Red Hat Israel, Ltd.

Israel

Back to Profile

1-100 of 672 for Red Hat Israel, Ltd. Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
2023 1
2022 2
2021 5
2020 31
2019 44
See more
IPC Class
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 409
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 104
G06F 3/06 - Digital input from, or digital output to, record carriers 66
G06F 9/44 - Arrangements for executing specific programs 61
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt 54
See more
Status
Pending 4
Registered / In Force 668
Found results for  patents
  1     2     3     ...     7        Next Page

1.

Network beacon for hypervisor installations

      
Application Number 18111354
Grant Number 11924293
Status In Force
Filing Date 2023-02-17
First Publication Date 2023-06-29
Grant Date 2024-03-05
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Asayag, Mordechay

Abstract

A system and method for configuring components added to a network is disclosed. The method includes determining, by a host, that network identifying information of a plurality of networks to which the host is connected is unknown, listening for messages on the plurality of networks to obtain network identifying information for respective networks, receiving a message on a network of the plurality of networks, the message including a network identifier and a set of configuration settings, and configuring a network connection of the host for the network in view of the network identifier and the set of configuration settings from the message.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications

2.

SECURING VIRTUAL MACHINES IN COMPUTER SYSTEMS

      
Application Number 17589567
Status Pending
Filing Date 2022-01-31
First Publication Date 2022-05-19
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Aspects of the disclosure provide for mechanisms for securing virtual machines in a computer system. A request for a resource is received by a processing device. The request is initiated by a guest application. A determination is made by the processing device of whether an initialization of the guest application is completed. In response to a determination that the initialization of the guest application is completed, at least one system call associated with the request initiated by the guest application is blocked to reject execution of the request for the resource.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

3.

IDENTIFYING MEMORY DEVICES FOR SWAPPING VIRTUAL MACHINE MEMORY PAGES

      
Application Number 17542816
Status Pending
Filing Date 2021-12-06
First Publication Date 2022-03-24
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Arcangeli, Andrea

Abstract

Systems and methods for identifying memory devices for swapping virtual machine memory pages. An example method may comprise: identifying, by a processing device, a workload type associated with a workload being executed by a computer system; identifying a memory device associated with the workload type; evaluating a memory pressure metric reflecting a period of time during which an application being executed by the computer system has been blocked by a memory allocation operation; and responsive to determining that the memory pressure metric exceeds a threshold value, allocating a memory block on the identified memory device.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

4.

Efficient user space driver isolation by shallow virtual machines

      
Application Number 17408817
Grant Number 11734048
Status In Force
Filing Date 2021-08-23
First Publication Date 2021-12-09
Grant Date 2023-08-22
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Technology for configuring and executing a shallow virtual machine to enhance memory protection between different portions of user space memory of a particular computing process. An example method involves: receiving, by a processor of a host, a request to create a computing process comprising a first and second executable code, wherein the computing process comprises an instruction to cause the processor to switch between first and second page table structures; loading the first and second executable code into memory of the host, wherein the first page table structure comprises mapping data for the first executable code and for the second executable code and wherein the second executable code comprises driver code of a device; updating the second page table structure to disable execution of the first executable code and to provide the second executable code with access to the device; and restricting the first executable code from accessing the device.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/65 - Updates
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures

5.

MANAGING NETWORK INTERFACE CONTROLLER-GENERATED INTERRUPTS

      
Application Number 17368172
Status Pending
Filing Date 2021-07-06
First Publication Date 2021-10-28
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

Systems and methods for managing interrupts generated by network interface controllers. An example method may comprise: responsive to determining that a memory pressure metric in a computer system does not exceed a threshold value, disabling interrupts that signal completion of a packet transmission by a network interface controller; transmitting a plurality of data packets by the network interface controller; and responsive to detecting that the memory pressure metric exceeds the threshold value, releasing a memory buffer allocated to a data packet of the plurality of data packets.

IPC Classes  ?

  • G06F 13/24 - Handling requests for interconnection or transfer for access to input/output bus using interrupt

6.

Adjusting virtual machine GPU refresh rate to remote desktop stream frame rate

      
Application Number 17229663
Grant Number 11705086
Status In Force
Filing Date 2021-04-13
First Publication Date 2021-07-29
Grant Date 2023-07-18
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Sheriber, Snir
  • Lublin, Uri

Abstract

A system and method of adjusting a refresh rate to match a given remote desktop stream frame rate is described. The system may include a processing device to transmit, as a media stream, a portion of a remote desktop image with a frame rate that matches a refresh rate to a remote desktop client.

IPC Classes  ?

  • G09G 5/00 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead

7.

Updating operating system images of inactive compute instances

      
Application Number 17199868
Grant Number 11698741
Status In Force
Filing Date 2021-03-12
First Publication Date 2021-07-22
Grant Date 2023-07-11
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Sariel, David
  • Bregman, Arie

Abstract

Updating inactive compute instances is disclosed. It is determined that a first compute instance that boots from an operating system image on a first storage device is in an inactive state. It is determined that updates to the operating system image on the first storage device exist. The operating system image is copied from the first storage device to a second storage device. The operating system image on the second storage device is updated with the updates to generate an updated operating system image on the second storage device. The updated operating system image is copied form the second storage device to the first storage device in place of the operating system image.

IPC Classes  ?

  • G06F 8/65 - Updates
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/4401 - Bootstrapping
  • G06F 3/06 - Digital input from, or digital output to, record carriers

8.

Source code test consolidation

      
Application Number 17167732
Grant Number 11474932
Status In Force
Filing Date 2021-02-04
First Publication Date 2021-05-27
Grant Date 2022-10-18
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Ramraz, Oded
  • Shuster, Boaz

Abstract

A method includes identifying a set of tests for a source code, analyzing the set of tests to identify overlapping blocks of the source code that are to be tested by each of the set of tests, merging a subset of the tests that include the overlapping blocks of the source code to create a merged test, and causing the merged test to be executed to test the source code. In an implementation, code coverage results are used when analyzing the set of tests to identify overlapping blocks of the source code.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

9.

Configuration management task derivation

      
Application Number 16939670
Grant Number 11822933
Status In Force
Filing Date 2020-07-27
First Publication Date 2020-11-12
Grant Date 2023-11-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bregman, Arie
  • Idgar, Or

Abstract

Systems and methods are disclosed for derivation of executable tasks for synchronizing configuration parameters. An example method may comprise: obtaining a first set of configuration parameters of a first computer system corresponding to a first time value; obtaining a second set of configuration parameters of the first computer system corresponding to a second time value; performing a comparison between the first set of configuration parameters and the second set of configuration parameters to determine one or more differences; deriving in view of the comparison, one or more executable tasks to convert the first set of configuration parameters to the second set of configuration parameters; and providing, to a second computer system, the one or more executable tasks for execution by the second computer system to synchronize configuration parameters of the second computer system to configuration parameters of the first computer system corresponding to the second time value.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control
  • G06F 9/00 - Arrangements for program control, e.g. control units
  • G06F 9/24 - Loading of the microprogram
  • G06F 9/445 - Program loading or initiating
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/4401 - Bootstrapping
  • G06F 8/60 - Software deployment
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

10.

Dynamic tuning of hypervisor for high-performance virtual machines

      
Application Number 16366771
Grant Number 11429415
Status In Force
Filing Date 2019-03-27
First Publication Date 2020-10-01
Grant Date 2022-08-30
Owner Red Hat Israel, Ltd. (Israel)
Inventor Kaul, Yaniv

Abstract

A method of dynamically tuning a hypervisor includes detecting that a high-performance virtual machine was launched on the hypervisor. The method further includes, in response to the detecting, modifying, by a processing device, a configuration of the hypervisor to increase performance of the high-performance virtual machine on the hypervisor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 1/3234 - Power saving characterised by the action undertaken

11.

Power management using automation engine

      
Application Number 16880614
Grant Number 11435807
Status In Force
Filing Date 2020-05-21
First Publication Date 2020-09-10
Grant Date 2022-09-06
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Golan, Roy
  • Mesika, Eli

Abstract

Proxy-less power management using an automation engine is disclosed. An entity manager executing on a computing device determines that a first entity requires a power management function to be performed against the first entity. The entity manager generates power management execution information that identifies a power device address of a power management device that controls the first entity. An automation engine is initiated on the computing device with the power management execution information to cause the power management function to be performed against the first entity via the power management device based on the power management execution information.

IPC Classes  ?

  • G06F 1/3234 - Power saving characterised by the action undertaken
  • G06F 1/3206 - Monitoring of events, devices or parameters that trigger a change in power modality

12.

Methods and systems for identifying duplicate jobs in a continuous integration environment

      
Application Number 16290170
Grant Number 10872028
Status In Force
Filing Date 2019-03-01
First Publication Date 2020-09-03
Grant Date 2020-12-22
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kuris, Eran
  • Stafeyev, Alexander
  • Bregman, Arie

Abstract

Methods and systems are provided for comparing and identifying job definition files that are hard copies and soft copies of one another. In one embodiment, a method is provided that includes receiving and splitting a first job definition file into a first plurality of stages. The method further comprises comparing the first plurality of stages with a second plurality of stages from a second job definition file. Corresponding stages may be identified and used to determine whether the first and second job definition files are hard or soft copies of one another. If the first and second job definition files are hard copies, one of the job definition files may be deleted from a continuous integration environment. If the first and second job definition files are soft copies, a generic job definition file may be generated based on the first and second job definition files.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

13.

Methods and systems for integrating business intelligence data into continuous integration environments

      
Application Number 16290270
Grant Number 11334823
Status In Force
Filing Date 2019-03-01
First Publication Date 2020-09-03
Grant Date 2022-05-17
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kuris, Eran
  • Stafeyev, Alexander
  • Bregman, Arie

Abstract

A method and system for integrating business intelligence data into a continuous integration system are provided. In one embodiment, a method is provided comprising receiving business intelligence data regarding utilized product features and job data regarding tested product features. The method may further include converting the business intelligence data and the job data into unified business intelligence data and unified job data in a unified format. The method may also include generating a feature map based on the unified business intelligence data and unified job data, determining an insufficient mapping based on the feature map, and identifying a job flag based on the insufficient mapping.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06Q 30/00 - Commerce
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06N 5/04 - Inference or reasoning models
  • G06F 8/60 - Software deployment

14.

