Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Red Hat patents (2016 archive)


Recent patent applications related to Red Hat. Red Hat is listed as an Agent/Assignee. Note: Red Hat may have other listings under different names/spellings. We're not affiliated with Red Hat, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat-related inventors


Transmitting encapsulated snmp commands to virtual machines

Systems and methods for transmitting encapsulated snmp commands to virtual machines. An example method may comprise: receiving a simple network management protocol (snmp) request; encapsulating, by a processing device, the snmp request in a format compatible with respect to which a virtual machine is configured to communicate; and providing the encapsulated snmp request to the virtual machine.. ... Red Hat

Provisioning cloud resources

Cloud resource provisioning is described. A cloud resource provisioning method may include receiving, by a processor, a cloud resource usage data identifying a first cloud resource consumed, a first usage level associated with the first cloud resource, a second cloud resource consumed, and a second usage level associated with the second cloud resource, wherein the first and second cloud resources are in respective first and second clouds. ... Red Hat

Management of contextual information for data

A method, performed by a computing system, includes detecting a data call from an application running on the system, the data call being to access data through a portable operating system interface (posix) application programming interface (api), the data being stored on a storage system associated with the computing system. The method further includes, in response to detecting the data call, obtaining, through use of a context extraction module, contextual information associated with the data call. ... Red Hat

Memory deduplication support for remote direct memory access (rdma)

An example method of providing deduplication support for remote direct memory access (rdma) memory includes detecting that a first memory page and a second memory page are identical. A first mapping maps a first virtual memory address (vma) to a first physical memory address (pma) of the first memory page. ... Red Hat

Dynamic non-uniform memory architecture (numa) locality for remote direct memory access (rdma) applications

An example method of moving rdma memory from a first node to a second node includes protecting a memory region from write operations. The memory region resides on a first node and includes a set of rdma memory pages. ... Red Hat

Memory sharing for direct memory access by a device assigned to a guest operating system

A guest operating system (os) detects a direct memory access (dma) write request for a device assigned to a guest os to perform a dma write to a page of memory and, prior to a write access of to the page, sets a dma write state of a guest physical address for the requested page of memory to indicate that a dma write operation is in progress for the requested page. The guest os causes a virtual central processing unit (cpu) to attempt to write to the requested page of memory and sends the dma write request to the device to cause the device to write to the requested page of memory.. ... Red Hat

Memory swap for direct memory access by a device assigned to a guest operating system

A hypervisor detects a page fault associated with the request for a device assigned to a guest operating system to perform direct memory access (dma) of a requested page of memory, invalidates a mapping in a central processing unit (cpu) page table of a guest physical address to a host physical address for a candidate page for being swapped out of host memory, checks a dma access state of the candidate page to determine whether or not the candidate page can be swapped out from the host memory, and removes the candidate page from the host memory in response to determining that the dma access state indicates that the candidate page can be swapped out.. . ... Red Hat

Exit-less movement of guest memory assigned to a device in a virtualized environment

Embodiments of the disclosure enable exit-less movement of guest memory assigned to a device in a virtualized environment. An example method comprises detecting, by a processing device of a host computer system, an event triggering a move/copy of a memory page residing at a first memory location that is mapped to a virtual address space of a virtual machine being hosted by the host computer system. ... Red Hat

Zero copy memory reclaim for applications using memory offlining

An application sends a first request to an operating system to provide a hardware device with direct memory access to contents of a virtual memory location in an application memory of the application, wherein the virtual memory location is mapped to a physical memory location. In response to determining that the virtual memory location is to be reclaimed, the application sends a second request to the operating system to unmap the physical memory location from the virtual memory location. ... Red Hat

Dynamic thread pool management

Aspects of the disclosure provide for mechanisms for dynamically managing thread pools in a computer system. A method of the disclosure includes receiving a user request to perform an action in a computer system; determining an execution plan for the user request, wherein the execution plan comprises a plurality of tasks; assigning, by a processing device, each of the plurality of tasks to one of a plurality of thread pools for execution; monitoring executions of the plurality of tasks in the thread pools; and reassigning, by the processing device, a first task of the plurality of tasks to a new thread pool in view of the monitoring.. ... Red Hat

Virtual machine locking

Systems and methods for virtual machine locking. An example method may include: applying a lock to a virtual machine, the lock enabling ongoing execution of the virtual machine and outbound communication by the virtual machine while precluding unauthenticated inbound communication to the virtual machine, receiving, from a first device and in response to an authentication request, an authentication attempt, processing the authentication attempt to authenticate the first device with respect to the virtual machine, and in response to a determination that the first device was successfully authenticated with respect to the virtual machine, enabling inbound communication from the first device to the virtual machine.. ... Red Hat

Exit-less host memory locking in a virtualized environment

Embodiments of the present disclosure enable exit-less host memory locking in a virtualized environment. An example method comprises protecting, by a processing device of a host computer system, a memory page from being accessed by a guest operating system of a virtual machine running on the host computer system. ... Red Hat

Using completion queues for rdma event detection

Systems and methods for using completion queues for remote direct memory access (rdma) event detection. An example method may comprise: receiving a request to create a queue pair for processing remote direct memory access (rdma) requests using an rdma-enabled network interface controller (rnic), the queue pair comprising a send queue and a receive queue; associating the queue pair with a completion queue associated with the rnic, the completion queue employed to store a plurality of completion queue elements associated with completed work requests; receiving a notification of an interrupt associated with the rnic; and responsive to determining that at least one of a number of send queues associated with the completion queue or a number of receive queues associated with the completion queue exceeds zero, identifying at least one of: a first application registered to be notified of rdma send events or a second application registered to be notified of rdma receive events.. ... Red Hat

Sharing message-signaled interrupt vectors in multi-processor computer systems

Systems and methods for sharing message-signaled interrupt vectors in multi-processor computer systems. An example method may comprise: associating an interrupt vector with a first device component; associating the interrupt vector with the second device component; creating, in a first interrupt descriptor table (idt) associated with a first processor, a first interrupt descriptor to reference a first interrupt service routine to process a first interrupt triggered by the first device component; and creating, in a second idt associated with a second processor, a second interrupt descriptor to reference a second interrupt service routine to process a second interrupt triggered by the second device component, wherein the first interrupt descriptor and the second interrupt descriptor reference the interrupt vector.. ... Red Hat

11/24/16 / #20160342527

Deferring registration for dma operations

Systems and methods for deferring registration for direct memory access (dma) operations. An example method may comprise: receiving a memory region registration request identifying a memory region for a direct memory access (dma) operation; generating a local key for the memory region; receiving a dma work request referencing the local key; and responsive to determining that an amount of pinned memory is below a threshold, registering the memory region for dma transfer.. ... Red Hat

11/24/16 / #20160342478

User interface state saving and restoration

Methods, systems, and computer program products are included to persist a state of an application to a memory and to restore the state of the application from the memory. The method includes leveraging two-way binding between a model and a view of the application in order to persist at least a portion of the model to the memory as a state. ... Red Hat

11/24/16 / #20160342394

Multi-factor entropy sourcing for random number generators

Systems and methods for multi-factor entropy sourcing for random number generators. An example method may comprise: identifying, by a processing device, a plurality of entropy sources; receiving random bits from each of the plurality of entropy sources; identifying a minimum number of bits among numbers of bits received from each of two or more entropy sources of the plurality of entropy sources; mixing, into an entropy pool, at least the identified minimum number of bits received from each entropy source of two or more entropy sources; and increasing a size of the entropy pool by the identified minimum number of bits.. ... Red Hat

11/17/16 / #20160335176

Mechanisms for reproducing storage system metadata inconsistencies in a test environment

Mechanisms for recreating a first inconsistency in storage system metadata encountered by an installation module during a software installation process on a first computing device are provided. A test computing device accesses on a remote storage device inconsistent storage system metadata associated with the first computing device. ... Red Hat

11/17/16 / #20160335104

Universal database driver

Methods, systems, and computer program products are included to provide a universal database driver, into which one or more driver implementations may be loaded. The universal database driver communicates with one or more databases using the appropriate driver implementation for each database. ... Red Hat

11/03/16 / #20160321292

Distributed resource contention detection and handling

A system and method are disclosed for detecting and handling resource contention in a cluster file system. In one implementation, a processing device determines a measure of congestion for a resource that is shared by a first node of a cluster file system and a second node of the cluster file system, where the first node has a first local queue for lock requests for the resource, and wherein the second node has a second local queue for lock requests for the resource. ... Red Hat

11/03/16 / #20160321207

Numa-aware root bus selection

A method includes determining a first host non-uniform memory access (numa) node of a plurality of host numa nodes on a host machine that provides a virtual machine to a guest, the first host numa node being associated with a pass-through device, creating a virtual numa node on the virtual machine, mapping the virtual numa node to the first host numa node, adding a virtual expander to a virtual root bus of the virtual machine, and associating the virtual expander with the virtual numa node.. . ... Red Hat

10/27/16 / #20160315772

Kerberos preauthentication with j-pake

A method relates to receiving, by an authentication server executed by a processing device, an authentication request from a client device via a public network, wherein the authentication request comprises a user identifier associated with a password, selecting a first private key of the authentication server from a first range of numbers and a second private key of the authentication server from a second range of numbers, wherein an upper limit of the first range and the second range is specified according to a prime number, receiving, from the client device, a first public key of the client device and a second public key of the client device, calculating a third private key of the authentication server in view of the second private key of the authentication server and a numerical value of the password, receiving, from the client device, a third public key of the client device, calculating a session key of the authentication server in view of the second public key of the client device, the third public key of the client device, and the third private key of the authentication server, and validating the session key.. . ... Red Hat

10/27/16 / #20160314089

Allocating virtual resources to root pci bus

Systems and methods for allocating virtual resources to a root pci bus. An example method may comprise: intercepting, by a hypervisor being executed by a processing device of a host computer system, a virtual machine read operation with respect to a certain address range within a peripheral component interconnect (pci) configuration space; presenting, to a virtual machine running on the host computer system, an identifier of a root pci bus; presenting, to the virtual machine, a pci-to-pci bridge associated with the root pci bus; presenting, to the virtual machine, a pci device that is communicatively coupled to a secondary pci bus, wherein the secondary pci bus is communicatively coupled to the pci-to-pci bridge; receiving, from the virtual machine, an identifier of a resource pool associated with the pci-to-pci bridge; associating the resource pool with the root pci bus; and notifying of the resource pool a guest operating system of the virtual machine.. ... Red Hat

10/27/16 / #20160314009

Virtual machine function based sub-page base address register access for peripheral component interconnect device assignment

A value stored in a guest device register is received from a virtual machine. A hypervisor generates a page table including a first mapping between the value stored in the guest device register and a first address of the host operating system and a second mapping between a second address of the guest operating system and a third address of a virtual machine function on the host operating system. ... Red Hat

10/20/16 / #20160306749

Guest page table validation by virtual machine functions

Systems and methods for guest page table validation by virtual machine (vm) functions. An example method comprises: storing a first vm function invocation instruction in a first memory page executable from a default memory view of a vm, wherein executing the first vm function invocation instruction switches a page table pointer to a trampoline memory view of the vm; configuring a write access permission, from the trampoline memory view, to a page table comprised by a vm page table hierarchy; storing a second vm function invocation instruction in a second memory page executable from the trampoline memory view, wherein executing the second vm function invocation instruction switches the page table pointer to an alternative memory view of the vm; storing, in the second memory page, validation instructions to validate the vm page table hierarchy; and storing protected instructions within a third memory page executable from the alternative memory view.. ... Red Hat

