Abstract:
A method for processing a guest event in a hypervisor-controlled system (10), comprising the steps: (i) the guest event triggering a first firmware service being specific for the guest event in a firmware (70), the guest event being associated with a guest (20) and with a guest state (52) and a guest memory (22) encrypted with a guest key (24); (ii) the firmware (70) processing information associated with the guest event, comprising information of the guest state (52) and the guest memory (22), and presenting only a subset of the information of the guest state (52) and the guest memory (22) in decrypted form to a hypervisor (30), wherein the subset of the information is selected to suffice for the hypervisor (30) to process the guest event; (iii) the firmware (70) retaining a part of the information of the guest state (52) and the guest memory (22) that is not being sent to the hypervisor (30); (iv) the hypervisor (30) processing the guest event based on the received subset of the information of the guest state (52) and the guest memory (22) and sending a process result to the firmware (70) triggering a second firmware service being specific for the guest event; (v) the firmware (70) processing the received process result together with the part of the information of the guest state (52) and the guest memory (22) that was not sent to the hypervisor (30), generating a state and/or memory modification;(vi) the firmware (70) performing the state and/or memory modification associated with the guest event at the guest memory (22) in encrypted form.
Abstract:
PROBLEM TO BE SOLVED: To manage an appropriate storage infrastructure having a plurality of storage components in accordance with consumer service level objectives (SLOs). SOLUTION: The storage components for storing consumer data are identified under consideration of specified service level objectives, and consumer SLO policies are mapped to the storage components to select available storage components for specified data classes to configure the storage components. The storage infrastructure comprises a management instance which automatically ensures that consumer data is stored on appropriate storage components satisfying the corresponding SLO policies, a consumer service level interface for providing SLO policies to the management instance, a component discovery and classification module (CDC module) for identifying storage components for storing consumer data, and a repository for storing metadata associated with the storing of consumer data under consideration of SLO policies. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
The invention relates to a method for processing a guest event in a hypervisor- controlled system (10), comprising the steps: (i) the guest event triggering a first firmware service being specific for the guest event in a firmware (70), the guest event being associated with a guest (20) and with a guest state (52) and a guest memory (22) encrypted with a guest key (24); (ii) the firmware (70) processing information associated with the guest event, comprising information of the guest state (52) and the guest memory (22), and presenting only a subset of the information of the guest state (52) and the guest memory (22) in decrypted form to a hypervisor (30), wherein the subset of the information is selected to suffice for the hypervisor (30) to process the guest event; (iii) the firmware (70) retaining a part of the information of the guest state (52) and the guest memory (22) that is not being sent to the hypervisor (30); (iv) the hypervisor (30) processing the guest event based on the received subset of the information of the guest state (52) and the guest memory (22) and sending a process result to the firmware (70) triggering a second firmware service being specific for the guest event; (v) the firmware (70) processing the received process result together with the part of the information of the guest state (52) and the guest memory (22) that was not sent to the hypervisor (30), generating a state and/or memory modification; (vi) the firmware (70) performing the state and/or memory modification associated with the guest event at the guest memory (22) in encrypted form.
Abstract:
Eine virtuelle Maschine soll migriert werden. Um der virtuellen Maschine zu ermöglichen, eine Peripheriefunktion ohne lange Unterbrechung zu verwenden, wird eine Migrationsunterstützungseinheit (1705) bereitgestellt, wobei die Migrationsunterstützungseinheit (1705) dazu eingerichtet ist, eine Quellschreibanforderung zu empfangen, die durch eine Peripheriefunktion erzeugt worden ist, und eine Zielschreibanforderung zu erzeugen, die dieselben Schreibdaten aufweist wie die Quellschreibanforderung und an den Zielspeicherbereich der virtuellen Maschine gerichtet ist.