Proactive cherry-picking to back-port commits

      
Application Number 16273889
Grant Number 11275659
Status In Force
Filing Date 2019-02-12
First Publication Date 2020-08-13
Grant Date 2022-03-15
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Peterson, Michel

Abstract

A system includes a memory and a processor in communication with the memory. The processor builds a preliminary history list of a plurality of commits including intermediary commits and a target commit, instantiates a target file list of files modified by the target commit, and instantiates an intermediary file list for each intermediary commit. Additionally, the processor classifies each intermediary commit as an intersecting commit or an empty commit. Responsive to classifying a respective intermediary commit as an empty commit, the processor removes the respective intermediary commit from the preliminary history list to create a candidate history list. Responsive to classifying a respective intermediary commit as an intersecting commit, the processor retains the respective intermediary commit in the candidate history list. Additionally, the processor joins the respective intermediary file list with the target file list and creates a finalized history list.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 8/70 - Software maintenance or management
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

15.

Implementing multiple load balancer drivers for a single load balancer

      
Application Number 16272682
Grant Number 11962643
Status In Force
Filing Date 2019-02-11
First Publication Date 2020-08-13
Grant Date 2024-04-16
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Magnezi, Nir
  • Bregman, Arie

Abstract

Implementing multiple load balancer drivers for a single load balancer is disclosed. A first request directed to a load balancer to load balance requests based on a first request selection instruction is received. A first particular load balancer driver is selected from a plurality of load balancer drivers based on a load balancer table that correlates request selection instructions to corresponding load balancer drivers of the plurality of load balancer drivers. Subsequent requests that are encompassed by the first request selection instruction directed to the load balancer are caused to be load balanced by the first particular load balancer driver.

IPC Classes  ?

  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
  • H04L 67/1012 - Server selection for load balancing based on compliance of requirements or conditions with available server resources
  • H04L 67/563 - Data redirection of data network streams
  • H04L 67/63 - Routing a service request depending on the request content or context

16.

Computing resource coverage

      
Application Number 16268988
Grant Number 11366743
Status In Force
Filing Date 2019-02-06
First Publication Date 2020-08-06
Grant Date 2022-06-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bregman, Arie
  • Kuris, Eran
  • Stafeyev, Alexander

Abstract

Computing resource coverage is disclosed. In an example, a computing resource (CR) pool includes a plurality of CR types hosted on a plurality of hosts, where the plurality of CR types are routinely updated. A test repository stores a plurality of test cases (TC). A processor is configured to execute a testing service to compile, from a plurality of test daemons, a CR manifest of the CR types included in the CR pool. A TC manifest is compiled, including CR types tested by the plurality of TCs. The CR types included in the CR manifest are compared with the CR types included in the TC manifest. A test coverage report of tested and untested CR types is generated. A TC is added to the test repository based on the test coverage report.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/54 - Interprogram communication
  • G06F 8/36 - Software reuse

17.

Efficient userspace driver isolation by shallow virtual machines

      
Application Number 16258924
Grant Number 11099874
Status In Force
Filing Date 2019-01-28
First Publication Date 2020-07-30
Grant Date 2021-08-24
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Technology for configuring and executing a shallow virtual machine to enhance memory protection between different portions of user space memory of a particular computing process. An example method may involve: associating a computing process with a virtual machine data structure, wherein the computing process initiates an update to the virtual machine data structure to cause a processor to switch between a page table structures; loading first and second executable code into user space memory of the computing process, wherein a first page table structure comprises mapping data for the first and second executable code and wherein the second executable code comprises driver code of a device; updating the second page table structure to disable execution of the first executable code and to map a portion of the user space memory to the device; and restricting the first executable code from accessing the memory mapped device.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/65 - Updates

18.

Adjusting virtual machine GPU refresh rate to remote desktop stream frame rate

      
Application Number 16843557
Grant Number 10997940
Status In Force
Filing Date 2020-04-08
First Publication Date 2020-07-23
Grant Date 2021-05-04
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Sheriber, Snir
  • Lublin, Uri

Abstract

A method of adjusting a virtual machine GPU refresh rate to match a given remote desktop stream frame rate is described. The GPU refresh rate of a virtual machine in a virtual machine server environment can be adjusted to a value stored either in the virtual machine GPU or a graphics driver of the virtual machine. The value represents a desired refresh rate or desired frame rate and can be determine by a plurality of parameters that characterized a remote desktop client or a hypervisor in the virtual machine server environment based on network conditions and/or other factors. A guest operating system of the virtual machine receives the frame rate information, and adjusts a refresh rate of a virtual machine GPU, which uses the adjusted refresh rate to draw framebuffers to create a portion of a remote desktop image for transmission to the remote desktop client.

IPC Classes  ?

  • G09G 5/00 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead

19.

SPLIT TESTING ASSOCIATED WITH DETECTION OF USER INTERFACE (UI) MODIFICATIONS

      
Application Number 16250344
Status Pending
Filing Date 2019-01-17
First Publication Date 2020-07-23
Owner Red Hat Israel, Ltd. (Israel)
Inventor Bonas, Alissa

Abstract

An example method of providing a notification includes comparing a first code segment stored in a first page with a second code segment stored in a second page, before deployment of the second page in a production environment. The first page may be deployed in the production environment, and the second page may be a different version of the first page. The method also includes detecting a user interface (UI) modification based on comparing the first code segment with the second code segment. The method further includes providing a notification of the UI modification.

IPC Classes  ?

  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06F 8/71 - Version control ; Configuration management
  • G06F 8/60 - Software deployment
  • G06F 8/33 - Intelligent editors

20.

Debugging a network switch by replaying configuration

      
Application Number 16242774
Grant Number 11228492
Status In Force
Filing Date 2019-01-08
First Publication Date 2020-07-09
Grant Date 2022-01-18
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hershberg, Joshua
  • Kolesnik, Michael

Abstract

A network switch may be debugged by creating a virtual instance of the switch. Configuration data of the network switch may be retrieved, the configuration data including lists of the rules and groups configured on the switch. An isolated virtual environment may be created, and a virtual switch may be provisioned on the isolated virtual environment. The virtual switch may be configured with the configuration data of the network switch, including the rules and groups configured thereon. Diagnostic data corresponding to the switch may be obtained from the virtual switch.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture

21.

Network beacon for hypervisor installations

      
Application Number 16807143
Grant Number 11588906
Status In Force
Filing Date 2020-03-02
First Publication Date 2020-06-25
Grant Date 2023-02-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Asayag, Mordechay

Abstract

A system and method for configuring components added to a network is disclosed. The method includes detecting, by a first hypervisor of a first host machine, that a second host machine having a second hypervisor is being added to a cluster of host machines comprising the first host machine, and identifying a plurality of network connections of the first hypervisor, each network connection being associated with one of a plurality of networks connecting hypervisors on host machines in the cluster, each network connection of the first hypervisor having a set of configuration settings. The method also includes generating, for each network connection, a message including a set of configuration settings of a corresponding network connection of the first hypervisor, and transmitting the message on a respective network to a second hypervisor to facilitate configuration of a corresponding network connection of the second hypervisor.

IPC Classes  ?

  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0803 - Configuration setting

22.

Guest-initiated announcement of virtual machine migration

      
Application Number 16797748
Grant Number 11182197
Status In Force
Filing Date 2020-02-21
First Publication Date 2020-06-18
Grant Date 2021-11-23
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Systems and methods for implementing guest-initiated announcement of virtual machine migration. An example method may comprise: receiving, by an origin hypervisor running on an origin computer system, a migration announcement of a virtual machine; copying at least a part of a state of the virtual machine to a destination computer system; and responsive to stopping the virtual machine on the origin computer system, causing a destination hypervisor running on the destination computer system to broadcast the migration announcement over a network associated with the destination computer system.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

23.

Continuous debugging

      
Application Number 16244288
Grant Number 10678677
Status In Force
Filing Date 2019-01-10
First Publication Date 2020-06-09
Grant Date 2020-06-09
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kuris, Eran
  • Stafeyev, Alexander
  • Bregman, Arie

Abstract

Continuous debugging is disclosed. For example, a source code repository stores a first project. A processor is configured to execute a job scheduler, which includes a debugger. The job scheduler receives a request to execute a job, which includes executing a first executable code. A guest is instantiated. The first project is copied as a second project. The second project is compiled into the first executable code. The guest is instructed to execute the job including the first executable code. The debugger intercepts an error caused by executing the first executable code. The debugger updates the second project by inserting a breakpoint into the second project based on the error. The updated second project is compiled into a second executable code. The guest is instructed to re-execute the job including executing the second executable code. Execution of the second executable code is paused at the breakpoint.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 8/41 - Compilation

24.

Multi-level debugger

      
Application Number 16200530
Grant Number 11307964
Status In Force
Filing Date 2018-11-26
First Publication Date 2020-05-28
Grant Date 2022-04-19
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bregman, Arie
  • Sariel, David

Abstract

A task may be executed using a domain specific language (DSL) debugger, the task including one or more modules. A module debugger associated with a module of the one or more modules of the task may be identified. Task debugging data associated with the execution of the task using the DSL debugger may be transmitted to the identified module debugger. Module debugging data may be received from the identified module debugger. Multi-level debugging data including the task debugging data and the received module debugging data may be generated.

IPC Classes  ?

25.

Updating operating system images of inactive compute instances

      
Application Number 16202227
Grant Number 10949111
Status In Force
Filing Date 2018-11-28
First Publication Date 2020-05-28
Grant Date 2021-03-16
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Sariel, David
  • Bregman, Arie

Abstract

Updating inactive compute instances is disclosed. It is determined that a first compute instance that boots from an operating system image on a first storage device is in an inactive state. It is determined that updates to the operating system image on the first storage device exist. The operating system image is copied from the first storage device to a second storage device. The operating system image on the second storage device is updated with the updates to generate an updated operating system image on the second storage device. The updated operating system image is copied form the second storage device to the first storage device in place of the operating system image.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 8/65 - Updates
  • G06F 9/4401 - Bootstrapping
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

26.

