-
公开(公告)号:US11675651B2
公开(公告)日:2023-06-13
申请号:US17198450
申请日:2021-03-11
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Naijie Li , Bao Zhang , Jin Hong Fu , Jing Lu , Xiang Zu
CPC classification number: G06F11/0793 , G06F9/30065 , G06F9/3861 , G06F9/5016 , G06F11/0772
Abstract: Methods, apparatus, computer program products for handling critical problem exceptions during an execution of an application are provided. The method comprises: detecting, by one or more processing units, an occurrence of a certain type of critical problem exception during an execution of an application, the critical problem exception resulting in a termination of the application; instructing, by one or more processing units, to call a Super Handling Routine (SHR) corresponding to the type of the critical problem exception at a pre-configured address based on a pre-determined context registered by the application, the SHR being configured to handle critical problem exceptions; and handing, by one or more processing units, control to the SHR to handle the type of the critical problem exception.
-
公开(公告)号:US20220405118A1
公开(公告)日:2022-12-22
申请号:US17353945
申请日:2021-06-22
Applicant: International Business Machines Corporation
Inventor: Ming Ran Liu , Jing Lu , NAIJIE LI , Xiao Yan Tang , Yuan Zhai , Kershaw S. Mehta
Abstract: Aspects of the invention include creating a first file control block in a primary runtime environment with a first addressing mode and a second file control block in a second runtime environment with a second addressing mode, where both the first file control block and the second file control block describe a status of a first file of a caller program in the primary runtime environment. The parameters of the first file of the caller program in the primary runtime environment are passed to a target callee program in the secondary runtime environment. An anchor is added in the first file control block as a link to the second file control block. The first file control block are the second file control block synchronized with updates to the first file in the primary runtime environment and the passed parameters of the first file in the secondary runtime environment.
-
公开(公告)号:US11288105B2
公开(公告)日:2022-03-29
申请号:US16939289
申请日:2020-07-27
Applicant: International Business Machines Corporation
Inventor: Jing Lu , Bao Zhang , Ming Ran Liu , Tie Liu , Xiao Yan Tang , Xiang Zu
Abstract: Provided is a method for preventing deadlocks between competing threads. The method includes receiving a lock request from a first thread and, in response, identifying a potential deadlock with a second thread. In response, the method includes determining whether to deny the lock request, which includes: determining whether a first duration for which the first thread will hold the lock to complete its job is longer than a second duration for which the second thread will hold the lock to complete its job; determining whether the second thread will start to use the lock soon relative to the first duration; and determining whether both the first and second threads will complete their respective jobs within a time limit if the lock is denied to the first thread while the second thread completes its job. The method further includes denying the request for the requested lock from the first thread.
-
公开(公告)号:US10977101B2
公开(公告)日:2021-04-13
申请号:US16217971
申请日:2018-12-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Naijie Li , Bao Zhang , Jing Lu , Jin Hong Fu , Kershaw Mehta
IPC: G06F9/54
Abstract: Systems, methods, and computer-readable media are described for interoperability between programs associated with different addressing modes. A caller program associated with a first addressing mode (e.g., a 32-bit program or a 64-bit program) that is executing within a parent runtime environment makes a call to an external interface to execute a target callee program that is associated with a second addressing mode different from the first addressing mode. The target callee program is then executed in a pre-initialized secondary runtime environment that executes on the same task or thread as the parent runtime environment.
-
公开(公告)号:US10684882B2
公开(公告)日:2020-06-16
申请号:US15855342
申请日:2017-12-27
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jing Lu , Heng Guo Ge , Da Shen , Jun Yao
IPC: G06F9/455 , H04L12/707
Abstract: Methods, computer program products, and network authority devices are presented. The methods include, for instance: updating a source network with migration information of a virtual machine to redirect network traffic for the virtual machine to a destination network; and updating at least one remote network with the migration information of the virtual machine. In one embodiment, the updating includes updating the source network concurrent with a migration of the virtual machine to minimize interruption of the network traffic. In another embodiment, the updating includes updating a network device of the source network to forward the network traffic for the virtual machine to another network device of the destination network. In a further embodiment, the updating includes updating the source network to redirect the network traffic from at least one client on the at least one remote network.