Abstract:
The invention relates to a method for operating a node cluster system with a plurality of nodes in a network, wherein the cluster system (100) appears to be a single node with only one specific network address (IP, MAC) to its network environment. The method comprising the steps: providing a shared socket database for linking network connection port identifications of a common set of network connection port identifications to the individual nodes, assigning a master function to one of the nodes, sending incoming traffic to all nodes of the cluster system, wherein each node verifies its responsibility for this traffic individually, exclusive assignment of a network connection port to the responsible node for the duration of a connection of the corresponding application process by means of the corresponding network connection port identification and the link established by the shared socket database, and processing of the traffic by the responsible node or otherwise by the node having the master function. Further, the invention relates to a corresponding computer-readable medium, to a corresponding computer program product and to a corresponding node cluster system.
Abstract:
Ein durch einen Computer implementiertes Verfahren weist ein Empfangen von mindestens einem Protokollsatz auf. Auf der Grundlage des Protokollsatzes kann ein Typ von Vorgang ermittelt werden, der in einem Quelldatenbanksystem ausgeführt wird. Auf der Grundlage des Typs von Vorgang kann eine Aktualisierungsstrategie aus einem Satz von vordefinierten Aktualisierungsstrategien ausgewählt werden, wobei die Aktualisierungsstrategie eine Folge von Replikationsvorgängen angibt, die auszuführen sind, um in dem mindestens einen Protokollsatz beschriebene Änderungen auf ein Zieldatenbanksystem anzuwenden.
Abstract:
By assigning an identifier to each entropy element, these may be provided to a selected virtual machine on a hypervisor. The entropy element may be generated by the hypervisor based on triggers related to one selected virtual machine. Restricting use of the entropy elements for the selected virtual machine, reduces the risk of attack that might reduce variation in the random entropy generated for example by incoming traffic, click events or the like. Time stamps may be used in an entropy pool for the hypervisor. A quality parameter for the verification environment for register transfer may be determined.
Abstract:
The invention relates to a method for operating a node cluster system with a plurality of nodes in a network, wherein the cluster system (100) appears to be a single node with only one specific network address (IP, MAC) to its network environment. The method comprising the steps: providing a shared socket database for linking network connection port identifications of a common set of network connection port identifications to the individual nodes, assigning a master function to one of the nodes, sending incoming traffic to all nodes of the cluster system, wherein each node verifies its responsibility for this traffic individually, exclusive assignment of a network connection port to the responsible node for the duration of a connection of the corresponding application process by means of the corresponding network connection port identification and the link established by the shared socket database, and processing of the traffic by the responsible node or otherwise by the node having the master function. Further, the invention relates to a corresponding computer-readable medium, to a corresponding computer program product and to a corresponding node cluster system.
Abstract:
A virtual machine (VM) is executed 200 on a source virtual machine monitor (VMM, e.g. hypervisor) 110 within a logical partition. The VM is allocated certain segments of hardware memory 201 assigned to the partition for exclusive data storage. When the VM is to be migrated to a destination VMM 120, the operation of the machine is suspended 202, and information relating to the configuration of the VM, including the allocated memory segments, is sent to the new VMM 203. The memory segments are then reassigned to the logical partition containing the destination VMM 206. The VM is then shut down 205 on the source VMM, with extended configuration information including descriptions of the assigned memory segments used to recreate the VM at the destination VMM, and the operation of the VM is then resumed on the new VMM 207. This allows the transfer of the data created by the virtual machine without requiring duplication of content and/or excessive processing time.
Abstract:
Method comprising: associating privileged objects (socket connection, disk-device, input/output bus access) 32.1-32.2 with application 20 comprising process resources 22.1-22.2 and corresponding semi-privileged instruction; filing the association in entity (associating table) 34 of operating system kernel 30; wherein central processing unit (CPU) 40 performs authorization check 42 if semi-privileged instruction attempts accessing privileged objects; wherein CPU executes 44 the semi-privileged instruction granting access to privileged objects if the kernel issued the semi-privileged instruction; or accesses kernel-entity if resources 22.1-22.2 issued the instruction to determine their authorization to access privileged objects; upon positive authorization, CPU executes the semi-privileged instruction granting access to privileged objects; upon failure, CPU denies execution of instruction and performs 46 corresponding authorization failure handling. File descriptor is used: by semi-privileged instruction to transfer data; by user space library to block, use select, poll, epoll; by kernel to verify resource authorization to use data transfer connection if forking occurs.