Securing virtual machines in computer systems

      
Application Number 16203060
Grant Number 11237859
Status In Force
Filing Date 2018-11-28
First Publication Date 2020-05-28
Grant Date 2022-02-01
Owner RED HAT ISRAEL LTD. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Aspects of the disclosure provide for mechanisms for securing virtual machines in a computer system. A method of the disclosure includes: receiving a first resource request initiated by an application running on a virtual machine during initialization of the application; allocating, by a hypervisor, a resource to the application in view of the first resource; and in response to receiving a message indicating completion of the initialization of the application, blocking, by the hypervisor, at least one hypercall initiated by the virtual machine. The completion of the initialization of the application may correspond to initiation of execution of the application using the allocated resource.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

27.

Adjusting virtual machine GPU refresh rate to remote desktop stream frame rate

      
Application Number 16162196
Grant Number 10643569
Status In Force
Filing Date 2018-10-16
First Publication Date 2020-04-16
Grant Date 2020-05-05
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Sheriber, Snir
  • Lublin, Uri

Abstract

A method of adjusting a virtual machine GPU refresh rate to match a given remote desktop stream frame rate is described. The GPU refresh rate of a virtual machine in a virtual machine server environment can be adjusted to a value stored either in the virtual machine GPU or a graphics driver of the virtual machine. The value represents a desired refresh rate or desired frame rate and can be determine by a plurality of parameters that characterized a remote desktop client or a hypervisor in the virtual machine server environment based on network conditions and/or other factors. A guest operating system of the virtual machine receives the frame rate information, and adjusts a refresh rate of a virtual machine GPU, which uses the adjusted refresh rate to draw framebuffers to create a portion of a remote desktop image for transmission to the remote desktop client.

IPC Classes  ?

  • G09G 5/00 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead

28.

Managing virtualized computing resources in a cloud computing environment

      
Application Number 16136375
Grant Number 10949232
Status In Force
Filing Date 2018-09-20
First Publication Date 2020-03-26
Grant Date 2021-03-16
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Bregman, Arie
  • Magnezi, Nir

Abstract

Virtualized computing resources can be managed in a cloud computing environment. For example, a system can receive input indicating that a cloud computing environment is to be reverted back to a prior state prior to an event occurring. Based on the input, the system can determine actions that were performed in the cloud computing environment in response to the event. Each action can involve a creation, a modification, or a deletion of a virtualized computing resource in the cloud computing environment. The system can determine a particular order in which the actions were performed by analyzing timestamps corresponding to the actions. The system can then revert the cloud computing environment back to the prior state by performing an inverse of each action in the plurality of actions in a reverse order to the particular order.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

29.

Efficient virtual machine memory monitoring with hyper-threading

      
Application Number 16686852
Grant Number 11243800
Status In Force
Filing Date 2019-11-18
First Publication Date 2020-03-12
Grant Date 2022-02-08
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

A system and method for efficient virtual machine memory monitoring with hyper-threading includes executing, by a hypervisor executing on a plurality of physical processors, a virtual central processor unit (VCPU) of a virtual machine on a first hyper-thread. The plurality of physical processors include a first physical processor having the first hyper-thread and a second hyper-thread. The virtual machine executes on the first hyper-thread. Then, the second hyper-thread executes a memory monitoring instruction on a designated range of a shared memory to cause the second hyper-thread to stop executing. Then, a guest in the virtual machine updates the designated range of the shared memory by storing a first request in the designated range of the shared memory to wake up the second hyper-thread.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/30 - Monitoring
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

30.

Moving outdated data from a multi-volume virtual disk to a backup storage device

      
Application Number 16115903
Grant Number 10846011
Status In Force
Filing Date 2018-08-29
First Publication Date 2020-03-05
Grant Date 2020-11-24
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Lipchuk, Maor
  • Hadas, Arik

Abstract

A method includes identifying, by a host computing device hosting a virtual machine, a plurality of disk volumes of a virtual disk stored on a first storage device, wherein the disk volumes are arranged in a hierarchical order. The method further includes determining, by the host computing device, a block that is present in a first disk volume and a second disk volume of the plurality of disk volumes, wherein the second disk volume is at a higher level in the hierarchical order than the first disk volume. The method also includes copying, by the host computing device, data from the block stored on the first storage device to a backup disk volume residing on a second storage device and removing the block on the first storage device.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

31.

Dynamically revising an in-process build

      
Application Number 16111296
Grant Number 10769055
Status In Force
Filing Date 2018-08-24
First Publication Date 2020-02-27
Grant Date 2020-09-08
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bregman, Arie
  • Magnezi, Nir

Abstract

Dynamically revising an in-process build is disclosed. A build system receives a build configuration comprising information that defines a plurality of successive stages. Each stage includes at least one step, and one or more of the stages include a plurality of successive steps. The build configuration defines a build process that, when completed, alters a state of a storage device. The build system initiates a build process sequence on the build configuration. The build system, after initiating the build process sequence, receives notification of a desire to add a revision to a particular stage of the plurality of stages defined in the build configuration. A determination is made that performance of the particular stage has or has not begun. In response to the determination, a subsequent build process action is performed.

IPC Classes  ?

32.

Secret keys management in a virtualized data-center

      
Application Number 16601397
Grant Number 10999266
Status In Force
Filing Date 2019-10-14
First Publication Date 2020-02-06
Grant Date 2021-05-04
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Erez, Daniel
  • Soffer, Nir

Abstract

Implementations of the disclosure provide for secret keys management in a virtualized data-center. In one implementation, a system is provided. The system comprises a memory to store secret key data and a processing device coupled to the memory. The processing device is to identify authentication information provided by a user, the authentication information comprising access information associated with a data storage domain, receive a secret key to access the data storage domain in view of the authentication information, wherein the secret key comprises a universally unique identifier (UUID), and register the secret key, wherein to register the secret key, the processing device to store a data structure in volatile memory indicating an association between the UUID of the secret key and the hypervisor.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

33.

Asynchronous mapping of hot-plugged device associated with virtual machine

      
Application Number 16653222
Grant Number 11036666
Status In Force
Filing Date 2019-10-15
First Publication Date 2020-02-06
Grant Date 2021-06-15
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Williamson, Alex
  • Tsirkin, Michael

Abstract

Systems and methods for asynchronous mapping of a hot-plugged I/O device associated with a virtual machine. An example method comprises: executing, by a host computer system, a virtual machine managed by a hypervisor, wherein the virtual machine is associated with a hot-pluggable input/output (I/O) device; responsive to detecting removal of the I/O device, unpin a memory buffer associated with the I/O device; and responsive to receiving a signal indicating completion of unpinning the memory buffer, release the I/O device from the hypervisor.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 13/40 - Bus structure
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

34.

Automated restart of paused virtual machines due to input/output errors

      
Application Number 16045583
Grant Number 11243855
Status In Force
Filing Date 2018-07-25
First Publication Date 2020-01-30
Grant Date 2022-02-08
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hadas, Arik
  • Lipchuk, Maor

Abstract

An apparatus includes a storage device of a host computing device. The storage device is to store a virtualization manager. The apparatus also includes a processing device of the host computing device and operatively coupled to the storage device. The processing device is to determine that a first instance of a virtual machine on a first host computing device is paused based on an error associated with a connection to a storage device of the first host computing device, determine whether the second host computing device has access to the storage device of the first host computing device, instantiate a second instance of the virtual machine on the second host computing device when the second host computing device is determined to have access to the storage device of the first host computing device, and to stop the first instance of the virtual machine on the first host computing device.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

35.

Supporting quality-of-service for virtual machines based on operational events

      
Application Number 16588727
Grant Number 11714668
Status In Force
Filing Date 2019-09-30
First Publication Date 2020-01-30
Grant Date 2023-08-01
Owner Red Hat Israel, Ltd. (Israel)
Inventor Kaul, Yaniv

Abstract

An implementation of the disclosure provides identifying an amount of a resource associated with a virtual machine (VM) hosted by a first host machine of a plurality of host machines that are coupled to and are managed by a host controller, wherein a part of a quality manager is executed at the first host machine and another part of the quality manager is executed in the host controller. A requirement of an additional amount of resource by the VM is determined in view of an occurrence of an event associated with the VM. The VM may be migrated to a second host machine of the plurality of host machines for a duration of the event in view of the additional amount of the resource.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

36.

Priority switching based on resource usage patterns

      
Application Number 16041299
Grant Number 10601905
Status In Force
Filing Date 2018-07-20
First Publication Date 2020-01-23
Grant Date 2020-03-24
Owner Red Hat Israel, LTD. (Israel)
Inventor
  • Bregman, Arie
  • Sariel, David

Abstract

A processing device in a system can allocate builds to execute jobs across servers in a distributed server environment such as a continuous integration (CI) or continuous deployment (CD) server environment, determine workload patterns, and store a workload pattern vector including a resource usage pattern for the builds and the servers. The processing device can provide an interface that allows a user to switch priorities of user-owned builds in server environments, even after execution of the jobs has begun. The user's ability to prioritize or reprioritize builds is limited to user-prioritizable builds as determined based on the resource usage patterns of the builds running the jobs. The user can thus prioritize some user-owned builds without adversely affecting builds of other users.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

37.

Log record analysis based on reverse engineering of log record formats

      
Application Number 16036333
Grant Number 11042464
Status In Force
Filing Date 2018-07-16
First Publication Date 2020-01-16
Grant Date 2021-06-22
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Asayag, Mordechay

Abstract

Log record analysis based on reverse engineering of log record formats is disclosed. A computing device receives log record template data associated with a log record template comprising a plurality of field identifiers for a log record. The log record template data is analyzed to identify the plurality of field identifiers. Based on the log record template data and the plurality of field identifiers, a log record analysis function is automatically generated that is configured to receive a log record that was generated based on the log record template, extract a plurality of log data items from the log record, each log data item corresponding to one of the plurality of field identifiers, and output information that identifies the plurality of field identifiers and the plurality of log data items.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 40/186 - Templates
  • G06F 40/211 - Syntactic parsing, e.g. based on context-free grammar [CFG] or unification grammars

38.