10/20/16 / #20160306652

Fair unidirectional multi-queue virtual machine migration

Methods, systems, and computer program products for providing fair unidirectional multi-queue virtual machine migration are disclosed. A computer-implemented method may include maintaining a current scan identifier for each of a plurality of streams used to migrate a virtual machine from a first hypervisor to a second hypervisor, determining when a current scan identifier of a first stream and a current scan identifier of a second stream are associated with different memory states of the virtual machine, and adjusting processing of memory updates when the current scan identifiers are associated with different memory states of the virtual machine. ... Red Hat

10/13/16 / #20160301591

Detecting events in cloud computing environments and performing actions upon occurrence of the events

A monitoring system can monitor computing processes in clouds. The monitoring system can monitor the clouds for certain events associated with the computing processes. ... Red Hat

10/13/16 / #20160299777

Request processing using vm functions

A hypervisor receives a notification from a source virtual machine that provides network function virtualization (nfv) support to execute a vm function component to send a request to a virtual processor. The vm function component identifies a physical processor associated with the virtual processor, and adds the request to a memory space associated with the physical processor.. ... Red Hat

10/06/16 / #20160291996

Range based virtual machine functions

A method performed by a physical computing system includes, with a hypervisor, determining that a multilevel guest page table includes an upper directory that maps a set of contiguous entries to privileged pages, with the hypervisor, determining that, within the multilevel page table, only the set of contiguous entries map to the privileged pages, with the hypervisor, receiving a request from the guest to execute a virtual machine function, receiving a pointer as a parameter for the virtual machine function, and in response to determining that the pointer references a memory address that is within a range associated with the set of contiguous entries, aborting the virtual machine function.. . ... Red Hat

09/29/16 / #20160286400

Mobile device user authentication for accessing protected network resources

A method for user authentication for accessing protected applications by computing devices includes receiving, by a processor of a mobile computing device, a first authentication token. The method further includes transmitting an authentication request using the first authentication token. ... Red Hat

09/29/16 / #20160283572

Dynamic data partitioning extension

Methods, systems, and computer program products are included for defining a partitioning strategy corresponding to an attribute, creating tables and inserting data into the tables according to the partitioning strategy, detecting triggering events, and responsive to the triggering events, dynamically activating tables for storing data.. . ... Red Hat

09/29/16 / #20160283371

Non-intrusive storage of garbage collector-specific management data

A system, method, and techniques for managing memory are provided. An example method includes identifying a plurality of regions in a heap storing one or more objects of a first type and one or more objects of a second type. ... Red Hat

09/29/16 / #20160283263

Dynamic batch management of shared buffers for virtual machines

Methods, systems, and computer program products for providing dynamic batch management of shared packet buffers are disclosed. A virtualized computer system may include a hypervisor with access to memory and executed by a processor to maintain a pool of host memory to store a plurality of incoming network packets received by a network device, adjust a number of memory buffers associated with the pool of host memory to resize the pool of host memory, receive an indication of an incoming network packet stored in the pool of host memory by the network device, and provide the incoming network packet to a guest. ... Red Hat

09/22/16 / #20160277312

Generating application build options in cloud computing environment

A method of generating application build options in a cloud computing environment that includes receiving application usage data by a set of currently instantiated applications. The method further includes identifying, in view of the application usage data, a set of application resources in a cloud computing environment. ... Red Hat

09/22/16 / #20160275287

Container and image scanning for a platform-as-a-service system

A method of container and image scanning includes storing at a central scan store of a multi-tenant system, an image scan result for a container image, the container image for executing functionality of applications and comprising layers, wherein the image scan result generated by a scan process comprising scanning a top layer of the container image, the remaining layers of the container image are immutable, verifying a clean status of the remaining layers of the container image with the central scan store, and transmitting the image scan result for the container image, the image scan result being clean in response to a clean result returned for the scanning and successful verification of the clean status of the remaining layers. The method further includes responsive to receiving a container image scan result request for the container image, transmitting the image scan result for the container image.. ... Red Hat

09/15/16 / #20160267021

Managing storage block of a data volume

A mechanism for managing storage block of a data volume is disclosed. A method includes determining, by a processing device, whether a current data is to be written into an entirety of a storage block of a data volume of an operating system. ... Red Hat

09/15/16 / #20160266940

Post-copy migration of a group of virtual machines that share memory

A hypervisor of a source host receives a request to migrate a group of virtual machines that provide network function virtualization support (nfv) from the source host to a destination host. The hypervisor of the source host determines that a first virtual machine of the group of virtual machines being migrated to the destination host shares a memory space on the source host with the group of virtual machines on the source host. ... Red Hat

09/08/16 / #20160261713

Cloud provider selection

A system and method are disclosed for selecting a cloud provider for a virtual machine deployment. In one implementation, a processing device receives a request to launch a deployment of a virtual machine. ... Red Hat

09/08/16 / #20160261683

Determining consistencies in staged replication data for data migration in cloud based networks

Data migration among cloud-based storage networks is described. A method may include analyzing, by a processor, whether data from a data distribution service is consistent with a data payload of a host cloud provider. ... Red Hat

09/08/16 / #20160261604

Password authentication

A user credential comprising a user password and a one-time password (otp) may be provided to access a computing system. The user password is authenticated and the network connection status of the computing system is determined. ... Red Hat

09/01/16 / #20160255096

Resource-centric authorization schemes

A method includes receiving a request of a user to perform an operation with respect to a first resource, in response to the request, determining, in view of a resource-based master data structure, a first resource-based permission data structure associated with the first resource, and accessing the first resource-based permission data structure to identify a first resource entry associated with the user. The method further includes upon determining that the first resource entry does not indicate that the user has a permission to perform the requested operation with respect to the first resource, determining a second resource-based permission data structure associated with a second resource that is a parent of the first resource, accessing the second resource-based permission data structure to identify a second resource entry associated with the user, and upon determining that the second resource entry indicates that the user has a permission to perform the requested operation with respect to the second resource, allowing the user to perform the requested operation with respect to the first resource.. ... Red Hat

09/01/16 / #20160255045

Distributed dynamic host configuration protocol

Systems and methods for managing networking activities of a multi-tenant cloud computing environment. An example method may include distributing, by a controller node executed by a processing device, a dynamic host configuration protocol (dhcp) agent to each of a plurality of compute nodes of a computing environment; identifying, by the controller node, a first virtual machine hosted on a first compute node of the plurality of compute nodes; determining a first dhcp agent associated with the first virtual machine and the first compute node; and transmitting, by the controller node, networking information relating to the first virtual machine to the first dhcp agent hosted by the first compute node.. ... Red Hat

09/01/16 / #20160254982

System testing framework

Implementations provide for a system testing framework for computer systems. A method of the disclosure includes building representations of resources of a product to be tested, the resources built from source code of the product and revisions to the source code, initializing, on a single computing device, virtual resources from the representations, installing software of the product on the initialized virtual resources, saving a clean state of the initialized virtual resources and of the installed product on the initialized virtual resources, causing a test scenario to be performed on the installed software of the product executing on the virtual resources, and reverting the virtual resources and the installed software of the product to the clean state.. ... Red Hat

09/01/16 / #20160254964

Host network analyzer

Systems and method for generating a network configuration model for a host computer system are disclosed. An example method may include querying a host computer system for network configuration data. ... Red Hat

09/01/16 / #20160254915

Non-repudiable atomic commit

Various examples are directed to systems and methods for coordinating a non-repudiable atomic commit transaction. A client may direct a transaction request to a transaction manager, where the transaction request comprises a transaction origin token. ... Red Hat

09/01/16 / #20160253625

Employing dependency graph in software build projects

A mechanism for employing dependency graph in software build projects is disclosed. A method of implementation of the invention includes receiving a first build script file associated with a software project, the first build script file identifying a plurality of project dependencies associated with the software project. ... Red Hat

09/01/16 / #20160253433

Storing entries as ordered linked lists

A processor stores a first data item in a first entry of a data structure in association with a first key. The processor stores a second data item in a second entry of the data structure in association with the second key. ... Red Hat

09/01/16 / #20160253397

System and method for data synchronization using revision control

A system and method for data synchronization using revision control includes receiving, by a synchronization module being executed by one or more processors of a server, inbound edits to a shared document from a client, retrieving a first version of the shared document associated with the client from a revision history, updating the first version based on the inbound edits to create a second, adding the second version to the revision history when the second version is not included among a plurality of stored versions of the shared document in the revision history, and incrementing a reference counter that records a number of clients associated with the second version when the second version is included among the stored versions in the revision history. The revision history provides access to the stored versions of the shared document. ... Red Hat

09/01/16 / #20160253394

Data hub architecture to provide actionable data from remote sensor feeds

Systems and methods are provided for data hub architecture to provide actionable data from remote sensor feeds. An exemplary method includes receiving, by a master hub of a plurality of data hubs, a request to access at least one first sensor in a first location and at least one second sensor in a second location from a data client, wherein the master hub is closest to the data client of the plurality of data hubs on a network, determining a first data hub that is closest to the at least one first sensor on the network, and determining a second data hub that is closest to the at least one second sensor on the network. ... Red Hat

09/01/16 / #20160253391

Data communication in a distributed data grid

A method of communicating data in a data grid. The method includes receiving, from an iterator in a data grid, a search request to search for data matching search criteria in a first memory coupled to a node. ... Red Hat

09/01/16 / #20160253386

Grid topology change in a distributed data grid when iterating on the contents of the data grid

A method of communicating data in a data grid. The method includes receiving a first search request defined by search criteria of a search query. ... Red Hat

09/01/16 / #20160253380

Database query optimization

Various examples are directed to systems and methods for managing a database comprising data items from a constituent source. A federation engine may receive from a first client a first client query. ... Red Hat

09/01/16 / #20160253373

System and method for distributed revision control

A system and method for distributed revision control includes receiving, by a revision control module being executed by one or more processors of a server, a request to store a first version in a repository, the repository comprising a plurality of stored versions, determining whether the first version is in the repository, incrementing a client reference counter associated with the first version when the first version is in the repository, adding the first version to the repository and sending the first version to one or more additional servers when the first version is not in the repository, and decrementing a server reference counter associated with a second version in the repository when the first version replaces the second version as a head version of the repository.. . ... Red Hat

09/01/16 / #20160253372

Database query processing

Various examples are directed to systems and methods for managing a database organized according to a schema. The database may comprise a database file corresponding to a table described by the schema. ... Red Hat

09/01/16 / #20160253361

Incorporating external data into a database schema

Various examples are directed to systems and methods for managing a database to include data from an external data source. A database engine may receive a request to add a reference column to a database described by a database schema. ... Red Hat

09/01/16 / #20160253355

Finding objects in a key-based data structure by their approximate location

Object identification is described. A processor identifies a first cell of a rectangular grid overlapped over a map of a certain geographic area. ... Red Hat