-
公开(公告)号:US10397011B2
公开(公告)日:2019-08-27
申请号:US15702922
申请日:2017-09-13
Applicant: International Business Machines Corporation
IPC: H04L12/18 , H04L12/761 , H04L12/713 , H04L12/46 , H04L12/715 , H04L12/721 , H04L12/24
Abstract: For logical multicasting in overlay networks, at a data processing system, an original unicast packet is received from a first component in a first computing node in an overlay network. To cause multicasting in the overlay network the received original unicast packet was unicast by the first computing node only to the data processing system, and a multicast data structure for the overlay network is maintained only by the data processing system, the multicast data structure containing information of each receiver that is configured to receive unicast packets during logical multicasting in the overlay network. From a set of subscriber receivers in the multicast data structure, a subset of the subscriber receivers is selected. A copy of the original unicast packet is unicast to each subscriber receiver in the subset.
-
公开(公告)号:US09559910B2
公开(公告)日:2017-01-31
申请号:US14725025
申请日:2015-05-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jing He , Jing Lu , Jin Ming Shang , Jun Yao
CPC classification number: H04L41/12 , G06F9/45558 , G06F2009/4557 , G06F2009/45595 , H04L61/103 , H04L61/6022
Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: locating, by one or more processor, at least one virtual machine within a virtual network, wherein gratuitous address resolution functionality of the at least one virtual machine is inactive; and providing, by the one or more processor, location information of the at least one virtual machine. In one embodiment, the locating comprises: receiving an IP address of the at least one virtual machine; and selecting a virtual machine hosting network device from a computing network node table, where the computing network node table comprises at least one network connection record of the silent virtual machine network device hosting a silent virtual machine having a known MAC address and an unknown IP address; and querying the silent virtual machine network device for a MAC address corresponding to the IP address of the at least one virtual machine.
Abstract translation: 介绍了方法,计算机程序产品和系统。 所述方法包括例如:由一个或多个处理器定位虚拟网络内的至少一个虚拟机,其中所述至少一个虚拟机的无偿地址解析功能是无效的; 以及由所述一个或多个处理器提供所述至少一个虚拟机的位置信息。 在一个实施例中,所述定位包括:接收所述至少一个虚拟机的IP地址; 以及从计算网络节点表选择托管网络设备的虚拟机,其中所述计算网络节点表包括所述静默虚拟机网络设备的至少一个网络连接记录,所述静默虚拟机网络设备承载具有已知MAC地址和未知IP地址的静默虚拟机 ; 以及对所述静默虚拟机网络设备查询与所述至少一个虚拟机的IP地址相对应的MAC地址。
-
公开(公告)号:US20250005323A1
公开(公告)日:2025-01-02
申请号:US18216698
申请日:2023-06-30
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: NAIJIE LI , Peng Hui Jiang , Bao Zhang , Jing Lu , Ming Ran Liu , Yuan Zhai , Dong Hui Liu
Abstract: A method, system, and computer program product that is configured to: receive at least one workload of a mixed addressing mode application; classify the at least one workload with artificial intelligence (AI) including a support vector machine (SVM) algorithm; match at least one agent to the at least one workload based on a workload class and tuning policies; execute workload polices of the at least one workload based on the workload class and the tuning policies; evaluate a transaction per second (TPS) and response time of the at least one workload; calculate a reward of the at least one workload; and train a plurality of models based on historical data corresponding to the evaluated TPS, the evaluated response time, and the calculated reward.
-
公开(公告)号:US20240232098A9
公开(公告)日:2024-07-11
申请号:US17970122
申请日:2022-10-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Naijie Li , Dong Hui Liu , Jing Lu , Peng Hui Jiang , Xiao Yan Tang , Bao Zhang , Yong Yin , Jun Su , Jia Yu
IPC: G06F12/1027 , G06N20/00
CPC classification number: G06F12/1027 , G06N20/00 , G06F2212/684
Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
-
公开(公告)号:US20240211409A1
公开(公告)日:2024-06-27
申请号:US18085706
申请日:2022-12-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dong Hui Liu , Jing Lu , Peng Hui Jiang , Naijie Li , Xiao Yan Tang , Bao Zhang , Jun Su , Yong Yin , Jia Yu
IPC: G06F12/1009 , G06F12/0882 , G06F12/1027
CPC classification number: G06F12/1009 , G06F12/0882 , G06F12/1027
Abstract: A method, including: monitoring resource utilization of an operating system (OS) with applications utilizing larger pages; determining the monitored resource utilization is greater than a threshold resource utilization; in response to the determining the monitored resource utilization is greater than a threshold resource utilization, determining a respective larger pages index value for each of the applications utilizing larger pages; and turning off larger pages utilization of a subset of the applications utilizing larger pages, wherein the subset comprises a predefined number of the applications utilizing larger pages that have highest determined larger pages index values.
-
-
-
-
-
-
-
-
-