Hot-plugging of virtual functions in a virtualized environment

      
Application Number 16579519
Grant Number 11061712
Status In Force
Filing Date 2019-09-23
First Publication Date 2020-01-16
Grant Date 2021-07-13
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kaplan, Alona
  • Kolesnik, Michael

Abstract

Implementations of the disclosure provide for hot-plugging of virtual functions in a virtualized environment. In one implementation, a computer system determines that virtual functions associated with a logical network for a virtual machine hosted on a first host system are unavailable on the first host system, identifies a logical network device on a second host system that is communicably accessible from the first host system, and determines that the logical network device on the second host system has a number of available virtual functions associated with the logical network. The computer system then migrates the virtual machine from the first host computer system to the second host computer system to allow the virtual machine to access the number of available virtual functions associated with the logical network on the second host system and associates a virtual device of the virtual machine with the number of available virtual functions.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

39.

Snapshot simulation of service module responses

      
Application Number 16026416
Grant Number 11816022
Status In Force
Filing Date 2018-07-03
First Publication Date 2020-01-09
Grant Date 2023-11-14
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Shuster, Boaz
  • Ramraz, Oded

Abstract

Methods, systems, and computer program products are provided to identify a set of functions within a first service module that calls a second service module. Both the first service module and the second service module are associated with an application that is structure with a plurality of interworking service modules. The first service module is executed to send requests to the second service module when the set of functions is called. The responses to the requests are captured, and stored in a snapshot data structure. A modified first service module is created, in which the set of functions are modified to return a response from the snapshot data structure in place of the second service module. A unit test is performed on the modified first service module.

IPC Classes  ?

  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06N 20/00 - Machine learning
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures

40.

Reproduction of testing scenarios in a continuous integration environment

      
Application Number 16557629
Grant Number 10877871
Status In Force
Filing Date 2019-08-30
First Publication Date 2019-12-19
Grant Date 2020-12-29
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Ramraz, Oded
  • Shuster, Boaz

Abstract

An example method of reproducing a test case in a continuous integration environment includes detecting a test failure in a continuous integration environment. The continuous integration environment includes a plurality of stages for running a test on an application. The method also includes in response to detecting the failure, generating a snapshot while the test is running. The snapshot specifies a stage of the plurality of stages and a state of the application at which the failure occurred. The method further includes uploading the snapshot to a repository. At a later point in time, the snapshot may be restored to a computing device.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

41.

Cloud software defined networking application programming interface converter

      
Application Number 15994317
Grant Number 11038765
Status In Force
Filing Date 2018-05-31
First Publication Date 2019-12-05
Grant Date 2021-06-15
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Kaplan, Alona

Abstract

A method includes identifying a cloud and virtualization management system application programming interface (API), and identifying a software defined networking (SDN) API. The method further includes determining, by a processing device, one or more resources, relationships, or fields corresponding to the cloud and virtualization management system API and the SDN API. The method further includes generating, by the processing device, a skeleton model representing mappings between the one or more resources, relationships, or fields corresponding to the cloud and virtualization management system API and the SDN API. The method further includes and providing the skeleton model to a client device for display.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 9/54 - Interprogram communication
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing

42.

Code coverage module with testing function identifier

      
Application Number 15982418
Grant Number 10613969
Status In Force
Filing Date 2018-05-17
First Publication Date 2019-11-21
Grant Date 2020-04-07
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Zacks, Simcha Dov
  • Shtein, Semion

Abstract

Methods, systems, and computer program products are provided to identify a testing function corresponding to a tested function and associate the identity of the testing function with identifiers of one or more lines of source code corresponding to the tested function. A testing function is queued for execution in an execution stack. The testing function calls a function corresponding to one or more lines of a source code, wherein the source code includes instrumentation code corresponds to the function, and wherein the function is queued for execution in the execution stack by the call. The function is executed, and identifiers are retrieved during the execution. The retrieved identifiers correspond to the testing function and to the one or more lines of source code. The identifier corresponding to the testing function is retrieved from the execution stack, and the identifiers corresponding to the one or more lines of source code are retrieved by a code coverage module from one or more hooks corresponding to the instrumentation code. Based on the retrieving during the execution, the identifier of the testing function is associated with the identifiers of the one or more lines of source code. The identifier of the testing function and the identifiers of the one or more lines of source code are stored in a data structure.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

43.

Dynamic network connectivity verification in distributed virtual environments

      
Application Number 15955577
Grant Number 11182187
Status In Force
Filing Date 2018-04-17
First Publication Date 2019-10-17
Grant Date 2021-11-23
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Haas, Edward
  • Kaplan, Alona

Abstract

An apparatus includes a memory of a host computing device. The memory is to store at least one hypervisor. The apparatus also includes a processing device of the host computing device and operatively coupled to the memory. The processing device is to receive a request to connect the hypervisor to a virtual network, and to determine whether the hypervisor is connectable to the virtual network utilizing at least one connectivity check service. The at least one connectivity check service indicates whether one or more connectivity requirements are satisfied. The processing device is to further connect the hypervisor to the virtual network when the one or more connectivity requirements are indicated as being satisfied, and to perform a periodic connectivity check of the connection between the hypervisor and the virtual network.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration

44.

Intelligent garbage collector for containers

      
Application Number 15949817
Grant Number 11132293
Status In Force
Filing Date 2018-04-10
First Publication Date 2019-10-10
Grant Date 2021-09-28
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Shuster, Boaz
  • Ramraz, Oded

Abstract

Methods, systems, and computer program products are included for the intelligent garbage collection of containers. An example method includes providing a garbage collection data structure, the garbage collection data structure including metadata and one or more resource consumption parameters corresponding to the container. The one or more resource consumption parameters are analyzed by a machine-learning function. Based on the analyzing, the container is classified into one or more classes, the one or more classes including at least one of a suspicious container class, a malicious container class, or a normal container class. Based on the classifying, one or more garbage collection actions are performed on the container, including at least one of generating an alert corresponding to the container or reducing the resource consumption of the container.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 12/02 - Addressing or allocation; Relocation
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

45.

Incorporating version control into packaging

      
Application Number 15922533
Grant Number 11003439
Status In Force
Filing Date 2018-03-15
First Publication Date 2019-09-19
Grant Date 2021-05-11
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Bregman, Arie
  • Sariel, David

Abstract

Methods, systems, and computer program products are included for incorporating functionalities of a version control system into a package manager. An example method includes providing to a package manager a source file path corresponding to a source. A software version control system corresponding to the source is determined from the source file path. A command translation driver corresponding to the software version control system of the source is loaded by the package manager. The loaded command translation driver translates a package manager command to a corresponding command of the software version control system. The translated package manager command is executed by the package manager.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/71 - Version control ; Configuration management
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

46.

Reproduction of testing scenarios in a continuous integration environment

      
Application Number 15920143
Grant Number 10402302
Status In Force
Filing Date 2018-03-13
First Publication Date 2019-09-03
Grant Date 2019-09-03
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Ramraz, Oded
  • Shuster, Boaz

Abstract

An example method of reproducing a test case in a continuous integration environment includes detecting a test failure in a continuous integration environment. The continuous integration environment includes a plurality of stages for running a test on an application. The method also includes in response to detecting the failure, generating a snapshot while the test is running. The snapshot specifies a stage of the plurality of stages and a state of the application at which the failure occurred. The method further includes uploading the snapshot to a repository. At a later point in time, the snapshot may be restored to a computing device.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

47.

Announcing virtual machine migration

      
Application Number 16409434
Grant Number 10754681
Status In Force
Filing Date 2019-05-10
First Publication Date 2019-08-29
Grant Date 2020-08-25
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

Systems and methods for announcing virtual machine migration. An example method may comprise: receiving, by a first hypervisor running on a first computer system, a migration announcement from a virtual machine that is undergoing live migration from the first computer system to a second computer system; and transmitting a message comprising the migration announcement to a second hypervisor running on the second computer system.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

48.

File format prediction based on relative frequency of a character in the file

      
Application Number 15901507
Grant Number 11195115
Status In Force
Filing Date 2018-02-21
First Publication Date 2019-08-22
Grant Date 2021-12-07
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor Shuster, Boaz

Abstract

A method of predicting a format of a file includes calculating a quotient vector storing a list of values in slots. Each slot of the quotient vector and binary vector correspond to a character of a set of distinct characters based on an order. Each value in the quotient vector indicates a frequency with which the corresponding distinct character is found relative to the set of distinct characters found in a file. The method also includes calculating, based on comparing each value in the quotient vector to a threshold, a binary vector storing a list of values in slots. The method further includes predicting, based on the binary vector, a format of the file.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06F 17/16 - Matrix or vector computation
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

49.

Execution of a script based on properties of a virtual device associated with a virtual machine

      
Application Number 16387328
Grant Number 10871980
Status In Force
Filing Date 2019-04-17
First Publication Date 2019-08-08
Grant Date 2020-12-22
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Muller, Assaf
  • Kenigsberg, Dan

Abstract

An occurrence of an event associated with a computing device is identified. A script associated with the identified event is identified. A property of a component that is associated with the computing device is received, wherein the property includes an operating status of the component associated with the computing device. The script is executed for the computing device in view of the operating status of the component.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/30 - Monitoring
  • G06F 9/54 - Interprogram communication
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 16/10 - File systems; File servers
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/188 - Virtual file systems

50.

Memory deduplication based on guest page hints

      
Application Number 16383899
Grant Number 11429416
Status In Force
Filing Date 2019-04-15
First Publication Date 2019-08-08
Grant Date 2022-08-30
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Tsirkin, Michael
  • Lublin, Uri

Abstract

Methods, systems, and computer program products are included for de-duplicating one or more memory pages. A method includes receiving, by a hypervisor, a list of read-only memory page hints from a guest running on a virtual machine. The list of read-only memory page hints specifies a first memory page marked as writeable. The method also includes determining whether the first memory page matches a second memory page. In response to a determination that the first memory page matches the second memory page, the hypervisor may deduplicate the first and second memory pages.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H03M 7/30 - Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction

51.