09/01/16 / #20160253277

Shared pci interrupt line management

A method performed by a physical computing system includes, with the computing system, determining a set of devices that share a peripheral component interconnect (pci) interrupt line, with the computing system, disabling interrupt ability for each device within the set, with the computing system, selecting a first subset of devices within the set, with the computing system, enabling interrupt ability for each of the devices within the first subset, and with the computing system, in response to detecting an unhandled interrupt after enabling interrupt ability for the devices within the first subset, incrementing a counter for each device within the first subset.. . ... Red Hat

09/01/16 / #20160253202

Management of inter-dependent configurations of virtual machines in a cloud

A server computer system determines that configuring a first virtual machine in a cloud depends on a configuration result of configuring a second virtual machine. The server computer system configures the second virtual machine in the cloud and configures the first virtual machine in the cloud using the configuration result of the second virtual machine.. ... Red Hat

09/01/16 / #20160253197

Dirty page tracking of guest-uncached memory

An example method of providing a dirty bitmap to an application includes receiving a request for a snapshot of an internal dirty bitmap. The internal dirty bitmap indicates whether a guest has updated one or more pages in guest memory since a previously received request for a snapshot of the internal dirty bitmap. ... Red Hat

09/01/16 / #20160253196

Optimized extended context management for virtual machines

Optimized extended context management for virtual machines is disclosed. An example system includes a memory, processor, vm, and kernel, which executes the vm using guest space, stores a guest state in an extended state register, which the vm has access to, receives an instruction, saves the guest state, and determines whether the kernel is configured to handle the process using kernel space. ... Red Hat

09/01/16 / #20160253194

Hypervisor adjustment for cluster transfers

A method for moving a hypervisor in a data grid. The method can include, receiving, from a system administrator, a request to move a host from a first cluster to a second cluster in a data grid, wherein a hypervisor is registered at the host to manage the host. ... Red Hat

09/01/16 / #20160253193

Dynamic virtual machine function enabling

A method performed by a physical computing system includes, with a guest, requesting execution of a virtual machine function instruction, determining that virtual machine function ability for the guest is in a disabled state, in response to the requesting execution of a virtual machine function instruction and determining that the virtual machine function ability for the guest is in a disabled state, exiting a context of the guest, after a page table that maps guest virtual addresses to guest physical addresses is validated, determining that the virtual machine function ability is enabled, and in response to determining that the virtual machine function ability for the guest is in an enabled state, executing the virtual machine function instruction.. . ... Red Hat

09/01/16 / #20160253110

Virtual machine functions for multiple privileged pages

A method includes, with a guest, executing a first virtual machine function, determining a first pointer value stored in a register of a processor running on the host system while the first virtual machine function is executed, the first pointer value pointing to a first page table corresponding to a default page table, the first page table indicating that the guest has access to a first privileged page, switching to the first page table, executing a second virtual machine function, the second virtual machine function, determining a second pointer value stored in the register of the processor while the second virtual machine function is executed, the second pointer value pointing to a second page table corresponding to the default page table, the second page table that indicates that the guest has access to a second privileged page, and switching to the second page table.. . ... Red Hat

09/01/16 / #20160253109

Peer to peer volume extension in a shared storage environment

A processing device receives a request to delete a snapshot of a virtual machine. The processing device identifies a volume chain of a virtual disk in a shared storage that includes a destination storage volume and a source storage volume. ... Red Hat

09/01/16 / #20160253069

Visual representation of network-discovered components

Systems and methods to generate and provide a user interface to display a shape-based icon that visually represents a server in a user interface. An example method may include identifying a media access control (mac) address associated with a server, the mac address including a vendor identifier and a server identifier; determining a first color in view of the vendor identifier and a second color in view of the server identifier; determining a first shape in view of the vendor identifier and a second shape in view of the server identifier; generating a shape-based icon comprising the first shape having the first color and the second shape having the second color; and providing the user interface to display the shape-based icon that visually represents the server.. ... Red Hat

08/25/16 / #20160248745

Stateless server-based encryption associated with a distribution list

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. ... Red Hat

08/25/16 / #20160248732

Mangement of network address pools

Systems and methods for storing and managing pools of network addresses. An example method may comprise: identifying, in a data structure representing a pool of network addresses, an index value of an element having a defined state; determining, by a processing device, a network address in view of the index value and a base network address associated with the pool; and modifying the state of the element of the data structure.. ... Red Hat

08/25/16 / #20160248726

Scoped network address pool mangement

Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a network address to be associated with a network interface of a machine, wherein the machine is represented by one of: a virtual machine or a computer system; identifying a hierarchy of groups that include the machine; searching the hierarchy of groups to identify a group having an associated pool of network addresses; and selecting a network address from the pool of network addresses.. ... Red Hat

08/25/16 / #20160248640

Container host discovery

Systems and methods for performing discovery of hosts to be employed for hosting containerized applications. An example method may comprise: transmitting, to a host management service employed to manage at least one of: a plurality of host computer systems or a plurality of virtual machines running on one or more host computer systems, a host discovery request comprising a host definition rule (e.g., defining an amount of available memory, a networking configuration parameter, a storage configuration parameter, or a processor type identifier); receiving, from the host management service, an identifier of a host that satisfies the host definition rule; and providing the identifier of the host to a container orchestration service employed to instantiate and run, on one or more hosts, a plurality of containerized applications.. ... Red Hat

08/25/16 / #20160248626

Attachment of a logical network to a virtual machine

A request to attach a logical network to a virtual machine is received. The cluster associated with the virtual machine is identified. ... Red Hat

08/25/16 / #20160246835

Creating federated data source connectors

A processing device translates a set of federated queries submitted to a federated data source server into a set of native data source queries for the particular type of data source using a federated data source connector for a particular type of data source, inputs the set of native data source queries for the particular type of data source into a component corresponding to the particular type of data source, marks the component in view of the set of native data source queries, and generates output indicating whether one or more of the set of native data source queries is not acceptable as input for the component. The marked component and the output indicate whether the federated data source connector for the particular type of data source includes an error.. ... Red Hat

08/25/16 / #20160246739

Determination of a device function asserting a detected spurious interrupt

Systems and methods are provided for detection of device functions asserting a spurious interrupt. An example method includes detecting, by a central processing unit executing an operating system, a spurious hardware interrupt signal from a device function, wherein a plurality of device functions include the device function, determining an interrupt request (irq) value from the spurious hardware interrupt signal, wherein the plurality of device functions share the irq value, and scanning each of the plurality of device functions to determine the device function generated the spurious hardware interrupt signal.. ... Red Hat

08/25/16 / #20160246718

Adaptive optimization of second level cache

Adaptive optimization of second level cache is disclosed. In an example embodiment, a system includes a database server and an enterprise application server, which includes an enterprise application execution module, a first level cache, a second level cache, and a cache optimizer. ... Red Hat

08/25/16 / #20160246709

Source code unit testing using an indexing tool

A processing device indexes source code that include test functions that test corresponding functions in the source code. The processing device determines a function in the source code that contains a change, determines a set of functions in the source code that are affected by the change in the function, identifies one or more test functions in the set of functions, and creates a list of identified test functions. ... Red Hat

08/25/16 / #20160246707

Using script description to encode conditional statements

Implementations of using script descriptions to encode conditional statements are disclosed. A method of an implementation of the disclosure includes retrieving a description string associated with an executable script. ... Red Hat

08/25/16 / #20160246700

Service implementation based debugger for service oriented architecture projects

A meta-debugger receives a first debugging command from a debugger client to set a breakpoint in a first service in a first language and sets the breakpoint in a first native debugger. After receiving a service message invoking the first service, the breakpoint is triggered and the meta-debugger provides to the debugger client a first graphical representation of the first native debugger. ... Red Hat

08/25/16 / #20160246699

Verification of product release requirements

A method relates to identifying, by a processing device, a bug ticket stored in a data record, wherein the bug ticket is associated with a patch comprising code to fix a bug described in the bug ticket, and wherein the bug ticket comprises a version flag indicating whether the bug ticket receives all of a plurality of acknowledgements, determining, in view of a value of the version flag, that the bug ticket does not include an acknowledgement required to place the patch into a production repository, determining, in view of a set of acknowledgement flags of the bug ticket, an entity responsible for providing the acknowledgement, and transmitting a notification to the entity, wherein the notification comprises a hyperlink linked to a user interface page to provide the acknowledgement by the entity.. . ... Red Hat

08/25/16 / #20160246692

Managing network failure using back-up networks

A method for managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of networks, and identifying a first network of the plurality of networks, wherein a first network role is assigned to the first network. The method further includes determining whether the plurality of hypervisors satisfies an unavailability condition, and, in response to determining that the plurality of hypervisors satisfies the unavailability condition, re-assigning the first network role of the first network to a back-up network.. ... Red Hat

08/25/16 / #20160246681

Secure live virtual machine guest based snapshot recovery

A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first virtual disk of the virtual machine including a snapshot identifier. ... Red Hat

08/25/16 / #20160246649

Dynamic guest virtual machine identifier allocation

An example method of updating a virtual machine (vm) identifier (id) stored in a memory buffer allocated from guest memory includes supplying firmware to a guest running on a vm that is executable on a host machine. The firmware includes instructions to allocate a memory buffer. ... Red Hat

08/25/16 / #20160246636

Cross hypervisor migration of virtual machines with vm functions

A hypervisor executing on a source host receives a request to migrate a virtual machine from the source host to a destination host. Responsive to determining that the virtual machine is executing a vm function component, the hypervisor on the source host pauses the migration of the virtual machine. ... Red Hat

08/25/16 / #20160246635

Dynamic management of virtual functions on sr-iov capable hypervisors

A virtualization manager receives a request to change a current number of virtual functions associated with at least one physical interface that provides virtual function capability to a new number of virtual functions. Responsive to determining that that new number of virtual functions is not greater than a maximum number of virtual functions for the at least one physical interface, configuring, by the virtualization manager, the at least one physical interface with the new number.. ... Red Hat

08/25/16 / #20160246634

Service driven virtual machine scheduling

The method including, receiving, from a management interface, an external services request, wherein the external services request comprises external service criteria for a virtual machine. The method further including identifying, by an external services scheduler, a hypervisor with external services that meet the external service criteria of the virtual machine. ... Red Hat

08/25/16 / #20160246633

Read-only vm function chaining for secure hypervisor access

A hypervisor configures a first vm function component for execution on behalf of a virtual machine, the first vm function component to execute a second vm function component. The hypervisor then configures the second vm function for execution on behalf of the first vm function component, the second vm function component to execute at least one privileged instruction. ... Red Hat

08/25/16 / #20160246632

Guest controlled virtual device packet filtering

In response to detecting a change to a host hardware configuration, a hypervisor sends a notification of the change to a guest operating of a first virtual machine, the first virtual machine networked with one or more additional virtual machines. The hypervisor filters a networking packet from the guest operating system in view of the change to the host hardware configuration. ... Red Hat

08/25/16 / #20160246631

Methods and systems for establishing connections associated with virtual machine migrations

An example method of establishing one or more connections between a target host machine and a remote endpoint connected to a virtual machine (vm) running on a source host machine includes receiving, by a target hypervisor executable on a target host machine, a list of one or more remote endpoints to which a vm executable on a source host machine is connected. The source and target host machines are coupled to a network. ... Red Hat

08/25/16 / #20160246630

Guest controlled malicious payload protection

A system, methods, and apparatus for guest controlled malicious payload protection. A request is received from a virtual machine to enable privileged access to a hypervisor resource. ... Red Hat

