Updating operating system images of inactive compute instances

    公开(公告)号:US11698741B2

    公开(公告)日:2023-07-11

    申请号:US17199868

    申请日:2021-03-12

    摘要: Updating inactive compute instances is disclosed. It is determined that a first compute instance that boots from an operating system image on a first storage device is in an inactive state. It is determined that updates to the operating system image on the first storage device exist. The operating system image is copied from the first storage device to a second storage device. The operating system image on the second storage device is updated with the updates to generate an updated operating system image on the second storage device. The updated operating system image is copied form the second storage device to the first storage device in place of the operating system image.

    Efficient virtual machine memory monitoring with hyper-threading

    公开(公告)号:US11243800B2

    公开(公告)日:2022-02-08

    申请号:US16686852

    申请日:2019-11-18

    发明人: Michael Tsirkin

    摘要: A system and method for efficient virtual machine memory monitoring with hyper-threading includes executing, by a hypervisor executing on a plurality of physical processors, a virtual central processor unit (VCPU) of a virtual machine on a first hyper-thread. The plurality of physical processors include a first physical processor having the first hyper-thread and a second hyper-thread. The virtual machine executes on the first hyper-thread. Then, the second hyper-thread executes a memory monitoring instruction on a designated range of a shared memory to cause the second hyper-thread to stop executing. Then, a guest in the virtual machine updates the designated range of the shared memory by storing a first request in the designated range of the shared memory to wake up the second hyper-thread.

    Securing virtual machines in computer systems

    公开(公告)号:US11237859B2

    公开(公告)日:2022-02-01

    申请号:US16203060

    申请日:2018-11-28

    摘要: Aspects of the disclosure provide for mechanisms for securing virtual machines in a computer system. A method of the disclosure includes: receiving a first resource request initiated by an application running on a virtual machine during initialization of the application; allocating, by a hypervisor, a resource to the application in view of the first resource; and in response to receiving a message indicating completion of the initialization of the application, blocking, by the hypervisor, at least one hypercall initiated by the virtual machine. The completion of the initialization of the application may correspond to initiation of execution of the application using the allocated resource.

    Debugging a network switch by replaying configuration

    公开(公告)号:US11228492B2

    公开(公告)日:2022-01-18

    申请号:US16242774

    申请日:2019-01-08

    摘要: A network switch may be debugged by creating a virtual instance of the switch. Configuration data of the network switch may be retrieved, the configuration data including lists of the rules and groups configured on the switch. An isolated virtual environment may be created, and a virtual switch may be provisioned on the isolated virtual environment. The virtual switch may be configured with the configuration data of the network switch, including the rules and groups configured thereon. Diagnostic data corresponding to the switch may be obtained from the virtual switch.

    Storage domain growth management
    6.
    发明授权

    公开(公告)号:US11204702B2

    公开(公告)日:2021-12-21

    申请号:US15678001

    申请日:2017-08-15

    摘要: A host system executing multiple virtual machines that is associated with multiple storage domains may be identified. Storage domain data may be received that includes utilization of each of the multiple storage domains by the multiple virtual machines. It may be determined that the utilization of a first storage domain of the multiple storage domains by the virtual machines satisfies a threshold utilization. In response to determining that the utilization of the first storage domain satisfies the threshold utilization, a second storage domain may be identified in view of a storage domain rank. An instruction may be provided to cause a storage migration of a virtual machine from the first storage domain to the identified second storage domain.

    Sharing data via virtual machine to host device bridging

    公开(公告)号:US11113089B2

    公开(公告)日:2021-09-07

    申请号:US15905101

    申请日:2018-02-26

    IPC分类号: G06F9/455

    摘要: In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. The hypervisor maps a first memory and a second memory into the second virtual machine at a first base address register and a second base address register associated with the virtual host device and pass-through device. The hypervisor sends a mapping from the first virtual machine to the second virtual machine. The hypervisor sends a first address of a first ring of the first guest device and a second address of a second ring of an assigned device to the second virtual machine.

    Authenticator plugin interface
    9.
    发明授权

    公开(公告)号:US11063923B2

    公开(公告)日:2021-07-13

    申请号:US15928670

    申请日:2018-03-22

    IPC分类号: H04L29/06 G06F21/31

    摘要: Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal.