摘要:
A virtual machine monitor is interposed between computer hardware and an operating system at runtime. Hardware that is already virtualized can be devirtualized at runtime.
摘要:
An embodiment of a method of checkpointing a virtual memory for a process comprises: accessing a page table that correlates logical addresses for the process to physical locations; saving memory resident pages identified for the process from the page table; and saving disk swap pages identified for the process from the page table, the step of saving disk swap pages being performed after the step of saving the memory resident pages.
摘要:
A virtual machine monitor can be used to commence virtualization of computer memory at runtime. The virtual machine monitor can also be used to devirtualize computer memory at runtime.
摘要:
Techniques and mechanisms are provided for maintaining session state information in a client server system. Session state information such as session state, time stamp information, activity state, counters, etc. are generated and updated by a server. The session state information is sent in encrypted form to a client and the client maintains the encrypted information. The client is not able to decipher or alter the encrypted information. The client sends the encrypted session state information in requests to the server. The server is able to respond intelligently using session state information from the client. Session state information no longer has to be maintained or replicated by session state managers associated with servers.
摘要:
A method of checkpointing and restarting processes that share a file that is open begins with a step of assigning a priority to one of the processes that share the file. This identifies a priority process. The method concludes with a step of reopening the file when restoring the priority process.
摘要:
A virtual machine monitor can be used to commence virtualization of an I/O device of a computer at runtime. The virtual machine monitor can also be used to devirtualize an I/O device of a computer at runtime.
摘要:
Migrating a process between separate logical address spaces involves saving information on a state of a process running in a first logical address space in machine memory mapped to the first logical address space, remapping the machine memory containing the saved information to a second logical address space, and recovering the process in the second logical address space from the saved information.
摘要:
Online computer maintenance is performed on at least one node. A virtual machine monitor is run; a first operating instance is run on the virtual machine monitor; and a second operating system instance is run on the virtual machine monitor as a substitute for the first instance. The maintenance is performed with respect to one of the instances while using the other of the instances.
摘要:
A computer includes hardware, a virtual machine monitor, and first and second operating system instances. The virtual machine monitor is used to expose a first operating system instance to a first hardware partition and prevent the first operating system instance from discovering a second hardware partition; and expose a second operating system instance to the second hardware partition and prevent the second operating system instance from discovering the first hardware partition. The virtual machine monitor is also used to share at least some of the hardware among the first and second operating system instances.
摘要:
A method of restoring processes within a process domain begins with a step of restoring a tree of processes in which at least two of the processes share at least a resource. The method continues with a step of restoring a checkpoint state of each resource used by the processes after a time when a possible need for a restoration state of the resource exists. According to an embodiment, the restoration state comprises information used by the method during the step of restoring the tree of processes. According to another embodiment, the restoration state comprises information used by the method during the step of restoring the checkpoint state of one or more particular resources. The method concludes with a step of resuming execution of each process after restoration of the checkpoint state of the resources used by the process.