08/25/16 / #20160246629

Gpu based virtual system device identification

A hypervisor identifies a physical gpu device accessible by the hypervisor to be assigned to a virtual machine and retrieves a gpu device identifier from the physical gpu device. The hypervisor then determines a host bridge device identifier that corresponds to the retrieved gpu device identifier using a mapping table that maps a plurality of gpu device identifiers to a corresponding plurality of host bridge device identifiers.. ... Red Hat

08/25/16 / #20160246628

Status indicator for a merge operation associated with a virtual machine

A virtual machine may be identified. A status indicator associated with a last volume of a series of volumes of a virtual disk that is associated with the virtual machine may be received. ... Red Hat

08/25/16 / #20160246627

Detecting an interrupted operation associated with a virtual machine

A first identification of a series of volumes associated with a virtual disk that is associated with a virtual machine is received. A second identification of the series of volumes associated with the virtual disk is received. ... Red Hat

08/25/16 / #20160246626

Resource reconciliation in a virtualized computer system

Implementations of the disclosure provide for mechanisms for resource reconciliation in a virtualized computer system. A method of the disclosure includes receiving a request initiated by a user to allocate a first amount of a resource; determining, using a processing device, whether the request can be fulfilled in view of a second amount of the resource available in a virtualized computer system; and allocating the second amount of the resource for the user in response to determining that the request cannot be fulfilled.. ... Red Hat

08/25/16 / #20160246624

Virtual machine network assignment

A processing device of a data center may receive a request to run a virtual machine. Responsive to determining that the virtual machine comprises a virtual network interface card (vnic) associated with a vnic profile that comprises a pre-defined custom property, the processing device may identify a network to be associated with the vnic. ... Red Hat

08/25/16 / #20160246614

Determining a label size and conditions for displaying a tooltip

A method for determining a label size and conditions for displaying a tooltip includes identifying a label object within a parent object, computing a label width of the label object based at least partially on a layout associated with the parent object, and computing a text width for text data associated with the label object. The method further includes determining a size relationship between the label width and the text width, and determining whether to enable display of a tooltip for the label object based at least partially on the size relationship.. ... Red Hat

08/25/16 / #20160246593

Applying configuration alignment in build projects

Implementations disclose applying configuration alignment in build projects is disclosed. A method of an implementation of the disclosure includes retrieving a build script (bs) file configuration from a bs file. ... Red Hat

08/25/16 / #20160246583

Repository manager

A system and method to install a software application on a host computer system using a file repository located on another host computer system. The method includes installing, on a first host computer system, a virtual machine image including a file repository including one or more pre-requisites for installing a software application. ... Red Hat

08/25/16 / #20160246582

Generic semantic configuration service

Implementations provide for generic semantic configuration service for computer systems. A method of the disclosure includes installing, by a processing device, an abstract data structure representing an application, the abstract data structure comprising representation objects corresponding to high-level features of the application, installing a semantic model for the application, receiving an identification of at least one of the high-level features to be configured on at least one component executing the application, validating, using the semantic model, a configuration of the representation objects of the abstract data structure corresponding to the at least one of the high-level features, and generating low-level configuration code in a machine-readable format of the application from the representation objects corresponding to the at least one of the high-level features.. ... Red Hat

08/25/16 / #20160246575

Contract based builder

Methods, systems, and computer program products are included for integrating software components. Source code corresponding to the software components is parsed to identify method calls. ... Red Hat

08/25/16 / #20160246465

Duplicating a task sequence from a graphical user interface interaction for a development application in view of trace data

A computing system provides a recording, by a processing device, trace data that is generated for one or more graphical user interface (gui) interactions of a user. The computing system extracts a subset of the trace data from the recorded trace data, the subset of trace data being associated with one or more gui interactions specifying operations of a development application performed on a work item. ... Red Hat

08/18/16 / #20160241659

Workflow-based push notifications

Systems and methods for enhancing workflows with data virtualization. An example method may comprise: receiving a token identifying a mobile computing device; executing, by a processing device, a workflow comprising a conditional statement that initiates a request to send a push notification to the mobile computing device; producing, in view of the request, a plurality of messages compliant with a plurality of push notification infrastructures; selecting a message compliant with a push notification infrastructure associated with the mobile computing device; and transmitting the selected message to the push notification infrastructure associated with the mobile computing device.. ... Red Hat

08/18/16 / #20160241658

Integration of intentional noise into a communication channel to simulate activity

An example method of simulating activity to conceal actual activity associated with a wireless network includes generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device. The sham push message includes an indication that the sham push message is not an actual push message from a third party associated with the mobile application. ... Red Hat

08/18/16 / #20160239499

Object creation based on copying objects corresponding to similar entities

An example method of providing a list of entities includes obtaining a list of entities responsive to a request from a client. Each entity in the list includes a set of attribute name-value pairs. ... Red Hat

08/18/16 / #20160239430

Local access dma with shared memory pool

A processing device receives a first request from a virtual machine to register a memory region to a hardware device. The processing device generates a first key for the memory region, wherein the memory region is not registered to the hardware device. ... Red Hat

08/18/16 / #20160239360

System and method for entity generation

A system and method for inspecting a testing state includes determining one or more entities to be manipulated during execution of a test of the system, generating an instance of each of the entities using a plurality of entity templates and a plurality of value generators, and executing the test using the generated instances. At least one of the generated instances includes a first value generated randomly. ... Red Hat

08/18/16 / #20160239328

Virtual machine migration to sr-iov capable hypervisors

A virtualization manager receives a request to migrate a virtual machine from a source hypervisor to a destination hypervisor supporting virtual function capability. Responsive to determining that an availability status indicates that a virtual function is available for use on the destination hypervisor by the virtual machine, the virtualization manager migrates the virtual machine from the source hypervisor to the destination hypervisor. ... Red Hat

08/18/16 / #20160239327

Identifying and preventing removal of virtual hardware

A virtualization manager receives a request to disconnect a virtual device associated with a virtual machine. The virtualization manager then determines a usage state of the virtual device in view of collected usage statistics for the virtual device. ... Red Hat

08/18/16 / #20160239326

Sr-iov support for dynamic scheduling of virtual machines with fallback

A virtualization manager receives a request to configure a virtual interface of a virtual machine, the request comprising a selected logical network to be associated with the virtual interface and a virtual function capability option selection for the virtual interface. The virtualization manager then determines whether there is an available virtual function associated with the requested logical network. ... Red Hat

08/18/16 / #20160239325

Virtual device timeout by memory offlining

A system, methods, and apparatus for virtual device timeout by memory offlining. A hypervisor receives a message from a source virtual machine to be transmitted to a destination machine and reserves a block of memory associated with the message. ... Red Hat

08/18/16 / #20160239324

Watchdog code for virtual machine functions

Methods, systems, and computer program products for initializing a page with watchdog code, by: positioning a first set of instructions in a first address range on the page; determining that there is a second address range that is unused by the first set of instructions; and initializing the second address range with a second set of instructions, the second set of instructions being watchdog instructions.. . ... Red Hat

08/18/16 / #20160239323

Virtual remote direct memory access management

A method performed by a physical computing system includes, with a hypervisor, presenting a virtualized remote direct memory access (rdma) device to a guest, with the hypervisor, allocating a portion of total guest memory to the guest, with the hypervisor, determining a memory threshold for the guest, the memory threshold being based on a number of virtual machines managed by the hypervisor and a size of total guest memory, with the hypervisor, receiving from the guest, a first request to register a first size sub-portion of the portion of total guest memory to the virtualized rdma device, and with the hypervisor, in response to determining that the first size sub-portion exceeds the memory threshold, returning a notification to the guest, the notification indicating that the first request failed. The first size sub-portion is less than the portion of total guest memory.. ... Red Hat

08/18/16 / #20160239316

Initializing a bare-metal host to an operational hypervisor

Implementation for initializing a bare metal host to an operational hypervisor is disclosed. A method of the disclosure includes detecting, by a processing device, an application programming interface request (api) request to initiate configuration of a host operating system (os) on a host. ... Red Hat

08/18/16 / #20160239295

Self-mending software builder

Implementations of the disclosure provide for a self-amending software builder. A method of the disclosure includes performing at least one test on an application having source code that is stored in a source code repository and has incurred a plurality of code changes by a plurality of users; detecting a failure of the application during the test; identifying, using a processing device, an offending code change of the plurality of code changes corresponding to the failure and at least one dependent code change of the plurality of code changes that depends on the offending code change; and updating, using the processing device, a master copy of the application in view of at least one of the offending code change or the dependent code change.. ... Red Hat

08/18/16 / #20160239274

Generating command line interface using application programming interface specification

A system and method for generating a command line interface (cli) in view of an application programming interface (api) specification is disclosed. An instance of a cli may be initialized. ... Red Hat

08/18/16 / #20160239210

Copy-offload on a device stack

A read request, a write request, and copy descriptor are constructed and sent to logical volumes of a device stack to complete a copy-offload operation between a source logical volume and a destination logical volume. The read request is forwarded to a source physical volume of a device stack and a write request is forwarded to a destination physical volume of the device stack. ... Red Hat

08/11/16 / #20160234172

Key establishment and management protocol optimizations in view of channel reliability

A peer device may determine a reliability level of a connection with another peer device during a learning duration at instances in a communication session. The connection can be established using key establishment and management protocols. ... Red Hat

08/11/16 / #20160234090

Dynamic asynchronous communication management

A method performed by a computing system includes, executing a thread, the thread comprising an instruction to send a message to a remote system, after sending the message, allowing continued execution of the thread, after a first period of time, checking for a response to the message, and in response to determining that the response has not been received and that the first period of time is less than a predetermined amount of time, waiting for an additional period of time for the response. The predetermined amount of time is based on collected data associated with a set of conditions that correspond to a current set of conditions related to the remote system.. ... Red Hat

08/11/16 / #20160232235

Data virtualization for workflows

Systems and methods for enhancing workflows with data virtualization. An example method may comprise: executing, by a processing device, a workflow comprising a conditional statement; performing a query in view of the conditional statement, the query employing virtualized data access to a plurality of heterogeneous data sources conforming to different data source schemas; transforming, by the processing device, data items returned by the query into a resulting data set conforming to a certain schema, wherein the data items correspond to the different data source schemas; and evaluating the conditional statement in view of the resulting data set.. ... Red Hat

08/11/16 / #20160232178

Transaction log for audit purposes

Methods, systems, and computer program products are included for performing a transaction, where log entries pertaining to the transaction are maintained following the transaction for audit purposes. The log entries may include information about the transaction at various stages, including time information, information regarding operations performed, state information and originator information.. ... Red Hat

08/11/16 / #20160232044

Idempotent mode of executing commands triggered by complex event processing

Systems and methods for enforcing the idempotent mode of executing commands triggered by complex event processing. An example method may comprise: receiving, by a processing device of a command dispatching module associated with a first event processing node, an event processing command comprising a command identifier; and responsive to successfully storing the command identifier in a hash table employed for storing identifiers of executed commands, causing the event processing command to be executed.. ... Red Hat