Application memory protection using an extended page table switching virtual machine function

      
Application Number 16371972
Grant Number 10664304
Status In Force
Filing Date 2019-04-01
First Publication Date 2019-07-25
Grant Date 2020-05-26
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

A hypervisor generates first and second page views, where a guest physical address points to a first page of the first page view and a second page of the second page view. A first pointer value is written to the first page and a second pointer value is written to the second page. A guest operating system executes a first task and if a determination to switch to the second task is made, the guest operating system reads a current pointer value and determines what the current page view is. If the guest operating system determines that the current page view is the first page view, the guest operating system saves the first pointer value in a first memory of the first task, loads the second pointer value from a second memory of the second task, and executes a virtual machine function to switch to the second page view.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

52.

Configuration management task derivation

      
Application Number 15875468
Grant Number 10725793
Status In Force
Filing Date 2018-01-19
First Publication Date 2019-07-25
Grant Date 2020-07-28
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bregman, Arie
  • Idgar, Or

Abstract

Systems and methods are disclosed for derivation of executable tasks for synchronizing configuration parameters. An example method may comprise: obtaining a first set of configuration parameters of a first computer system corresponding to a first time value; obtaining a second set of configuration parameters of the first computer system corresponding to a second time value; performing a comparison between the first set of configuration parameters and the second set of configuration parameters to determine one or more differences; deriving in view of the comparison, one or more executable tasks to convert the first set of configuration parameters to the second set of configuration parameters; and providing, to a second computer system, the one or more executable tasks for execution by the second computer system to synchronize configuration parameters of the second computer system to configuration parameters of the first computer system corresponding to the second time value.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control
  • G06F 9/00 - Arrangements for program control, e.g. control units
  • G06F 9/24 - Loading of the microprogram
  • G06F 9/445 - Program loading or initiating
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/4401 - Bootstrapping
  • G06F 8/60 - Software deployment
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

53.

Recovery from a networking backend disconnect

      
Application Number 16369306
Grant Number 10735286
Status In Force
Filing Date 2019-03-29
First Publication Date 2019-07-25
Grant Date 2020-08-04
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Kaplansky, Victor

Abstract

Methods, systems, and computer program products are included for processing one or more buffers in a networking queue. An example method includes receiving one or more transmit requests or receive requests from a guest running on a virtual machine. The method also includes detecting that a networking backend has stopped processing buffers from a networking queue, each queued buffer corresponding to a transmit request or receive request. The method further includes in response to detecting that the networking backend has stopped processing buffers from the networking queue, flushing one or more buffers stored in the networking queue. A buffer corresponding to a receive request may be flushed by storing a set of dummy packets into the buffer. In contrast, a buffer corresponding to a transmit request may be flushed by discarding the buffer.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/24 - Arrangements for maintenance or administration

54.

Virtual machine memory migration by storage

      
Application Number 16362158
Grant Number 11494213
Status In Force
Filing Date 2019-03-22
First Publication Date 2019-07-18
Grant Date 2022-11-08
Owner Red Hat Israel, Ltd (Israel)
Inventor Tsirkin, Michael

Abstract

Systems and methods for virtual machine memory migration by storage are provided. A method includes receiving a request to migrate a virtual machine from a source host to a destination host. The method further includes mapping, by the source host, a memory of the virtual machine to a storage device accessible over a network by the source host and by the destination host. The method further includes caching, by the source host, a portion of a state of the virtual machine. The method further includes issuing a synchronization command to synchronize the portion of the state of the virtual machine with the storage device. Responsive to determining that a time period to complete the synchronization command is below a threshold time period, the method further includes stopping the virtual machine on the source host. The method further includes starting the virtual machine on the destination host.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

55.

Migrating a virtual machine in response to identifying an unsupported virtual hardware component

      
Application Number 16363885
Grant Number 10942761
Status In Force
Filing Date 2019-03-25
First Publication Date 2019-07-18
Grant Date 2021-03-09
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Asayag, Mordechay
  • Kolesnik, Michael

Abstract

A request to provide a virtual machine with a virtual hardware component may be received. A network that the virtual hardware component is configured to operate on may be identified. A determination may be made as to whether a hypervisor supports or does not support the network that the virtual hardware component is configured to operate on. In response to determining that the hypervisor does not support the network that the virtual hardware component is configured to operate on, the virtual machine with the virtual hardware component may be provided to a second hypervisor that supports the network.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

56.

Client live migration for a virtual machine

      
Application Number 16368374
Grant Number 10884792
Status In Force
Filing Date 2019-03-28
First Publication Date 2019-07-18
Grant Date 2021-01-05
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Lublin, Uri
  • Luxenberg, Roni

Abstract

A request may be received from a second client device to connect to a running virtual machine instance of a virtual machine while a first client device is connected to the running virtual machine instance. The second client device may be connected to the running virtual machine instance in response to receiving the request from the second client device. Furthermore, a connection between the first client device and the running virtual machine instance of the virtual machine may be converted from a primary mode to a secondary mode.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

57.

Client live migration for a virtual machine

      
Application Number 16368388
Grant Number 10789096
Status In Force
Filing Date 2019-03-28
First Publication Date 2019-07-18
Grant Date 2020-09-29
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Lublin, Uri
  • Luxenberg, Roni

Abstract

A second client device may be connected to a running virtual machine instance of a virtual machine while a first client device is connected to the running virtual machine instance. A first input data may be received from the first client device and a second input data may be received from the second client device. A determination may be made as to whether the second input data includes a great number of commands than the first input data in the time period. An output data associated with the running virtual machine instance may be generated by using the second input data in response determining that the second input data includes a greater number of commands than the first input data in the time period.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

58.

Power management using automation engine

      
Application Number 15868257
Grant Number 10671143
Status In Force
Filing Date 2018-01-11
First Publication Date 2019-07-11
Grant Date 2020-06-02
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Golan, Roy
  • Mesika, Eli

Abstract

Proxy-less power management using an automation engine is disclosed. An entity manager executing on a computing device determines that a first entity requires a power management function to be performed against the first entity. The entity manager generates power management execution information that identifies a power device address of a power management device that controls the first entity. An automation engine is initiated on the computing device with the power management execution information to cause the power management function to be performed against the first entity via the power management device based on the power management execution information.

IPC Classes  ?

  • G06F 1/00 - ELECTRIC DIGITAL DATA PROCESSING - Details not covered by groups and
  • G06F 1/3234 - Power saving characterised by the action undertaken
  • G06F 1/3206 - Monitoring of events, devices or parameters that trigger a change in power modality

59.

Extending the base address register by modifying the number of read-only bits associated with a device to be presented to a guest operating system

      
Application Number 16284921
Grant Number 10877793
Status In Force
Filing Date 2019-02-25
First Publication Date 2019-06-20
Grant Date 2020-12-29
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael S.
  • Bonzini, Paolo

Abstract

A hypervisor associates a combined register space with a virtual device to be presented to a guest operating system of a virtual machine, the combined register space comprising a default register space and an additional register space. Responsive to detecting an access of the additional register space by the guest operating system of the virtual machine, the hypervisor performs an operation on behalf of the virtual machine, the operation pertaining to the access of the additional register space.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

60.

Deployment state based configuration generation

      
Application Number 15844056
Grant Number 11303508
Status In Force
Filing Date 2017-12-15
First Publication Date 2019-06-20
Grant Date 2022-04-12
Owner Red Hat Israel, LTD. (Israel)
Inventor
  • Bregman, Arie
  • Idgar, Or

Abstract

Deployment state based configuration generation is disclosed. For example, a first node is in a first deployment state, with a state daemon executing on the first node. A configuration generator may be associated with one or more processors. The state daemon records a first configuration instruction associated with a first modification to the first deployment state, where the first node is in a second deployment state after the first modification. The configuration generator generates a first configuration based on the second deployment state including the first configuration instruction. The first configuration is stored to a configuration repository, where the first configuration is deployed to a second node converting the second node to the second deployment state.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 8/61 - Installation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/0803 - Configuration setting
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

61.

Gradual creation process of server virtual machines

      
Application Number 15845249
Grant Number 10417034
Status In Force
Filing Date 2017-12-18
First Publication Date 2019-06-20
Grant Date 2019-09-17
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hadas, Arik
  • Lipchuk, Maor

Abstract

An example method for the gradual creation process of server virtual machines includes a virtualization manager locking a virtual machine template, saving a configuration of a virtual machine, locking the virtual machine, and directing a worker host to create a volume. The worker host creates the volume, and the virtualization manager unlocks the virtual machine. A destination host executes the virtual machine, and the worker host merges the volume with a disk of the virtual machine template.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

62.

Hot plugging of virtual bridges in a virtual PCI system

      
Application Number 15840869
Grant Number 10467173
Status In Force
Filing Date 2017-12-13
First Publication Date 2019-06-13
Grant Date 2019-11-05
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hammer, Gal
  • Apfelbaum, Marcel

Abstract

Some examples can enable virtual bridges to be hot plugged into a virtual Peripheral Component Interconnect (vPCI) system. For example, a number of subordinate buses that are connected to a vPCI bridge in the vPCI system can be determined. The vPCI system can be for a virtual machine. A parameter value can then be generated by adding an integer to the number of subordinate buses that are connected to the vPCI bridge. The integer can be a predefined number of additional subordinate buses to enable to be connected to the vPCI bridge. The parameter value can then be assigned to the vPCI bridge. This may enable additional virtual bridges to be hot plugged into the vPCI system at a later time. For example, a new virtual bridge can be added to the vPCI system using the parameter value for the vPCI bridge.

IPC Classes  ?

  • G06F 13/40 - Bus structure
  • G06F 13/42 - Bus transfer protocol, e.g. handshake; Synchronisation
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

63.

Fast evacuation of a cloned disk to a storage device

      
Application Number 15828703
Grant Number 10324653
Status In Force
Filing Date 2017-12-01
First Publication Date 2019-06-06
Grant Date 2019-06-18
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hadas, Arik
  • Lipchuk, Maor

Abstract

A method for fast evacuation of a cloned disk to a storage device includes a source storage device generating a first write volume, where new written data is stored in the first write volume. A destination storage device generates a second write volume, where the new written data is also stored. The destination storage device generates a delta volume in a cloned disk, which is also located in the destination storage device. Differences between a template volume and a modified template volume are stored to the delta volume. The destination storage device merges the template volume and the delta volume, creating a second modified template volume.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

64.

