Multilevel support in a nested virtualization environment

    公开(公告)号:GB2502225A

    公开(公告)日:2013-11-20

    申请号:GB201315279

    申请日:2012-02-08

    Applicant: IBM

    Abstract: A method of handling an event occurring in a nested virtualization computing environment is provided, wherein N hypervisors are executed nestedly, with a first hypervisor running at level zero (L0) directly over a host machine, and other hypervisors nestedly running at levels L1 to Ln, respectively. The method comprises trapping an event generated by software running at level Ln; determining a hypervisor x at level Lx designated for handling the trapped event; and wherein the hypervisor x emulates features needed for performing the trapped event for the software running at the level Ln.

    Multilevel support in a nested virtualization environment

    公开(公告)号:GB2502225B

    公开(公告)日:2014-07-23

    申请号:GB201315279

    申请日:2012-02-08

    Applicant: IBM

    Abstract: A method of handling an event occurring in a nested virtualization computing environment is provided, wherein N hypervisors are executed nestedly, with a first hypervisor running at level zero (L0) directly over a host machine, and other hypervisors nestedly running at levels L1 to Ln, respectively. The method comprises trapping an event generated by software running at level Ln; determining a hypervisor x at level Lx designated for handling the trapped event; and wherein the hypervisor x emulates features needed for performing the trapped event for the software running at the level Ln.

    Managing a nested virtualized environment

    公开(公告)号:GB2499942A

    公开(公告)日:2013-09-04

    申请号:GB201309929

    申请日:2011-10-26

    Applicant: IBM

    Abstract: A method for managing a virtualization environment comprises detecting, by a first software, a first set of features supported by a hardware device, wherein the first software runs on the hardware device; detecting a second set of features with which to run a second software, wherein the second software is launched by the first software with the second set of features; exposing one or more features in the second set of features to the second software, wherein the second software detects and enables the exposed features for a third software launched by the second software; and emulating a first feature without causing a trap such that control is transferred to the second software, in response to determining that the first feature is an exposed feature not included in the first set of features, wherein one or more sensitive events are associated with the first feature.

Patent Agency Ranking