08/11/16 / #20160232020

Providing mode-dependent virtual machine function code

Systems and methods for providing mode-dependent virtual machine (vm) function code. An example method may comprise: detecting, by a hypervisor executing by a processing device of a host computer system, a transition to a first execution mode by a guest operating system (os) executing on the host computer system, wherein the first execution mode is characterized by at least one of: a first physical address size or a first general purpose register size; and responsive to the detecting, enabling a virtual machine (vm) function to be executed by the guest os in the first execution mode.. ... Red Hat

08/11/16 / #20160231951

Maintaining relative references when unlinking volumes from a volume chain

A request to delete a snapshot of a virtual machine may be received. The snapshot may be in a volume chain that may include a first storage volume, a second storage volume associated with the snapshot, and a third storage volume. ... Red Hat

08/11/16 / #20160231944

Peer to peer volume merge and delete in a shared storage environment

A processing device receives a request to delete a snapshot of a virtual machine. The processing device identifies a volume chain of a virtual disk in a shared storage that includes a destination storage volume and a source storage volume. ... Red Hat

08/11/16 / #20160231929

Zero copy memory reclaim using copy-on-write

A processing device receives a request to provide a hardware device with direct memory access to a contents of a virtual memory location in application memory of an application. Responsive to the request, the processing device locks the virtual memory location. ... Red Hat

08/11/16 / #20160231769

Complex event processing using pseudo-clock

Systems and methods for complex event processing. An example method may comprise: receiving, by a processing device of a first event processing node, an event data item reflecting a change of a system state, the event data item comprising a unique event identifier and a timestamp; and, responsive to determining a difference between the timestamp and a value of a pseudo-clock associated with the first event processing node, synchronizing the state of the first event processing node with the state of a second event processing node by adjusting the pseudo-clock by the difference.. ... Red Hat

08/04/16 / #20160226874

Secure shell (ssh) proxy for a platform-as-a-service system

Implementations provide for a secure shell (ssh) proxy for a platform-as-a-service (paas) system. A method of the disclosure includes receiving, by a processing device executing a secure shell (ssh) proxy server, a request to establish an ssh connection with a component of an application of a multi-tenant platform-as-a-service (paas) system, the component is separate from the ssh proxy server, authenticating credentials provided as part of the request, establishing the ssh connection with a device originating the request, receiving, in view of authenticating the credentials and establishing the ssh connection, routing information for the application, the routing information comprising a location of a node of the multi-tenant paas system executing the application, establishing an internal communication session with an executing proxy of the node, and forward information conveyed over the ssh connection to the executing proxy via the internal communication session.. ... Red Hat

08/04/16 / #20160226844

Multiple recipient message encryption

A method performed by a computing system includes receiving instructions from a user to divide content of a message into a plurality of parts, associating a part identifier with each of the plurality of parts, encrypting each of the plurality of parts with a different key, receiving, from the user, a list of recipients of the message and access privileges associated with each recipient in the list, the access privileges indicating which of the plurality of parts each recipient is authorized to access, transmitting the message to each of the recipients, and transmitting the access privilege data, the encryption keys for each of the parts, and the part identifiers for each of the parts to a security authority.. . ... Red Hat

08/04/16 / #20160224641

Obtaining incremental updates from a database using a partial query

An example method of processing a query includes receiving a partial query including an identifier that identifies a full query corresponding to the partial query. The partial query is sent from a client and includes a command to select data from a database table stored in a database. ... Red Hat

08/04/16 / #20160224484

Transmitting inter-processor interrupt messages by privileged virtual machine functions

Systems and methods for transmitting inter-processor interrupt messages by privileged virtual machine functions. An example method may comprise: mapping, by a hypervisor being executed by a processing device of a host computer system, a plurality of interrupt controller registers of the host computer system into a memory address space of a virtual machine being executed by the host computer system; mapping, into the memory address space of the virtual machine, a task mapping data structure comprising a plurality of records, each record associating a task with a processor of the host computer system; and mapping, into the memory address space of the virtual machine, a notification code module to be invoked by the virtual machine for writing a notification message into an interrupt controller register associated with a processor identified using the task mapping data structure.. ... Red Hat

08/04/16 / #20160224383

Protected virtual machine function access

Methods, systems, and computer program products for accessing a protected function are provided. A computer-implemented method includes allocating and initializing a guest virtual address for a virtual machine function. ... Red Hat

08/04/16 / #20160224362

Delivering interrupts to virtual machines executing privileged virtual machine functions

Systems and methods for delivering certain types of interrupts to virtual machines executing privileged virtual machine functions. An example method may comprise: receiving, by a hypervisor being executed by a processing device of a host computer system, a request to send an interrupt to a virtual central processing unit (vcpu) of a virtual machine; responsive to detecting that the vcpu is executing a virtual machine (vm) function, monitoring the vcpu for completion of the vm function; and responsive to detecting that execution of the vm function is complete, delivering the interrupt to the vcpu.. ... Red Hat

07/28/16 / #20160219123

Cache data validation

A method includes, with a computing system, receiving a first resource request for a representational state transfer (rest) web service, in response to determining that a resource request result of the first resource request is not cached, passing the first resource request to the rest web service, receiving from the rest web service, the resource request result and metadata associated with the resource request result, the metadata indicating a set of entities associated with the resource request result, caching the result and storing the metadata with the cached result, receiving a second resource request, the second resource request being the same as the first resource request, in response to determining that an entity from the set of entities has changed since the resource request result was cached, invalidating the cached resource request result and passing the first resource request to the rest web service.. . ... Red Hat

07/28/16 / #20160217286

Security policy management

A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application, the security policy for use with a security enforcement mechanism, with the computing system, receiving a data structure associated with the application and the security policy, wherein the data structure associates a logged denial by the security enforcement mechanism with a rule of the security policy, wherein the data structure further associates the logged denial with a test for the rule, the test to determine if the rule prevents the denial, with the computing system, applying the test using a temporary security policy, the temporary security policy having the rule removed, and with the computing system, in response to determining that the applying does not result in a denial corresponding to the logged denial, flagging the data structure.. . ... Red Hat

07/28/16 / #20160217282

Operating system consistency and malware protection

Methods, systems, and computer program products are included for determining the risk that a file includes malware. The risk is determined by sending identifying information of the file from a client to a server. ... Red Hat

07/28/16 / #20160217169

Simulated control of a third-party database

An example method of providing simulated control of a third-party database to a client includes receiving, at a simulation control proxy, a query that selects data from a database table stored in a third-party database. The method also includes submitting, over a network, the query to the third-party database. ... Red Hat

07/28/16 / #20160217149

Pro-active self-healing in a distributed file system

Techniques for pro-active self-healing in a distributed file system are disclosure herein. In accordance with one embodiment, a method is provided. ... Red Hat

07/28/16 / #20160217050

Automated container migration in a platform-as-a-service system

Implementations provide for automated container migration in a platform-as-a-service (paas) system. A method of the disclosure includes receiving, by a processing device executing a control server of a multi-tenant platform-as-a-service (paas) system, identification of a distressed node of the multi-tenant paas system and a resource under contention at the distressed node, providing, by the control server, identification of the resource under contention to the distressed node, receiving, by the control server, identification of a candidate container executing on the distressed node, wherein the candidate container contributes to the resource under contention on the distressed node and is launched from an instance of an application image corresponding to an application of the paas system, and sending, by the control server, the identification of the candidate container to a paas master component of the paas system and a request to migrate the candidate container from the distressed node.. ... Red Hat

07/28/16 / #20160216985

Protection against interrupts in virtual machine functions

A system, methods, and apparatus for protection against interrupts in virtual machine functions are disclosed. A hypervisor determines a first location in the memory, corresponding to a physical address of the virtual machine function. ... Red Hat

07/28/16 / #20160216984

Protection against interrupts in virtual machine functions

A system, methods, and apparatus for protection against interrupts in virtual machine functions are disclosed. A system includes memory, one or more physical processors, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. ... Red Hat

07/28/16 / #20160216983

Using hypervisor trapping for protection against interrupts in virtual machine functions

A system, methods, and apparatus for using hypervisor trapping for protection against interrupts in virtual machine functions are disclosed. A system includes memory, one or more physical processors, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. ... Red Hat

07/28/16 / #20160216948

Source to image framework for a platform-as-a-service system

Implementations provide for a source to image framework for a platform-as-a-service (paas) system. A method of the disclosure includes invoking source-to-image (sti) orchestration logic to perform a build for an application of a multi-tenant paas system, launching a build container for the build in view of a base image of the application, the base image providing a core functionality for the application, accessing source code of the application at the build container, assembling an application image using the base image and the source code, and committing the application image to a repository.. ... Red Hat

07/21/16 / #20160211975

Using a pkcs module for opening multiple databases

A processing device is to determine that a module, executed from a memory by the processing device, is an initialized module in view of the module previously opening a first database. The processing device is to create a slot to open a second database using the initialized module.. ... Red Hat

07/21/16 / #20160210627

Distributed transaction with dynamic form

Various examples are directed to systems and methods for distributed transactions with extended locks. A transaction node may receive from a coordinator node an instruction to execute an assigned operation on an object. ... Red Hat

07/21/16 / #20160210322

Distributed transaction with dynamic form

Various examples are directed to systems and methods for executing distributed transactions with dynamic form. A transaction coordinator may send to a first transaction node a commit request indicating a first transaction operation and a first object and receive an indication that the first transaction node holds a lock for the first object. ... Red Hat

07/21/16 / #20160210259

Virtual pci expander device

Methods, systems, and computer program products for notifying a virtual machine of an expander coupled to a first virtual root bus, probing the expander to detect an additional root bus, probing the additional root bus to detect a second device, and assigning the second device to a second virtual root bus of the virtual machine.. . ... Red Hat

07/21/16 / #20160210168

Reconfiguring virtual machines

Implementations of the disclosure describe reconfiguring virtual machines. In one implementation, a method includes identifying, in view of virtual machine configuration data of a virtual machine, a plurality of virtual hardware components supported by a guest operating system on the virtual machine, identifying, by a processing device executing the virtual machine from the plurality of virtual hardware components, a set of supported virtual hardware components that are not used by the virtual machine, and reconfiguring, by the processing device, the virtual machine to use at least one virtual hardware component from the set of supported virtual hardware components.. ... Red Hat

07/21/16 / #20160210049

Determining task scores reflective of memory access statistics in numa systems

Disclosed are systems and methods for determining task scores reflective of memory access statistics in numa systems. An example method may comprise: determining, by a processing device, a first memory access score of a task with respect to a first node of a non-uniform memory access (numa) system; adjusting the first memory access score using memory access scores of the task with respect to one or more nodes of the numa system; and migrating, in view of the adjusting, at least one of: the task or a memory page associated with the task.. ... Red Hat

07/14/16 / #20160203182

Query union and split

An example method of processing a plurality of queries includes determining, at a database driver, that a first query and a second query are similar. The first query is sent from a first execution thread executing in an application server. ... Red Hat

07/14/16 / #20160203167

Media compression in a digital device

Media compression in a digital device is described. A method of a disclosure includes monitoring available data storage space in the digital device. ... Red Hat

07/14/16 / #20160203088

Position dependent code in virtual machine functions

Methods, systems, and computer program products for executing a protected function are provided. A computer-implemented method may include storing a first virtual machine function instruction as the last instruction on the first trampoline page that is executable to configure access privileges according to a trampoline view, storing a page table setup instruction on the second trampoline page, and storing a second virtual machine function instruction as a last instruction on the second trampoline page that is executable to configure access privileges according to a protected view.. ... Red Hat