Fan network management

      
Application Number 16261052
Grant Number 11265285
Status In Force
Filing Date 2019-01-29
First Publication Date 2019-05-23
Grant Date 2022-03-01
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

A method performed by a physical computing system includes, with a first virtual entity manager of a first host machine, detecting an Address Resolution Protocol (ARP) request from a first virtual entity supported by the first virtual entity manager to a second virtual entity having a first logical address within a fan network. The method further includes, with the first virtual entity manager, translating the first logical address to a second logical address and transmitting the ARP request to a second host machine using a physical address resolved from the second logical address, the second host machine supporting the second virtual entity. The method further includes receiving a response to the ARP request, the response including a virtualized physical address of the second virtual entity. The method further includes with the first virtual entity manager, forwarding a data packet from the first virtual entity to the virtualized physical address.

IPC Classes  ?

  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
  • H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 101/622 - Layer-2 addresses, e.g. medium access control [MAC] addresses
  • H04L 61/58 - Caching of addresses or names

65.

Virtual machine memory lock-down

      
Application Number 16238064
Grant Number 10552345
Status In Force
Filing Date 2019-01-02
First Publication Date 2019-05-23
Grant Date 2020-02-04
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

A hypervisor receives, from a guest virtual machine, a request to disable access to a memory range. The hypervisor disables access to the memory range. The hypervisor detects a prohibited access attempt. The prohibited access attempt is an access attempt to the memory range. Responsive to detecting the prohibited access attempt, the hypervisor stops the guest virtual machine. The hypervisor receives a request to reboot the guest virtual machine. The hypervisor reboots the guest virtual machine. Responsive to rebooting the guest virtual machine, the hypervisor enables access to the memory range.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

66.

Lazy timer programming for virtual machines

      
Application Number 16244988
Grant Number 10671425
Status In Force
Filing Date 2019-01-10
First Publication Date 2019-05-16
Grant Date 2020-06-02
Owner Red Hat Israel, LTD. (Israel)
Inventor Tsirkin, Michael

Abstract

A system and method for programming a timer in a virtualized system are disclosed. In accordance with one embodiment, a virtual machine executed by a processing device detects a need to request an interrupt at a first time and reads, from the first memory location, a second time that is associated with a next interrupt of the physical host machine scheduled by a hypervisor executed by the processing device. The virtual machine determines whether the first time is less than the second time. Responsive to the first time being less than the second time, the virtual machine transfers execution control to the hypervisor. Responsive to the first time not being less than the second time, the virtual machine stores the first time in a second memory location that is writeable by the virtual machine.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 1/24 - Resetting means
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

67.

Provisioning composite applications using secure parameter access

      
Application Number 16237227
Grant Number 11416220
Status In Force
Filing Date 2018-12-31
First Publication Date 2019-05-09
Grant Date 2022-08-16
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Levy, Ohad Shaul Anaf
  • Benari, Amos

Abstract

A mechanism for provisioning a composite web application using secure parameter transfer is disclosed. The composite web application includes a component that resides on a virtual machine (VM). A request is received from the component for a configuration parameter that is to enable periodic reconfiguration of the VM. An access condition is identified for accessing the configuration parameter and responsive to determining the access condition is satisfied, the requested configuration parameter is provided to the component. The VM is reconfigured using the requested configuration parameter.

IPC Classes  ?

  • G06F 8/30 - Creation or generation of source code
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 8/60 - Software deployment
  • G06F 9/445 - Program loading or initiating
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

68.

Base state for thin-provisioned volumes

      
Application Number 15801465
Grant Number 10628200
Status In Force
Filing Date 2017-11-02
First Publication Date 2019-05-02
Grant Date 2020-04-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hadas, Arik
  • Lipchuk, Maor

Abstract

In an example, a method includes copying a base state of a virtual machine from a source volume to a destination volume, the destination volume having a physical capacity and a virtual capacity, the virtual capacity being larger than the physical capacity, and including a plurality of storage blocks. The method further includes, in response to an instruction to write data to the destination volume, writing the data to at least a first storage block in the plurality of storage blocks and setting a primary flag included in metadata stored on the destination volume from a first state to a second state, where the primary flag is associated with the first storage block. The method further includes subsequently reading a state of the primary flag to determine that data in the first storage block no longer form part of the base state of the virtual machine.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 5/14 - Means for monitoring the fill level; Means for resolving contention, i.e. conflicts between simultaneous enqueue and dequeue operations for overflow or underflow handling, e.g. full or empty flags

69.

Avoiding errors while directly communicatively coupling a virtual machine to a host system

      
Application Number 16201545
Grant Number 11231950
Status In Force
Filing Date 2018-11-27
First Publication Date 2019-04-11
Grant Date 2022-01-25
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kaplan, Alona
  • Kolesnik, Michael

Abstract

A mechanism for managing virtual machines in a virtualization system is disclosed. A method of implementation of the disclosure includes a virtual manager determining that there is a requirement to provide direct communicative coupling between a virtual machine executed by a first host system and one of a plurality of host systems. A second host system from the plurality of host systems is selected responsive to configuration information for the second host system at least partially matching configuration information for the first host system and a network entity associated with the second host system being free of network traffic for a threshold period of time. The virtualization manager provides direct communicative coupling between the second host system and the virtual machine via the network entity.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

70.

Manageable external wake of virtual machines

      
Application Number 16193442
Grant Number 11249782
Status In Force
Filing Date 2018-11-16
First Publication Date 2019-03-21
Grant Date 2022-02-15
Owner Red Hat Israel Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Laor, Dor

Abstract

Implementations of the disclosure describe manageable external wake of virtual machines. In one implementation, a method of the disclosure includes receiving, by a processor of a computer system, a message generated by a hardware device of the computer system while a virtual machine that is hosted by the computer system is asleep. The method further includes determining, by the processor, whether to wake the virtual machine in view of a hardware event of the hardware device that generated the message.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

71.

Discovering and mitigating out-of-sync network parameters

      
Application Number 16191186
Grant Number 10805156
Status In Force
Filing Date 2018-11-14
First Publication Date 2019-03-14
Grant Date 2020-10-13
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Kaplan, Alona
  • Kolesnik, Michael

Abstract

A system and method of discovering and mitigating out-of-sync network parameters. The method may include receiving, via a graphical user interface (GUI), a confirmation of validity of a value for a parameter of a set of parameters of a logical network associated with a host computing system. The method may also include setting, by a processing device, a validity attribute of the logical network responsive to ascertaining validity of remaining parameters of the set of parameters.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks

72.

Guest-initiated announcement of virtual machine migration

      
Application Number 15687865
Grant Number 10572289
Status In Force
Filing Date 2017-08-28
First Publication Date 2019-02-28
Grant Date 2020-02-25
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Systems and methods for implementing guest-initiated announcement of virtual machine migration. An example method may comprise: receiving, by an origin hypervisor running on an origin computer system, a migration announcement of a virtual machine; copying at least a part of a state of the virtual machine to a destination computer system; and responsive to stopping the virtual machine on the origin computer system, causing a destination hypervisor running on the destination computer system to broadcast the migration announcement over a network associated with the destination computer system.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

73.

Network notification loss detection for virtual machine migration

      
Application Number 15688791
Grant Number 10838752
Status In Force
Filing Date 2017-08-28
First Publication Date 2019-02-28
Grant Date 2020-11-17
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

A method includes receiving, by a processing device of a monitoring node, an indication over a network that a virtual machine successfully migrated from a first host to a second host. The indication includes a virtual machine address of the virtual machine executing on the second host. The method also includes, responsive to the indication that the virtual machine successfully migrated from the first host to the second host, starting to monitor incoming packets of the monitoring node for an incoming packet that includes a source address field having the virtual machine address, and, upon determining, after a threshold period of time, that none of the incoming packets include the source address field having the virtual machine address, notifying a reporting node that the incoming packet was not received to facilitate performance of an action to reduce downtime of communication with the virtual machine over the network.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration

74.

Detach virtual machine from virtual machine template

      
Application Number 15688987
Grant Number 10628147
Status In Force
Filing Date 2017-08-29
First Publication Date 2019-02-28
Grant Date 2020-04-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Lipchuk, Maor
  • Hadas, Arik

Abstract

Mechanisms for detaching a thin-provisioned virtual machine (VM) from a VM template are disclosed. A request to detach a thin-provisioned VM from a VM template is received. The thin-provisioned VM is linked to the VM template and has at least one delta volume that is linked to a volume of the VM template. For each delta volume of the thin-provisioned VM, a corresponding merged volume is caused to be generated that is not linked to the VM template and that comprises contents of the delta volume and contents of the volume of the VM template to which the delta volume is linked. VM configuration data is altered to indicate that the thin-provisioned VM is an independent VM that is no longer linked to the VM template.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 8/61 - Installation
  • G06F 9/445 - Program loading or initiating
  • G06F 8/36 - Software reuse

75.

Hypervisor management of migration notification and response messages for virtual machines

      
Application Number 15691522
Grant Number 10628198
Status In Force
Filing Date 2017-08-30
First Publication Date 2019-02-28
Grant Date 2020-04-21
Owner Red Hat Israel Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

A hypervisor may identify that a virtual machine has been migrated to the hypervisor from another hypervisor. In response to identifying that the virtual machine has been migrated, the hypervisor may provide a notification message including one or more network addresses associated with the migrated virtual machine. The hypervisor may receive network traffic data and determine that the received network traffic data corresponds to a response message for at least one of the one or more network addresses associated with the migrated virtual machine. The hypervisor may determine that each of the one or more network addresses has not received the response message and provide a subsequent notification message.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

76.

Migration notification and response messages for virtual machines

      
Application Number 15691605
Grant Number 11070629
Status In Force
Filing Date 2017-08-30
First Publication Date 2019-02-28
Grant Date 2021-07-20
Owner Red Hat Israel, LTD (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

An indication that a virtual machine has been migrated may be received. In response to receiving the indication, one or more network addresses associated with the virtual machine may be identified. A notification message corresponding to the one or more network addresses may be generated. The notification message may be transmitted on networks for the one or more network addresses. The virtual machine may determine whether a response message has been received for each of the one or more network addresses. The virtual machine may transmit a subsequent notification message in view of determining that at least one response message has not been received for at least one of the one or more network addresses.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

77.

