-
公开(公告)号:GB2502225A
公开(公告)日:2013-11-20
申请号:GB201315279
申请日:2012-02-08
Applicant: IBM
Inventor: GORDON ABEL , YEHUDA SHMUEL BEN , EL NADAV YOSEF HAR , YASSOUR BEN-AMI
IPC: G06F9/455
Abstract: A method of handling an event occurring in a nested virtualization computing environment is provided, wherein N hypervisors are executed nestedly, with a first hypervisor running at level zero (L0) directly over a host machine, and other hypervisors nestedly running at levels L1 to Ln, respectively. The method comprises trapping an event generated by software running at level Ln; determining a hypervisor x at level Lx designated for handling the trapped event; and wherein the hypervisor x emulates features needed for performing the trapped event for the software running at the level Ln.
-
公开(公告)号:GB2502225B
公开(公告)日:2014-07-23
申请号:GB201315279
申请日:2012-02-08
Applicant: IBM
Inventor: GORDON ABEL , YEHUDA SHMUEL BEN , EL NADAV YOSEF HAR , YASSOUR BEN-AMI
IPC: G06F9/455
Abstract: A method of handling an event occurring in a nested virtualization computing environment is provided, wherein N hypervisors are executed nestedly, with a first hypervisor running at level zero (L0) directly over a host machine, and other hypervisors nestedly running at levels L1 to Ln, respectively. The method comprises trapping an event generated by software running at level Ln; determining a hypervisor x at level Lx designated for handling the trapped event; and wherein the hypervisor x emulates features needed for performing the trapped event for the software running at the level Ln.
-
公开(公告)号:GB2499942A
公开(公告)日:2013-09-04
申请号:GB201309929
申请日:2011-10-26
Applicant: IBM
Inventor: GORDON ABEL , BEN-YEHUDA SHMUEL , EL NADAV YOSEF HAR , YASSOUR BEN-AMI
IPC: G06F9/455
Abstract: A method for managing a virtualization environment comprises detecting, by a first software, a first set of features supported by a hardware device, wherein the first software runs on the hardware device; detecting a second set of features with which to run a second software, wherein the second software is launched by the first software with the second set of features; exposing one or more features in the second set of features to the second software, wherein the second software detects and enables the exposed features for a third software launched by the second software; and emulating a first feature without causing a trap such that control is transferred to the second software, in response to determining that the first feature is an exposed feature not included in the first set of features, wherein one or more sensitive events are associated with the first feature.
-
-