07/14/16 / #20160203067

System and method for inspection of system state during testing

A system and method for inspecting system state during testing includes determining one or more inspection modules for examining respective portions of a state of the system using a test inspector, initializing each of the inspection modules, saving the respective portions of the state of the system using the inspection modules, executing a test of the system, checking the respective portions of the state of the system using the inspection modules, and repeating the saving, executing, and checking for each additional test of the system. The test inspector is executed by one or more processors of the system. ... Red Hat

07/14/16 / #20160203034

Commit-one-phase distributed transactions with multiple starting participants

A read-only message is sent by a first participant of multiple participants of a two-phase distributed transaction. The read-only message is received by a processor executing a coordinator node. ... Red Hat

07/14/16 / #20160202956

Resource closing

A method performed by a computing system includes: with a resource monitoring module, providing to a code transformation module, a set of references to methods within a source code, the methods comprising code associated with a resource, with the code transformation module, creating a modified source code by inserting new code into the source code, the new code to close the resource at the end of each method referenced by the set of references, compiling the modified source code to create an application, with the resource monitoring module, during execution of the application, determining that an exception has occurred as a result of an attempt to access the resource when the resource is closed, and with the resource monitoring module, updating the set of references to include a new reference to a new method, the new method corresponding to the exception.. . ... Red Hat

07/07/16 / #20160197898

Using domain name system security extensions in a mixed-mode environment

A method relates to generating, by a processing device executing a dns resolver, a first domain name system (dns) query comprising a dns request generated from an application executing on the processing device to query a first dns server serving a first dns zone connected to the processing device via a public network, receiving, from the first dns server, a first resource record comprising a dns answer to the dns query, a second resource record comprising a digital signature generated by signing the dns answer with a first private key of the first dns zone, a third resource record comprising a first public key for verifying the digital signature, and one or more files for validating a chain of trust of the first public key, determining, by the processing device in view of the one or more files, that the chain of trust of the first public key misses at least one of a trust anchor or a link in the chain of trust, and generating a second dns query comprising the dns request to query a second dns server residing in a private network of the processing device.. . ... Red Hat

06/16/16 / #20160173286

Creating a digital certificate for a service using a local certificate authority having temporary signing authority

A computing machine creates a temporary certificate authority (ca) hosted locally by the computing machine, creates a service certificate for a local service being hosted by the computing machine, and signs the service certificate using a private key of the temporary ca. The private key is stored locally on the computing machine. ... Red Hat

06/16/16 / #20160171060

Searching data based on entities related to the data

A processing device retrieves data from a plurality of applications and extracts identifying information about each of the plurality of application from the data. The processing device organizes the identifying information into a data structure based on entities associated with the data and stores the data structure in a searchable repository, wherein the identifying information is located in the data structure by searching the searchable repository for the entities associated with the data. ... Red Hat

06/16/16 / #20160170901

Migration of virtual machines with shared memory

A system and method of migration of a vm sharing a memory region with another vm includes identifying, by an identification module, a plurality of vms running on a source host machine, where the plurality of vms includes first and second vms that share a first shared memory region coupled to the source host machine; identifying, by a target module, a host machine as a target for the second vm; allocating, by an allocation module, a second shared memory region coupled to the target host machine for the second vm; stopping, by a migration module, execution of the second vm on the source host machine; and migrating, by the migration module, the second vm to the target host machine.. . ... Red Hat

06/16/16 / #20160170810

Processor unplug in virtualized computer systems

A system and method for withdrawing virtual processors from virtual machines (vms) are disclosed. A hypervisor executed by a physical processor detects a measure of system load pertaining to a virtual processor of a virtual machine and withdraws the virtual processor from the virtual machine in view of the measure of system load.. ... Red Hat

06/16/16 / #20160170745

Tagging non-upstream source code

A method relates to identifying, by a processing device, a plurality of source code objects associated with an open source product stored in a version-controlled code repository, determining a first subset of the plurality of source code objects associated with a respective commit identifier indicating that each of the first subset of the plurality of source code objects is committed to the version-controlled code repository, determining a second subset of the plurality of source code objects not associated with any commit identifier of the version-controlled code repository, labeling each of the first subset of the plurality of source code objects as an upstream source code object, and labeling each of the second subset of the plurality of source code objects as a non-upstream source code object.. . ... Red Hat

06/16/16 / #20160170653

System and method for ballooning wth assigned devices

A system and method for ballooning with assigned devices includes inflating a memory balloon, determining whether a first memory page is locked based on information associated with the first memory page, when the first memory page is locked unlocking the first memory page and removing first memory addresses associated with the first memory page from management by an input/output memory management unit (iommu), and reallocating the first memory page. The first memory page is associated with a first assigned device.. ... Red Hat

06/16/16 / #20160169697

Time related points of interest for navigation system

A method performed by a computing system includes, with the computing system, providing a user with directions from a current location of the user to a destination, searching a database for a set of points of interest within a predefined distance from a route between the current location and the destination, the searching accounting for a deviation time value associated with each point of interest and a user received allotted time value, the allotted time value indicating a total amount of time the user has allotted for deviation from the route, the deviation time value indicating an estimated amount of time it takes to visit a corresponding point of interest, and presenting to the user, at least one point of interest with the corresponding visitation time value being less than the time deviation value.. . ... Red Hat

06/16/16 / #20160169678

Providing an instruction notification for navigation

A mechanism for providing an instruction notification for navigation. A method includes receiving destination data of a user device and generating default navigation instruction in view of the destination data. ... Red Hat

06/09/16 / #20160165010

Creation of a binding based on a description associated with a server

A description of an application programming interface (api) of a server system may be received at a client system. One or more methods associated with the api of the server system may be identified from the received description. ... Red Hat

06/09/16 / #20160162324

Manageable external wake of virtual machines

A processor of a computing system receives a message while a virtual machine that is hosted by the computer system is asleep. The processor determines whether to wake the virtual machine in view of a parameter of the message.. ... Red Hat

06/09/16 / #20160162111

Time based touch screen input recognition

A time based touch screen input recognition system detects a touch on a touch screen display by receiving a first signal indicating a start of the touch and starts a timer in response to the first signal. The system monitors a length of the touch as the touch continues, determines a current time period covering the length of the touch using a current value of the timer and identifies a first function corresponding to a current time period. ... Red Hat

06/02/16 / #20160154669

Hibernation via paravirtualization

Implementations describe hibernating virtual machines (vms). In one implementation, a method includes receiving, by a first virtual processor of a vm executed by a processing device, an instruction from a sleep-handling module of the vm to invoke a sleep function of a hypervisor executed by the processing device to manage the vm, transmitting, by the first virtual processor of the vm, a request to the hypervisor to put the vm to sleep, wherein the hypervisor, in response to the request, to stop the first virtual processor subsequent to stopping a second virtual processor of the vm, and initiating execution on the first virtual processor and on the second virtual processor responsive to the hypervisor re-starting the first and second virtual processors in response to a wake event.. ... Red Hat

06/02/16 / #20160154667

Manageable external wake of virtual machines

A manageable external wake of virtual machines. A processor of a computing system determines whether to wake a virtual machine in view of one or more parameters.. ... Red Hat

05/26/16 / #20160149999

Downloadable cartridges for a multi-tenant platform-as-a-service (paas) system

Implementations for downloadable cartridges for a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes parsing a cartridge manifest corresponding to a cartridge to determine a source location of files of the cartridge and causing the files of the cartridge to be obtained from the determined source location for use by at least one node of a multi-tenant paas system.. ... Red Hat

05/26/16 / #20160149824

Utilizing access control data structures for sharing computing resources

Systems and methods for sharing resources between multiple processing streams. An example method may comprise: maintaining, by a processing device, a first variable identifying a number of processing streams waiting to access a resource; performing an atomic operation on a second variable comprising a first portion and a second portion, the atomic operation comprising incrementing the first portion to reflect a number of available units of the resource and further comprising reading the second portion reflecting a value of the first variable.. ... Red Hat

05/26/16 / #20160149605

Subscriber identity module (sim) selection in multi-sim communication devices

A method relates to identifying, by a processing device, a plurality of subscriber identity modules (sims) coupled to the processing device, each of the plurality of sims storing data enabling a set of communication services provided by a respective one of a plurality of communication service providers, determining a request parameter comprising at least one of a time, a location of the processing device, or a destination to provide a first communication service, determining a plurality of cost rates to provide the first communication service by the respective one of the plurality of communication service providers in view of a cost rate table and the request parameter, selecting a first sim from the plurality of sims in view of the plurality of cost rates, and displaying, on a screen of the processing device, a first icon indicating the selected first sim to provide the first communication service.. . ... Red Hat

05/26/16 / #20160147888

Federation optimization using ordered queues

Methods, systems, and computer program products for optimization of query processing in a data federation system using priority queuing techniques are provided. Priority queuing techniques may include generating a query vector corresponding to a query, comparing the query vector to historical query vectors to determine similarity, determining an expected processing time for the query based on the determined similarity, and inserting the query into a priority ordered queue at a particular position based on the expected processing time.. ... Red Hat

05/26/16 / #20160147837

Multisource semantic partitioning

Methods, systems, and computer program products for processing a query to determine query results. The query may be analyzed to determine a constant column pair corresponding to the query. ... Red Hat

05/26/16 / #20160147576

Wake-up ordering of processing streams using sequential identifiers

Systems and methods for waking up waiting processing streams in a manner that reduces the number of spurious wakeups. An example method may comprise: assigning a first identifier of a sequence of identifiers to a processing stream in a waiting state; receiving a wakeup signal associated with a second identifier of the sequence of identifiers; comparing, by a processing device, the first identifier with the second identifier; and waking the processing stream responsive to determining, in view of comparing, that the processing stream began waiting prior to an initiation of the wakeup signal.. ... Red Hat

05/26/16 / #20160147559

Modification of context saving functions

A method for modifying a context saving function is disclosed. The method identifies a context saving function within a code fragment. ... Red Hat

05/26/16 / #20160147554

Hot-swapping storage pool backend functional modules

Systems and methods for hot-swapping storage pool backend functional modules of a host computer system. An example method may comprise: identifying, by a processing device of a host computer system executing a virtual machine managed by a virtual machine manager, a storage pool backend functional module; and activating the identified storage pool backend functional module by directing, to the identified storage pool backend functional module, backend storage function calls.. ... Red Hat

05/26/16 / #20160147551

Paravirtualized access for device assignment by bar extension

A hypervisor associates a combined register space with a virtual device to be presented to a guest operating system of a virtual machine, the combined register space comprising a default register space and an additional register space. Responsive to detecting an access of the additional register space by the guest operating system of the virtual machine, the hypervisor performs an operation on behalf of the virtual machine, the operation pertaining to the access of the additional register space.. ... Red Hat

05/26/16 / #20160147549

Optimizing virtual machine allocation to cluster hosts

Systems and methods for optimizing a virtual machine cluster. An example method may comprise receiving, by a processing device, an information characterizing a virtual machine cluster, the information comprising at least one of: values of one or more cluster configuration parameters, values of one or more cluster state parameters, or values of one or more user request parameters; and producing, in view of the received information, an ordered list of cluster configuration operations to be performed on virtual machines of the virtual machine cluster, the cluster configuration operations designed to yield a resulting configuration of the virtual machine cluster, wherein the resulting configuration is characterized by a quasi-optimal configuration score among configuration scores of two or more candidate configurations, the configuration score determined by applying one or more virtual machine scheduling policy rules to parameters of a candidate configuration.. ... Red Hat