Storage domain growth management

      
Application Number 15678001
Grant Number 11204702
Status In Force
Filing Date 2017-08-15
First Publication Date 2019-02-21
Grant Date 2021-12-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Asayag, Mordechay

Abstract

A host system executing multiple virtual machines that is associated with multiple storage domains may be identified. Storage domain data may be received that includes utilization of each of the multiple storage domains by the multiple virtual machines. It may be determined that the utilization of a first storage domain of the multiple storage domains by the virtual machines satisfies a threshold utilization. In response to determining that the utilization of the first storage domain satisfies the threshold utilization, a second storage domain may be identified in view of a storage domain rank. An instruction may be provided to cause a storage migration of a virtual machine from the first storage domain to the identified second storage domain.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 12/02 - Addressing or allocation; Relocation
  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 16/13 - File access structures, e.g. distributed indices

78.

Discovering and provisioning computing devices in a security enhanced environment

      
Application Number 16167263
Grant Number 11233813
Status In Force
Filing Date 2018-10-22
First Publication Date 2019-02-21
Grant Date 2022-01-25
Owner Red Hat Israel, Ltd (Israel)
Inventor
  • Zapletal, Lukas
  • Levy, Ohad Anaf

Abstract

Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel from a removable storage, wherein the first kernel identifies device information of the computing device when executed; transmitting a provisioning request comprising the device information to a provisioning device over a network; receiving provisioning data and a second kernel over a network, the second kernel comprising an operating system installer; and overwriting the first kernel with the second kernel.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 8/65 - Updates
  • H04W 12/30 - Security of mobile devices; Security of mobile applications

79.

Hot-plug of devices in virtualized computer systems

      
Application Number 16168741
Grant Number 10534742
Status In Force
Filing Date 2018-10-23
First Publication Date 2019-02-21
Grant Date 2020-01-14
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Apfelbaum, Marcel
  • Tsirkin, Michael

Abstract

A system and method for enabling hot-plugging of devices in virtualized systems. A hypervisor obtains respective values representing respective quantities of a resource for a plurality of virtual root buses of a virtual machine (VM). The hypervisor determines a first set of address ranges of the resource that are allocated for one or more virtual devices attached to at least one of the plurality of virtual root buses. The hypervisor determines, in view of the first set of allocated address ranges, a second set of address ranges of the resource available for attaching one or more additional virtual devices to at least one of the plurality of virtual root buses. The hypervisor assigns to the plurality of virtual root buses non-overlapping respective address ranges of the resource within the second set.

IPC Classes  ?

  • G06F 13/40 - Bus structure
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 13/42 - Bus transfer protocol, e.g. handshake; Synchronisation

80.

Securing code loading by a guest in a virtual environment

      
Application Number 15999413
Grant Number 10630484
Status In Force
Filing Date 2018-08-20
First Publication Date 2019-02-07
Grant Date 2020-04-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bonzini, Paolo
  • Tsirkin, Michael

Abstract

Methods, systems, and computer program products are included for loading a code module. A method includes verifying, by a guest, a digital signature of a code module stored in an initial guest memory buffer. The guest copies the verified code module stored at the initial guest memory buffer into a target guest memory buffer and applies, using one or more symbol entries, one or more relocations to the verified code module stored at the target guest memory buffer. The guest sends a request to a hypervisor to set the target guest memory buffer to a write-protect mode. In response to a determination that first content stored in the initial guest memory buffer corresponds to second content stored in the target guest memory buffer, the guest sends a request to the hypervisor to set the target guest memory buffer to an executable mode.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

81.

Virtual machine storage operation progress tracking

      
Application Number 15851560
Grant Number 10496431
Status In Force
Filing Date 2017-12-21
First Publication Date 2019-01-31
Grant Date 2019-12-03
Owner Red Hat Israel, Ltd. (Israel)
Inventor Aravot, Liron

Abstract

A method includes receiving a request to perform a virtual machine (VM) copy operation that copies the VM from a source to a target location. The VM includes a hierarchy of storage components in levels. The operation includes a first and second sub-operation for each storage component at a lowest level in the hierarchy. The method includes transmitting a VM copy instruction, identifying a weight assigned to each storage component in the hierarchy, the weight based on a property of a storage component. The weight of the storage component at the lowest level is divided into first and second weight portions. The method also includes receiving a completion percentage for the sub-operations, determining an overall completion progress percentage of the operation using the sub-operation completion percentages and the weight portions for each storage component at the lowest level, and transmitting the overall completion percentage.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers

82.

Guest controlled virtual device packet filtering

      
Application Number 16128812
Grant Number 10678583
Status In Force
Filing Date 2018-09-12
First Publication Date 2019-01-24
Grant Date 2020-06-09
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael S.

Abstract

Implementations are described for guest controlled virtual device packet filtering. A method of the disclosure includes receiving, at a guest operating system (OS) of a virtual machine executed by a processing device of a host machine, a notification of a host configuration change from a hypervisor of the host machine, the host configuration change affecting routing of networking packets corresponding to the virtual machine over a network, implementing, by the guest OS, configuration changes to a guest OS environment, the configuration changes corresponding to the host configuration change, and in response to implementing the configuration changes, notifying, by the virtual machine, the hypervisor that network packet filtering of the networking packets can be disabled.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

83.

Source code test consolidation

      
Application Number 15652056
Grant Number 10915430
Status In Force
Filing Date 2017-07-17
First Publication Date 2019-01-17
Grant Date 2021-02-09
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Ramraz, Oded
  • Shuster, Boaz

Abstract

A method includes identifying a set of tests for a source code, analyzing the set of tests to identify overlapping blocks of the source code that are to be tested by each of the set of tests, merging a subset of the tests that include the overlapping blocks of the source code to create a merged test, and causing the merged test to be executed to test the source code. In an implementation, code coverage results are used when analyzing the set of tests to identify overlapping blocks of the source code.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

84.

Disabling in-memory caching of a virtual machine during migration

      
Application Number 15619682
Grant Number 10635477
Status In Force
Filing Date 2017-06-12
First Publication Date 2018-12-13
Grant Date 2020-04-28
Owner Red Hat Israel, Ltd. (Israel)
Inventor Kaul, Yaniv

Abstract

Systems and methods for disabling in-memory caching of a virtual machine during migration are disclosed. An example method may include receiving, at a migration agent of a source host machine, a request to migrate a virtual machine (VM) hosted by the source host machine to a destination host machine, determining that a migration caching attribute of the VM is enabled, instructing a VM agent executing on the VM to disable caching of the VM in view of determining that the migration caching attribute of the VM is enabled, receiving acknowledgment of successful disablement of caching on the VM, and responsive to receiving the acknowledgment, initiating migration of the VM from the source host machine to the destination host machine.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

85.

Migrating a virtual machine in response to identifying an unsupported virtual hardware component

      
Application Number 15609402
Grant Number 10241823
Status In Force
Filing Date 2017-05-31
First Publication Date 2018-12-06
Grant Date 2019-03-26
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Asayag, Mordechay
  • Kolesnik, Michael

Abstract

A request to install a virtual hardware component on a virtual machine that is executed by a first hypervisor may be received. A network that the virtual hardware component is to operate on may be identified and a determination may be made that the first hypervisor does not support the network that the virtual hardware component is to operate on. Furthermore, a second hypervisor that supports the network that the virtual hardware component is to operate on may be identified. In response to identifying the second hypervisor that supports the network, the virtual machine may be migrated from the first hypervisor to the second hypervisor for execution by the second hypervisor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

86.

Network beacon for hypervisor installations

      
Application Number 15604559
Grant Number 10582010
Status In Force
Filing Date 2017-05-24
First Publication Date 2018-11-29
Grant Date 2020-03-03
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kolesnik, Michael
  • Asayag, Mordechay

Abstract

A system and method for configuring components added to a network is disclosed. The method includes receiving, by a device associated with a network in a cluster including a plurality of host machines, a set of configuration settings for the network, and configuring a network connection of the device using the set of configuration settings for the network. The method further includes generating a message including the set of configuration settings for the network and periodically broadcasting the message on the network to provide the set of configuration settings to a hypervisor that is configuring a corresponding network connection on a host machine from the cluster.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/24 - Arrangements for maintenance or administration

87.

Copy based IOMMU emulation for out-of-process emulated devices

      
Application Number 15691244
Grant Number 10140148
Status In Force
Filing Date 2017-08-30
First Publication Date 2018-11-27
Grant Date 2018-11-27
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Kaplansky, Victor
  • Tsirkin, Michael

Abstract

A system and method for copy based IOMMU emulation for out-of-process emulated device includes a memory, one or more physical processors, a virtual machine having a guest and a guest memory, and a hypervisor executing on the physical processors. In an example, the hypervisor receives a request from the guest to grant access of a virtual device to a guest memory page when the guest memory is mapped to a private memory. The virtual device is mapped to a shared memory. The virtual device has access to the guest memory while the guest memory is mapped to the shared memory. The hypervisor copies data in a private memory page to a shared memory page in response to receiving the request. Then, the hypervisor maps the guest memory page to the shared memory page, which grants the virtual device access to the guest memory page.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus

88.

Crash dump extraction of guest failure

      
Application Number 15599190
Grant Number 10467078
Status In Force
Filing Date 2017-05-18
First Publication Date 2018-11-22
Grant Date 2019-11-05
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Hammer, Gal
  • Apfelbaum, Marcel

Abstract

An example method of providing a crash dump file upon a crash of a guest OS includes receiving, by a hypervisor, a notification that a guest OS running on a virtual machine has crashed. The notification is from the guest OS, and the virtual machine and the hypervisor run on a host machine. The method also includes in response to receiving the notification, writing, by the hypervisor, a crash dump file associated with the guest OS crash to a host file system of the host machine.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/188 - Virtual file systems

89.

