G06F9/45554

Transparent self-replicating page tables in computing systems
11573904 · 2023-02-07 · ·

An example method of managing memory in a computer system implementing non-uniform memory access (NUMA) by a plurality of sockets each having a processor component and a memory component is described. The method includes replicating page tables for an application executing on a first socket of the plurality of sockets across each of the plurality of sockets; associating metadata for pages of the memory storing the replicated page tables in each of the plurality of sockets; and updating the replicated page tables using the metadata to locate the pages of the memory that store the replicated page tables.

METHOD, APPARATUS AND DEVICE FOR GENERATING BARE METAL SERVER LINUX SYSTEM
20230004411 · 2023-01-05 ·

Provided are a method, apparatus, and device for generating a bare metal server Linux system image, and a memory medium. The method includes: analyzing a received bare metal server Linux system image generation request so as to obtain a target configuration parameter of a target bare metal server Linux system image to be generated and a target operating system model; selecting, from a redundant array of independent disks driver library, a target redundant array of independent disks driver that matches the target configuration parameter and the target operating system model; adding the target redundant array of independent disks driver to a boot file of a virtual machine to generate a target boot file; and exporting, from the virtual machine, a virtual machine disk image file containing the target boot file, as the target bare metal server Linux system image.

AUTOMATIC MANAGEMENT OF APPLICATION SPECIFIC AGENTS IN A VIRTUAL MACHINE USING AN APPLICATION MANAGEMENT AGENT

A lightweight, workload-agnostic application management agent (AMA) automatically upgrading application agents on a virtual machine (VM). The AMA is installed in the VM as part of a Gold image installation. The AMA detects a workload-type of the VM and sends the workload information to an application manager. The AMA continuously monitors the VM for any change in workload type, and any change causes the AMA to install a respective workload-specific agent (WSA) for the new workload in the VM. The AMA accesses the new WSA from the application manager though a push or pull operation. Applications are thus automatically upgraded through VM resident agents. The user needs only to update policies and load updated software to the application manager without manually upgrading the WSA agents themselves.

SYSTEM AND METHOD OF APPLICATION TRANSITIONS BETWEEN INFORMATION HANDLING SYSTEMS
20230013509 · 2023-01-19 ·

In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: execute a first application within a first operating system (OS) virtualization on a first information handling system (IHS); suspend the first application at a point of execution; determine one or more statuses associated with the first application, in which the one or more statuses includes the point of execution where the first application was suspended; provide the one or more statuses to a second IHS; configure a second application and a second OS virtualization with the one or more statuses associated with the first application within the first OS virtualization; establish input/output associated with the second application with one or more components of the first IHS via the network; and execute the second application within the second OS virtualization on the second IHS at the point of execution.

Virtual Non-Uniform Memory Access (NUMA) Locality Table for NUMA Systems
20230012606 · 2023-01-19 ·

Various approaches for exposing a virtual Non-Uniform Memory Access (NUMA) locality table to the guest OS of a VM running on NUMA system are provided. These approaches provide different tradeoffs between the accuracy of the virtual NUMA locality table and the ability of the system's hypervisor to migrate virtual NUMA nodes, with the general goal of enabling the guest OS to make more informed task placement/memory allocation decisions.

Installing and manipulating a secure virtual machine image through an untrusted hypervisor

Systems, apparatuses and methods may provide for technology that associates a key domain of a plurality of key domains with a customer boot image, receives the customer boot image from the customer, and verifies the integrity of the customer boot image that is to be securely installed at memory locations determined from an untrusted privileged entity (e.g., a virtual machine manager).

Cost-efficient high-availability multi-single-tenant services
11614958 · 2023-03-28 · ·

A secondary pool of VMs is used to run secondary services or jobs, which may be evicted upon failure of a corresponding primary VM. Upon detection of a failure of a primary resource, the secondary services or jobs are evicted from secondary pool resources, and the secondary pool resources can be automatically allocated to the jobs of the failed primary resource. In this regard, a secondary job may be thought of as a preemptible job and comprises services or jobs that are lower priority than the service or job on the primary resource. By using computing resources in the secondary pool to run secondary or preemptible jobs, this technology makes use of what would be otherwise idle resources. This beneficially avoids having to allocate additional and separate computing resources for secondary jobs, leads to more efficient use of network resources, and reduces costs.

Systems and methods for task processing in a distributed environment

Methods and apparatus for task processing in a distributed environment are disclosed and described. An example apparatus includes a task manager and a task dispatcher. The example task manager is to receive a task and create an execution context for the task, the execution context to associate the task with a routine for task execution. The example task dispatcher is to receive a report of task execution progress and provide an update regarding task execution progress, the task dispatcher, upon initiation of task execution, to facilitate blocking of interaction with a resource involved in the task execution. The example task dispatcher is to trigger an indication of task execution progress and, upon task finish, facilitate unblocking of the resource involved in the task execution.

METHOD FOR HANDLING EXCEPTION OR INTERRUPT IN HETEROGENEOUS INSTRUCTION SET ARCHITECTURE AND APPARATUS
20230124004 · 2023-04-20 ·

A method for handling an exception or interrupt in a heterogeneous instruction set architecture is provided. A physical host to which the method is applied can support two instruction set architectures. When a secondary architecture virtual machine triggers an exception or interrupt, a virtual machine monitor may translate code of the exception or interrupt in a secondary instruction set architecture into code of the exception or interrupt in a primary instruction set architecture. The virtual machine monitor) may identify the code of the exception or interrupt in the primary instruction set architecture. The virtual machine monitor identifies, based on the translated code, a type of the exception or interrupt triggered by the secondary architecture virtual machine, to handle the exception or interrupt.

Directed interrupt for multilevel virtualization with interrupt table

An interrupt signal is provided to a first guest operating system. A bus attachment device receives an interrupt signal from a bus connected module with an interrupt target ID identifying a processor assigned for use by the guest operating system as a target processor for handling the interrupt signal. The bus attachment device translates the received interrupt target ID to a logical processor ID of the target processor using an interrupt table entry stored in a memory section assigned to a second guest operating system hosting the first operating system and forwards the interrupt signal to the target processor for handling. The logical processor ID of the target processor is used to address the target processor directly.