05/26/16 / #20160147547

Metadata-based class loading using a content repository

An example method of loading classes from a content repository includes storing a set of files in a content repository. The set of files includes a representation of a set of classes. ... Red Hat

05/26/16 / #20160147529

Source code management for a multi-tenant platform-as-a-service (paas) system

Aspects of the disclosure provide for source code management for a multi-tenant platform-as-service (paas) system. A method of the disclosure includes creating, by a processing device of a platform-as-a-service (paas) system, a first container to host a first source code management repository for an application; receiving, at the first container, source code associated with the application; creating, by the processing device, a second container to provide deployment functionality for the application, the second container comprising resource-constrained processing space of a node of the paas system to execute functionality of the application; and deploying, by the processing device, the source code on the paas system using the second container. ... Red Hat

05/26/16 / #20160147443

Caching policies for solid state disks

Aspects of the disclosure provide for caching policies for solid state drives. A method of the disclosure includes receiving a request to perform a write operation of a first size; determining, by a processing device, a threshold of input/output i/o size in view of an average bandwidth of a solid state drive (ssd) and information related to i/o operations performed by at least one of the ssd or a hard disk drive (hdd); comparing the first size with the threshold of i/o size; and determining, by the processing device, whether the write operation is to be performed on the ssd or on the hdd in view of the comparison.. ... Red Hat

05/19/16 / #20160142484

Pattern-based object serving

Systems and methods for pattern-based object serving. An example method may comprise: receiving, by a processing device, an object access pattern and an identifier of an object container to be associated with object access requests by a client; receiving an object access request from the client; selecting an object in view of the object container and the object access pattern; and providing an identifier of the object to the client.. ... Red Hat

05/19/16 / #20160142479

Replication with adustable consistency levels

Replication in a distributed file system is described. A processing device receives a new data modification request from a client device. ... Red Hat

05/19/16 / #20160140141

File lookup in a distributed file system

A request to store a file in a directory of a volume associated with a distributed file system may be received. A server of a plurality of servers of the distributed file system that is associated with the file may be identified. ... Red Hat

05/19/16 / #20160140140

File classification in a distributed file system

A file may be identified and a plurality of rules associated with a plurality of storage servers may be received. An order for the rules may be identified. ... Red Hat

05/19/16 / #20160139962

Migrating a vm in response to an access attempt by the vm to a shared memory page that has been migrated

A hypervisor of a source host receives a request to migrate a group of virtual machines from the source host to a destination host. The hypervisor of the source host determines that a first virtual machine being migrated to the destination host shares a memory space on the source host with a second virtual machine on the source host. ... Red Hat

05/19/16 / #20160139942

Virtual machine input/output thread management

A method performed by a physical computing system includes detecting an interrupt signal sent to a virtual processor being managed by the hypervisor, creating a map between the virtual processor and an input/output (i/o) thread associated with the interrupt signal, determining that the virtual processor is idle, finding the i/o thread associated with the idle virtual processor based on the map, and moving the i/o thread associated with the idle virtual processor up in a processing queue, the processing queue being for processes to be executed on a physical processor.. . ... Red Hat

05/12/16 / #20160132566

Native federation view suggestion

Methods, systems, and computer program products for monitoring activity of data sources relating to data queries and data query responses, detecting events in the monitored activity, generating activity reports relating to the detected events; and analyzing the activity reports to determine view suggestions that may be used to optimize a federation engine.. . ... Red Hat

05/12/16 / #20160132556

Viewable suggestions for federation engine

Methods, systems, and computer program products for converting a query to a canonical query; inserting the query and the canonical query into a database; searching one or more viewable sets stored in the database to determine whether the canonical query is similar to one or more canonical queries associated with the one or more viewable sets; and upon determining a similar canonical query, returning a first view suggestion associated with a first viewable set of the one or more viewable sets that includes the similar canonical query.. . ... Red Hat

05/12/16 / #20160132322

Method and system for updating firmware

An example method of updating firmware includes receiving a memory map of a memory. The method also includes determining, based on the memory map, a set of memory regions storing a bundle of drivers in the memory, the bundle of drivers residing in firmware and being in an executable format. ... Red Hat

05/05/16 / #20160128077

Packet drop based dynamic receive priority for network devices

A hypervisor executed by a processing device retrieves a plurality of packets from a network device and forwards the packets to one or more virtual machines. The hypervisor determines a number of the plurality of packets successfully received by the one or more virtual machines, and when a function of the number is below a first threshold, decreases a priority for the network device associated with handling incoming packets.. ... Red Hat

05/05/16 / #20160127252

Guest-influenced packet transmission

A method performed by a physical computing system includes, with a hypervisor, receiving a first packet from a virtual machine managed by the hypervisor, the first packet for transmission to a destination, the first packet including a first queue identifier, selecting a first transmission queue from a plurality of available transmission queues to transmit the first packet, the first transmission queue being based on the first queue identifier, receiving a second packet from the virtual machine, the second packet for transmission to the destination, the second packet including a second queue identifier, and selecting a second transmission queue from the plurality of available transmission queues to transmit the second packet, the second transmission queue being based on the second queue identifier.. . ... Red Hat

05/05/16 / #20160125086

Non-blocking listener registration in the presence of data grid nodes joining the cluster

A method of communicating data in a node cluster of a data grid. The method includes receiving, at a listener of a first node, data from a second node that is filtered using the filter during a search query of a node cluster. ... Red Hat

05/05/16 / #20160125026

Proactive query migration to prevent failures

An example method of processing a federated query includes receiving a first federated query from a first client and receiving a second federated query from a second client. The first federated query includes a first source query that is in accordance with a target data source's query model, and the second federated query includes a second source query. ... Red Hat

05/05/16 / #20160125014

Registering data modification listener in a data-grid

A node including a memory to store data of the node and a processor coupled to the memory. The processor can receive, from a listener in a data grid system, a filter defined by search criteria of a search query. ... Red Hat

05/05/16 / #20160124955

Dual overlay query processing

An example method of processing a query at a plurality of storage devices includes receiving a dual query from a client and generating a synchronous query and an asynchronous query based on the dual query. The dual query includes a set of conditions for selecting data from a set of database tables. ... Red Hat

05/05/16 / #20160124817

Fault tolerant listener registration in the presence of node crashes in a data grid

A processing device to perform operations comprising receive, from a listener of a second node in a data grid system, a filter defined by search criteria of a search query. The operations can include determine, at the first node, that a third node in the data grid has crashed. ... Red Hat

05/05/16 / #20160124763

Limited virtual device polling based on virtual cpu pre-emption

A hypervisor executing on a computer system identifies a request of a guest operating system of a virtual machine associated with a shared device. The shared device comprises a shared memory space between a virtual processor of the virtual machine and the hypervisor and the virtual machine has a plurality of virtual processors. ... Red Hat

05/05/16 / #20160124762

Guest idle based vm request completion processing

A hypervisor identifies one or more interrupts of a networking device for a virtual machine. The hypervisor queues the interrupts and determines the execution state of at least one virtual processor of a virtual machine. ... Red Hat

05/05/16 / #20160124761

Idle based latency reduction for coalesced interrupts

A guest operating system of a virtual machine sends a request to a hypervisor to coalesce interrupts from a networking device. The guest operating system then monitors the execution state of an application on the virtual machine to detect when the application becomes idle. ... Red Hat

05/05/16 / #20160124753

Operating system load device resource selection

A method for booting is provided. A devices manager disables resources of a bootable device of a list of bootable devices having resource conflicts with a selected one of the list of bootable devices. ... Red Hat

05/05/16 / #20160124680

Live migration of virtual disks

Live migration of a virtual disk of a virtual machine between storage devices is described. In accordance with one example, a computer system prepares a first area of a first storage device and a second area of a second storage device for a live snapshot of a virtual disk of a virtual machine. ... Red Hat

04/07/16 / #20160100006

Transferring data between sites

The method including, receiving a transfer command at a transfer coordinator node of a first node cluster at a first site to initiate a transfer of data from the first node cluster to a second node cluster at a second site. The method further including causing a status of the second site to be switched from an inactive status to an active status at the nodes of the first node cluster. ... Red Hat

04/07/16 / #20160098484

Data source security cluster

Methods, systems, and computer program for implementing data source security cluster are provided. Security tokens may be generated for a plurality of data sources. ... Red Hat

04/07/16 / #20160098472

Map-reduce job virtualization

A method for map-reduce job virtualization is disclosed. The method includes receiving a map-reduce job written in a first map-reduce language. ... Red Hat

04/07/16 / #20160098399

Reuse of documentation components when migrating into a content management system

A method relates to receiving, by a processing device, a document comprising a first topic to be imported into a content management system, calculating a first signature of the first topic in view of content associated with the first topic, determining whether the first topic of the document is substantially similar to at least one of a plurality of topics stored in the content management system by comparing the first signature with a respective signature of the plurality of topics stored in the content management system, and in response to a determination that the first topic of the document is not substantially similar to any of the plurality of topics stored in the content management system, adding the first topic and the content associated with the first topic to the content management system.. . ... Red Hat

04/07/16 / #20160098346

Assisted garbage collection in a virtual machine

A method relates to receiving, by a processing device executing a virtual machine, bytecode comprising an object to be loaded into a memory space, the object being tagged with a garbage collection descriptor, wherein the garbage collection descriptor is generated according to an annotation to the object in a source code, determining, in view of the garbage collection descriptor, a region of the memory space to store the object, wherein the memory space comprises a first region to store a first set of objects that have survived less than a pre-determined number of rounds of garbage collection and a second region to store a second set of objects that have survived at least the pre-determined number of rounds of garbage collection in the first region, and storing the object in the region of the memory space.. . ... Red Hat

04/07/16 / #20160098294

Execution of a method at a cluster of nodes

Systems and methods are disclosed for executing a clustered method at a cluster of nodes. An example method includes identifying an annotated class included in an application that is deployed on the cluster of nodes. ... Red Hat

04/07/16 / #20160098159

Activity management tool

A method for providing an activity management tool includes receiving a user request for an activity overview, and identifying installed applications and open windows of the installed applications. The method further includes presenting an activity overview graphical user interface (gui) having a first area and a second area. ... Red Hat

03/31/16 / #20160094644

Process transfer between servers

According to one example, a method performed by a computing system includes, with a first server, receiving a process request, starting processing of the process request, prior to completing the processing of the process request, storing objects associated with a thread of the process request in an object database that is accessible by the second server, storing thread metadata for the thread of the process request in a metadata database that is accessible by the second server, and sending a transfer request to a switching manager, the transfer request being to request that the process request be shifted to the second server.. . ... Red Hat

03/31/16 / #20160092575

Stability measurement for federation engine

Methods, systems, and computer program products for implementing a stability measurement are provided. A computer-implemented method for measuring stability may include creating a destabilized data source for a data source, wherein errors are injected into the destabilized data source; sending test queries to the destabilized data source and the data source; and comparing results of the test queries in order to calculate a stability measurement.. ... Red Hat