Kernel-assisted inter-process data transfer

      
Application Number 15591469
Grant Number 10402341
Status In Force
Filing Date 2017-05-10
First Publication Date 2018-11-15
Grant Date 2019-09-03
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Apfelbaum, Marcel
  • Hammer, Gal

Abstract

Inter-process data transfer on a host computing device is disclosed. A kernel module executing on the host computing device receives, from a first process, buffer registration information that identifies a virtual address of a receive buffer and a length of the receive buffer. The kernel module determines a first physical memory address that corresponds to the virtual address of the receive buffer. The kernel module receives, from a second process, a send request to send data to the first process, the send request including a virtual address of a send buffer, a length of the data, and a destination identifier that is associated with the receive buffer. The kernel module determines a second physical memory address that corresponds to the virtual address of the send buffer and transfers the data directly from the second physical memory address to the first physical memory address.

IPC Classes  ?

  • G06F 12/1009 - Address translation using page tables, e.g. page table structures

90.

Sharing message-signaled interrupt vectors in multi-processor computer systems

      
Application Number 16028759
Grant Number 10628351
Status In Force
Filing Date 2018-07-06
First Publication Date 2018-11-01
Grant Date 2020-04-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Bonzini, Paolo
  • Tsirkin, Michael

Abstract

An example method of sharing message-signaled interrupt vectors in multi-processor computer systems comprises: associating an interrupt vector with a first device component, by creating a first interrupt mapping entry of an interrupt mapping table, wherein the first interrupt mapping entry references a first processor and the interrupt vector; associating the interrupt vector with a second device component, by creating a second interrupt mapping entry of the interrupt mapping table, wherein the second interrupt mapping entry references a second processor and the interrupt vector; and creating, in an interrupt descriptor table (IDT) associated with the first processor and the second processor, an interrupt descriptor for the interrupt vector.

IPC Classes  ?

  • G06F 13/24 - Handling requests for interconnection or transfer for access to input/output bus using interrupt
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

91.

Virtual machine suspension

      
Application Number 15979083
Grant Number 10481942
Status In Force
Filing Date 2018-05-14
First Publication Date 2018-09-27
Grant Date 2019-11-19
Owner Red Hat Israel, Ltd. (Israel)
Inventor Kaul, Yaniv

Abstract

A method and system for suspending operation of a virtual machine executed by a processing device of a host computing system. The method and system include storing state information of the virtual machine to a memory of the guest operating system. A notification is sent to an application of the virtual machine to enable the application to flush data prior to suspension of the operation of the virtual machine. Upon receipt of a confirmation that the state information is stored in the memory of the guest operating system, the state information is migrated to storage of the host computing system.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

92.

Hypervisor-visible guest thread management

      
Application Number 15985482
Grant Number 10409633
Status In Force
Filing Date 2018-05-21
First Publication Date 2018-09-20
Grant Date 2019-09-10
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Responsive to receiving a first request from an application to create a thread for the application, a guest operating system sends a first notification to a hypervisor to create a dedicated virtual processor for the thread. Responsive to receiving an identifier associated with the dedicated virtual processor from the hypervisor, the guest operating system starts the thread using the dedicated virtual processor, and pins the thread to the dedicated virtual processor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

93.

Breakpoint insertion into kernel pages

      
Application Number 15987977
Grant Number 10545851
Status In Force
Filing Date 2018-05-24
First Publication Date 2018-09-20
Grant Date 2020-01-28
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor
  • Tsirkin, Michael
  • Bonzini, Paolo

Abstract

A method includes, with a hypervisor, receiving a first request from a guest to write a first piece of data to a first memory location within a kernel code page. The method further includes determining that the first request triggers a violation based on a kernel protection mechanism, and in response to determining that the first request triggers the violation, determining that the first piece of data includes a breakpoint. The method further includes, in response to determining that the first piece of data includes the breakpoint, copying a second piece of data currently stored at the first memory location to a second memory location within non-guest writeable memory and overwriting the first memory location with the first piece of data.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/36 - Preventing errors by testing or debugging of software

94.

Determining alternative route by navigation system

      
Application Number 15979030
Grant Number 10914599
Status In Force
Filing Date 2018-05-14
First Publication Date 2018-09-13
Grant Date 2021-02-09
Owner Red Hat Israel, Ltd. (Israel)
Inventor Tsirkin, Michael

Abstract

A vehicle navigation system may receive, from an external computer system, a first route to a destination from a current position of the vehicle navigation system. A current speed of the vehicle navigation system as the vehicle navigation system travels on the first route may be provided to the external computer system. The vehicle navigation system may receive, from the external computer system, other routes to the destination that begin from a starting point that corresponds to an anticipated deviation from the first route located at least a defined distance from the vehicle navigation system. A graphical user interface of the vehicle navigation system may be caused to display a second route of the other routes based on a current deviation of the vehicle navigation system from the first route.

IPC Classes  ?

  • G01C 21/00 - Navigation; Navigational instruments not provided for in groups
  • G01C 21/34 - Route searching; Route guidance

95.

Asynchronous mapping of hot-plugged device associated with virtual machine

      
Application Number 15962265
Grant Number 10474616
Status In Force
Filing Date 2018-04-25
First Publication Date 2018-08-30
Grant Date 2019-11-12
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Williamson, Alex
  • Tsirkin, Michael

Abstract

Systems and methods for asynchronous mapping of a hot-plugged I/O device associated with a virtual machine. An example method comprises: executing, by a host computer system, a virtual machine managed by a hypervisor; responsive to detecting hot-plugging of an input/output (I/O) device, pinning a memory buffer associated with the I/O device; and responsive to receiving a signal indicating completion of pinning the memory buffer, notifying the virtual machine of the I/O device being hot-plugged.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 13/40 - Bus structure
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

96.

Cloning a hypervisor

      
Application Number 15442419
Grant Number 10613708
Status In Force
Filing Date 2017-02-24
First Publication Date 2018-08-30
Grant Date 2020-04-07
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Asayag, Mordechay
  • Kolesnik, Michael

Abstract

Systems and methods for hypervisor cloning. An example method may comprise: receiving a request to install and configure cloned hypervisors on host systems, wherein, for each of the cloned hypervisors, the request comprises identification information for each of the cloned hypervisors; identifying, via the virtualization manager, an existing hypervisor installed on another host system, the existing hypervisor operating in a satisfactory state and having a set of configuration parameters; and transmitting one or more clone commands to the host systems in view of the identification information for each of the cloned hypervisors, wherein each of the clone commands causes a respective host system to install and configure one of the cloned hypervisors according to the set of configuration parameters of the existing hypervisor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus

97.

Memory-mapped input/output (I/O) channel

      
Application Number 15958884
Grant Number 10645051
Status In Force
Filing Date 2018-04-20
First Publication Date 2018-08-23
Grant Date 2020-05-05
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Apfelbaum, Marcel
  • Hammer, Gal

Abstract

Various examples are directed to systems and methods for utilizing a memory-mapped I/O channel. A first application may request that a message be sent to a channel counterparty. A message driver may receive from the first application the request to send the message, where the request comprises payload data from the message. The message driver may write a work request to a send queue of a first queue pair at the first memory location. An emulated channel adapter may poll a physical address at a memory device corresponding to the first memory location; determine that the work request is present at the send queue, and send the payload data to the channel counterparty.

IPC Classes  ?

  • H04L 12/58 - Message switching systems
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation

98.

Lightweight thread synchronization using shared memory state

      
Application Number 15438992
Grant Number 10459771
Status In Force
Filing Date 2017-02-22
First Publication Date 2018-08-23
Grant Date 2019-10-29
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor Tsirkin, Michael

Abstract

A system and method for lightweight thread synchronization using a shared memory state includes exposing, by an operating system executing on one or more processors, a memory mapping interface. The one or more processors may execute a first thread and a second thread. A supervisor in the operating system may map a memory page storing an execution state of the first thread to a memory location accessible by the second thread. The first thread may be configured to store at least one request in a shared memory. The second thread may be configured to poll the shared memory to execute the at least one request stored in the shared memory. Then, the supervisor may update the execution state of the first thread stored in the memory page. The execution state may be either a working state or a not-working state.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/52 - Program synchronisation; Mutual exclusion, e.g. by means of semaphores

99.

Efficient virtual machine memory monitoring with hyper-threading

      
Application Number 15438995
Grant Number 10481936
Status In Force
Filing Date 2017-02-22
First Publication Date 2018-08-23
Grant Date 2019-11-19
Owner RED HAT ISRAEL, LTD. (Israel)
Inventor Tsirkin, Michael

Abstract

A system and method for efficient virtual machine memory monitoring with hyper-threading includes executing, by a hypervisor executing on a plurality of physical processors, a virtual central processor unit (VCPU) of a virtual machine on a first hyper-thread. The plurality of physical processors include a first physical processor having the first hyper-thread and a second hyper-thread. The virtual machine executes on the first hyper-thread. Then, the second hyper-thread executes a memory monitoring instruction on a designated range of a shared memory to cause the second hyper-thread to stop executing. Then, a guest in the virtual machine updates the designated range of the shared memory by storing a first request in the designated range of the shared memory to wake up the second hyper-thread.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

100.

Secure zero-copy packet forwarding

      
Application Number 15435402
Grant Number 10540294
Status In Force
Filing Date 2017-02-17
First Publication Date 2018-08-23
Grant Date 2020-01-21
Owner Red Hat Israel, Ltd. (Israel)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

A hypervisor detects a virtual device configured by a virtual machine, generates a para-virtualized networking interface between the virtual device and a memory space within hypervisor memory, maps the memory space to a peripheral component interconnect (PCI) memory space of the virtual machine, and configures the memory space to be accessible to a physical device via direct memory access (DMA), where the physical device is associated with the virtual device of the virtual machine. The hypervisor then transfer packets between the virtual machine and the physical device using the para-virtualized networking interface.

IPC Classes  ?

  • G06F 12/1081 - Address translation for peripheral access to main memory, e.g. direct memory access [DMA]
  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
  • G06F 13/42 - Bus transfer protocol, e.g. handshake; Synchronisation
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 13/10 - Program control for peripheral devices
  1     2     3     ...     7        Next Page