of the peripheral interface.

Method and electronic device for directly starting application on second virtual machine in operating environment of first virtual machine

A first virtual machine of a device receives startup information and creates a startup identifier associated with the startup information. The device receives, a startup instruction for starting an application on a second virtual machine via the first virtual machine, then acquires startup information corresponding to the startup instruction, the startup information including information of the second virtual machine and information of the application on the second virtual machine. The device starts the second virtual machine according to the information of the second virtual machine; and starts the application on the second virtual machine according to the information of the application on the second virtual machine.

Virtualizing integrated calls to provide access to resources in a virtual namespace

Disclosed herein are systems, methods, and software for facilitating the integration of native applications and virtualized applications. Calls initiated from within a native application associated with a native namespace are monitored for integrated calls. The integrated calls involve resources accessible through a virtual namespace. Upon detecting an integrated call, the integrated call is provided with access to a corresponding resource by way of the virtual namespace.

Using capability indicators to indicate support for guest driven surprise removal of virtual PCI devices
10394586 · 2019-08-27 · ·

A hypervisor receives a notification from a guest operating system of a virtual machine that includes a capability indicator of support provided by a virtual device driver for recovering from a surprise removal of a corresponding virtual device from the virtual machine. The hypervisor, upon receiving a request to remove the virtual device from the virtual machine, uses the capability indicator received from the guest operating system to identify one or more actions to be performed to remove the virtual device from the virtual machine. The hypervisor then removes the virtual device from the virtual machine using the identified actions.

Implementing a host as a container or virtual machine

A computer-implemented system for migration of a host Virtual Execution Environment (VEE), including a first VM running in a public cloud; the first VM having a first thin guest OS and a first file system; a dedicated hosting VEE on the first VM and executing user applications; a first dispatcher module running inside the dedicated hosting VEE, the first dispatcher module accessible to a user of the dedicated hosting VEE; a second dispatcher module running inside the first VM, the second dispatcher module in communication with the first dispatcher. The second dispatcher module is configured to live-migrate the dedicated hosting VEE with the executing user applications from the first VM to a second VM running on another public cloud, such that the migration is transparent to the dedicated hosting VEE.