03/24/16 / #20160087801

Cryptographically enforcing strict separation of environments

A system and method are disclosed for enforcing site or organization localized provisioning policy using cryptography. In an exemplary method, a signing key is used to generate a signature for an application. ... Red Hat

03/24/16 / #20160085861

Private cloud api

Methods, systems, and computer program for implementing a private cloud are provided. A computer-implemented method may include registering a private cloud in a central registry; retrieving private cloud registration data from the central registry; sharing the private cloud registration data with other users; and allowing other users to connect to the private cloud using the shared private cloud registration data.. ... Red Hat

03/24/16 / #20160085828

Just-in-time computation in a federated system

An example method for processing a federated query includes determining, at a data federation tool, a source query embedded in a federated query. The source query includes a name of a table and one or more conditions for selecting data from the table. ... Red Hat

03/24/16 / #20160085663

Automatic identification of software test cases

A method for identifying test case for software testing is disclosed. The method, receives a test case of a plurality of test associated with a software application. ... Red Hat

03/17/16 / #20160078073

System and method for content storage

A system and method of content storage includes a content store for storing a plurality of first content blocks and one or more first indexes, a content manager including one or more first content analyzers, and an interface for receiving access requests for the plurality of first content blocks. Each of the one or more first indexes includes a plurality of first entries for organizing a plurality of second content blocks from the plurality of first content blocks according to a respective organizational structure. ... Red Hat

03/17/16 / #20160077627

User interface for a device

A device includes a processor and a memory comprising machine readable instructions that when executed by the processor, cause the system to display information to a user through a display screen of the device, the display screen being positioned on a front side of the device, receive a first input from a first sensor placed on a left side of the device, the first input indicating a placement of at least one appendage along the first sensor, receive a second input from a second sensor placed on a right side of the device, the second input indicating a placement of at least one appendage along the second sensor, and execute a predefined function within an application running on the device, the predefined function being based on both the first input and the second input.. . ... Red Hat

03/10/16 / #20160072794

Client authentication

A client authentication system receives authentication requests associated with a web page in response to a client computing system requesting access to the web page. The authentication system determines whether a storage device contains configurations for the authentication requests. ... Red Hat

03/10/16 / #20160070744

System and method for reading file blocks

A system and method for reading file blocks includes reading an inode associated with the file from the file system, the inode including one or more first block pointers, determining a height of a file tree associated with the file, and determining whether a value of a second block pointer selected from the one or more first block pointers is consistent with the file having been stored using a block allocation pattern. When the value of the second block pointer is consistent with the file having been stored using the block allocation pattern the method further includes pre-fetching a plurality of file blocks based on the block allocation pattern, verifying that the pre-fetched file blocks are consistent with the file tree, and retrieving one or more data blocks of the file. ... Red Hat

03/10/16 / #20160070676

Server side documents generated from a client side image

A client receives a request for a report in a browser window. The client obtains data from a server to include in the report in view of the request and presents a graphical chart build from the obtained data in the browser window. ... Red Hat

03/10/16 / #20160070585

Virtual device hypervisor memory limited receive queuing

A hypervisor retrieves a packet written by a guest operating system of a virtual machine from hypervisor memory accessible to the guest operating system. The hypervisor then adds the packet of the guest operating system to at least one receive queue associated with a virtual device. ... Red Hat

03/03/16 / #20160065515

Providing centralized message notification

A mechanism for providing centralized message notification for user interface. Disclosed. ... Red Hat

03/03/16 / #20160065371

Private partition with hardware unlocking

Systems and methods for controlling access to a private partition on a storage device are disclosed for. An example system includes a token reader that detects a hardware token storing a private key and obtains the private key stored on the hardware token. ... Red Hat

03/03/16 / #20160063060

Peak data federation multizone splitting

An example method of submitting a federated query to one or more data sources belonging to a federation includes splitting a zone into a plurality of zone subsets. The zone includes a plurality of data sources belonging to a federation. ... Red Hat

03/03/16 / #20160062781

Dynamic batch management of shared buffers for virtual machines

Methods, systems, and computer program products for providing dynamic batch management of shared packet buffers are disclosed. A virtualized computer system may include a hypervisor with access to memory and executed by a processor to maintain a pool of host memory to store a plurality of incoming network packets received by a network device, adjust a number of memory buffers associated with the pool of host memory to resize the pool of host memory, receive an indication of an incoming network packet stored in the pool of host memory by the network device, and provide the incoming network packet to a guest. ... Red Hat

03/03/16 / #20160062779

Announcing virtual machine migration

Systems and methods for announcing virtual machine migration. An example method may comprise: receiving, by a first hypervisor running on a first computer system, a migration announcement from a virtual machine that is undergoing live migration from the first computer system to a second computer system; and transmitting a message comprising the migration announcement to a second hypervisor running on the second computer system.. ... Red Hat

02/25/16 / #20160057147

Modifying permission trees in a virtualization environment

A processing device receives a permission request indicating a user and an entity. The processing device modifies a permissions database to generate a modified database view. ... Red Hat

02/25/16 / #20160057053

Light-weight fork channels for clustering

A method for light-weight fork channels for clustering is disclosed. The method includes receiving, by a processing device, a message at a main channel used for group communication between processes executed by the processing device, identifying a fork channel identifier (id) and a fork stack id in a header of the message, processing the message with a fork stack corresponding to the fork stack id in the header of the message, the fork stack comprising a subset of protocols of a main protocol stack of the main channel, and providing the message to a fork channel corresponding to the fork channel id, wherein the fork channel to utilize the fork stack to separate messages for the fork channel from the main channel.. ... Red Hat

02/25/16 / #20160055108

Managing message signaled interrupts in virtualized computer systems

Systems and methods for managing message signaled interrupts in virtualized computer systems. An example method may comprise: intercepting, by a hypervisor running on a host computer system, a memory read operation initiated by a virtual machine with respect to a first interrupt mapping table, the first interrupt mapping table stored by a physical device associated with the virtual machine, the memory read operation specifying an offset relative to a base address of the first interrupt mapping table; reading at least part of the first interrupt mapping table; and returning, to the virtual machine, a value referenced by the offset within a second interrupt mapping table, the second interrupt mapping table residing in a memory of the host computer system.. ... Red Hat

02/18/16 / #20160050300

Zero-copy multiplexing using copy-on-write

Methods, systems, and computer program products for providing zero-copy multiplexing using copy-on-write are disclosed. Examples generally relate to both physical and virtualized computer systems. ... Red Hat

02/18/16 / #20160050145

Table-based load balancing for bonded network interfaces

Systems and methods for table-based load balancing implemented by bonded network interfaces. An example method may comprise: receiving, by a bonded interface of a computer system, a data link layer frame; identifying a network interface controller (nic) of the bonded interface associated, by a load balancing table, with a source media access control (mac) address of the data link layer frame, wherein the load balancing table comprises a plurality of load balancing entries, each load balancing entry mapping a source mac address to an identifier of a nic comprised by the bonded interface; and transmitting the data link layer frame via the identified nic.. ... Red Hat

02/18/16 / #20160048441

Localized representation of stack traces

Systems and methods are disclosed for providing a representation of a stack trace. An example method includes identifying an element in a stack trace. ... Red Hat

02/18/16 / #20160048402

Hash-based load balancing for bonded network interfaces

Systems and methods for hash-based load balancing implemented by bonded network interfaces. An example method may comprise: receiving, by a bonded interface of a computer system, a data link layer frame originated by a virtual machine; identifying a network interface controller (nic) of the bonded interface by calculating a value of a hash function of an identifier of the virtual machine and at least one of: a destination media access control (mac) address of the data link layer frame or a destination network layer address of a network layer packet comprised by the data link layer frame; and transmitting the data link layer frame via the identified nic.. ... Red Hat

02/11/16 / #20160043869

Secure remote kernel module signing

Implementations for a secure remote kernel module signing are disclosed. In one example, the method includes receiving an indicator of a public key associated with a client computing device, determining that the public key associated with the client computing device is in common with a public key associated with a first server computing device, compiling the script, signing the compiled script with a private key that is associated with the public key that is in common with the client computing device and the first server computing device without generating a new private key, and sending the signed compiled script to the client computing device.. ... Red Hat

02/11/16 / #20160042043

Providing messages for a java message service

Providing messages for java message service (jms) is disclosed. A described method includes determining timestamp information associated with a first java™ message service (jms) message. ... Red Hat

02/11/16 / #20160041881

Virtual machine high availability management

Systems and methods for virtual machine high availability management. An example method may comprise: identifying a virtual machine; receiving information pertaining to the virtual machine; initiating virtual machine availability management, wherein the availability management commences without virtual machine shutdown; detecting a failure of the virtual machine; and causing re-launch of the virtual machine using the received information.. ... Red Hat

02/04/16 / #20160034546

Optimizing loading of relational data for applications

A mechanism for optimizing loading of relational data for applications is disclosed. A method includes monitoring a plurality of requests selecting entities and processes to be executed for the selected entities. ... Red Hat

01/28/16 / #20160026547

Generating predictive diagnostics via package update manager

Embodiments relate to generating predictive diagnostics via a package update manager. A processing device can identify a set of package updates available to update a set of installed software packages on a client machine. ... Red Hat

01/28/16 / #20160026447

Console application through web service

A method performed by a server computing system includes generating an operation for a web service, the operation corresponding to at least one main method of a console application, receiving input data from a client device through the operation, writing the input data to a memory store, executing the console application using the input data of the memory store, injecting code into the console application, the code to change input/output streams from a console input/output to the memory store. The method further includes writing an output of the console application to the memory store.. ... Red Hat

01/21/16 / #20160021423

Content management with biometric feature recognition

A method includes storing metadata associated with content from at least one content source, determining that the content is being presented, receiving data representing a biometric attribute associated with a content consumer, determining that the content consumer is consuming the content, and updating the metadata associated with the content in response to determining that the content consumer is consuming the content.. . ... Red Hat

01/21/16 / #20160019232

Distributed deduplication using locality sensitive hashing

Deduplication in a distributed storage system is described. A deduplication manager identifies a data item that includes multiple data chunks. ... Red Hat

01/21/16 / #20160019077

Importing a running vm

A virtualization manager executing on a processing device adds a host to a list of hosts associated with the virtualization manager. The virtualization manager identifies a list of external vms running on the host that are not managed by the virtualization manager. ... Red Hat

01/14/16 / #20160014196

Authenticator plugin interface

Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first external authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal.. ... Red Hat

01/14/16 / #20160011895

Virtual machine context management

According to one example, a method performed by a physical computing system includes, with a hypervisor, detecting that a guest system running on a virtual machine has executed a halt instruction for a virtual processor of the virtual machine. The method further includes, with a physical processor, switching from a context of the virtual machine to a context of the hypervisor. ... Red Hat

01/07/16 / #20160006687

Adaptive load balancing for bridged systems

Methods, systems, and computer program products for providing adaptive load balancing for bridged systems are disclosed. Examples generally relate to both physical and virtualized computer systems. ... Red Hat

01/07/16 / #20160004524

Retiring target machines by a provisioning server

A provisioning server can provide and interact with an eraser agent on target machines. The eraser agent can execute on one or more target machines to erase all the contents of storage on the target machines. ... Red Hat








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###