会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Virtual machine fault tolerance
    • 虚拟机容错
    • US08201169B2
    • 2012-06-12
    • US12484640
    • 2009-06-15
    • Ganesh VenkitachalamRohit JainBoris WeissmanDaniel J. ScalesVyacheslav MalyuginJeffrey W. SheldonMin Xu
    • Ganesh VenkitachalamRohit JainBoris WeissmanDaniel J. ScalesVyacheslav MalyuginJeffrey W. SheldonMin Xu
    • G06F9/455G06F9/46G06F11/00
    • G06F11/1658G06F9/45533G06F9/45558G06F9/4881G06F11/0712G06F11/0766G06F11/079G06F2009/45579G06F2009/45591G06F2201/805G06F2201/815G06F2201/82
    • In a computer system running a primary virtual machine (VM) on virtualization software on a primary virtualized computer system (VCS) and running a secondary VM on virtualization software on a secondary VCS, a method for the secondary VM to provide quasi-lockstep fault tolerance for the primary VM includes: as the primary VM is executing a workload, virtualization software in the primary VCS is: (a) causing predetermined events to be recorded in an event log, (b) keeping output associated with the predetermined events pending, and (c) sending the log entries to the virtualization software in the secondary VCS; as the secondary VM is replaying the workload, virtualization software in the secondary VCS is: (a) sending acknowledgements indicating that log entries have been received; (b) when the virtualization software encounters one of the predetermined events, searching the log entries to determine whether a log entry corresponding to the same event was received from the primary VCS, and if so, comparing data associated with the predetermined event produced by the secondary VM with that of the primary VM; if there is a match, the virtualization software in the secondary VCS transmitting an acknowledgement to the virtualization software in the primary VCS; one of the virtualization software in the primary or secondary VCS dropping the event and the other dispatching the output; and if there is no match, performing a checkpoint resynchronization.
    • 在主虚拟化计算机系统(VCS)上的虚拟化软件上运行主虚拟机(VM)并在辅助VCS上运行虚拟化软件上的辅助虚拟机的计算机系统中,辅助虚拟机提供准锁步骤容错 对于主虚拟机包括:当主虚拟机正在执行工作负载时,主VCS中的虚拟化软件是:(a)使事件日志中记录预定事件,(b)保持与预定事件挂起的输出挂起,以及 (c)将日志条目发送到二级VCS中的虚拟化软件; 当辅助虚拟机正在重播工作负载时,辅助VCS中的虚拟化软件是:(a)发送指示已经接收到日志条目的确认; (b)当虚拟化软件遇到预定事件之一时,搜索日志条目以确定是否从主VCS接收到与同一事件相对应的日志条目,如果是,则将与由该VCS生成的预定事件相关联的数据进行比较 辅助虚拟机与主虚拟机的辅助虚拟机; 如果存在匹配,则次级VCS中的虚拟化软件向主VCS中的虚拟化软件发送确认; 主要或次要VCS中的虚拟化软件之一放弃事件,另一个调度输出; 如果没有匹配,则执行检查点重新同步。
    • 7. 发明授权
    • Virtualization system for computers having multiple protection mechanisms
    • 具有多重保护机制的计算机的虚拟化系统
    • US07908646B1
    • 2011-03-15
    • US11865670
    • 2007-10-01
    • Xiaoxin ChenAlberto J. MunozJeffrey W. Sheldon
    • Xiaoxin ChenAlberto J. MunozJeffrey W. Sheldon
    • G06F7/04
    • G06F12/1466G06F9/45537
    • In a virtual computer system, the invention virtualizes a primary protection mechanism, which restricts memory accesses based on the type of access attempted and a current hardware privilege level, using a secondary protection mechanism, which is independent of the hardware privilege level. The invention may be used to virtualize the protection mechanisms of the Intel IA-64 architecture. In this embodiment, virtual access rights settings in a virtual TLB are translated into shadow access rights settings in a hardware TLB, while virtual protection key settings in a virtual PKR cache are translated into shadow protection key settings in a hardware PKR cache, based in part on the virtual access rights settings. The shadow protection key settings are dependent on the guest privilege level, but the shadow access rights settings are not.
    • 在虚拟计算机系统中,本发明使用独立于硬件特权级别的次级保护机制来虚拟化主保护机制,其基于尝试的访问类型和当前硬件特权级别来限制存储器访问。 本发明可以用于虚拟化Intel IA-64架构的保护机制。 在该实施例中,虚拟TLB中的虚拟访问权限设置被转换为硬件TLB中的影子访问权限设置,而虚拟PKR高速缓存中的虚拟保护密钥设置被部分地转换为硬件PKR高速缓存中的影子保护密钥设置 对虚拟访问权限设置。 影子保护键设置取决于访客权限级别,但影子访问权限设置不是。
    • 8. 发明授权
    • Restricting memory access to protect data when sharing a common address space
    • 限制内存访问以在共享公共地址空间时保护数据
    • US07506122B1
    • 2009-03-17
    • US11865641
    • 2007-10-01
    • Ole AgesenJeffrey W. Sheldon
    • Ole AgesenJeffrey W. Sheldon
    • G06F12/00
    • G06F12/1458G06F12/1036G06F12/109G06F12/145G06F2212/656
    • A first software entity occupies a portion of a linear address space of a second software entity and prevents the second software entity from accessing the memory of the first software entity. For example, in one embodiment of the invention, the first software entity is a virtual machine monitor (VMM), which supports a virtual machine (VM), the second software entity. The VMM sometimes directly executes guest instructions from the VM and, at other times, the VMM executes binary translated instructions derived from guest instructions. When executing binary translated instructions, the VMM uses memory segmentation to protect its memory. When directly executing guest instructions, the VMM may use either memory segmentation or a memory paging mechanism to protect its memory. When the memory paging mechanism is active during direct execution, the protection from the memory segmentation mechanism may be selectively deactivated to improve the efficiency of the virtual computer system.
    • 第一软件实体占用第二软件实体的线性地址空间的一部分,并且防止第二软件实体访问第一软件实体的存储器。 例如,在本发明的一个实施例中,第一软件实体是支持虚拟机(VM)的第二软件实体的虚拟机监视器(VMM)。 VMM有时直接从VM执行访客指令,而在其他时候,VMM执行从访客指令导出的二进制翻译指令。 当执行二进制转换指令时,VMM使用存储器分段来保护其内存。 当直接执行访客指令时,VMM可以使用存储器分段或存储器寻呼机制来保护其存储器。 当存储器分页机制在直接执行期间有效时,可以选择性地停止对存储器分段机制的保护,以提高虚拟计算机系统的效率。