Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Red Hat patents (2017 archive)


Recent patent applications related to Red Hat. Red Hat is listed as an Agent/Assignee. Note: Red Hat may have other listings under different names/spellings. We're not affiliated with Red Hat, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat-related inventors


Failure resistent volume creation in a shared storage environment

Systems and methods for data storage management technology that use task identifiers to manage tasks and ensure storage modifications occur without unnecessary task duplication. An example method may comprise: generating a task identifier on a first device; transmitting a request comprising the task identifier to create a task on a second device, the task being associated with the task identifier and comprising the allocation of a data storage portion on a shared storage; determining a reply to the task is missing; and in response to determining the reply is missing, detecting whether the task was created on the second device.. ... Red Hat

Operating system integrated application isolation

A system, method, and apparatus for operating system integrated application isolation. A snapshot manager creates a snapshot table including one or more pointers to a file system storage. ... Red Hat

Optimization of operating system and virtual machine monitor memory management

A method and system for collecting statistics associated with multiple memory nodes to determine if a read-only page is read accessed in aggregate by multiple processing devices of the multiple memory nodes at or above a first threshold value. If so, the read-only page may be replicated to an additional memory node. ... Red Hat

Secure live virtual machine guest based snapshot recovery

A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first virtual disk of the virtual machine including a snapshot identifier. ... Red Hat

Live storage domain decommissioning in a virtual environment

Implementations of the disclosure provide for live storage domain decommissioning in a virtual environment. A method of the disclosure includes identifying, by a processing device, a storage domain to decommission from a storage system. ... Red Hat

Committed program-code management

An association between two or more segments of committed program code can be determined so that the segments of committed program code can be used together for building a software project. For example, one or more communications can be received and indicate that two or more segments of program code are to be committed to one or more repositories associated with a software project. ... Red Hat

Plugin for software deployment

A plugin for a website browser can enable a user to deploy software onto a computing device quickly and easily. For example, the plugin can automatically detect that a user is visiting a website on which program code for a software application is shared or hosted. ... Red Hat

Virtual machine initiated memory deduplication

Methods, systems, and computer program products are included for initiating deduplication of memory by virtual machine guests. A method includes providing a virtual machine, by a hypervisor, and running a guest on the virtual machine. ... Red Hat

Hypervisor translation bypass

A system and method of translation bypass includes a hypervisor reserving a range of host virtual addresses. The hypervisor detects that a guest address is unmapped. ... Red Hat

Snapshot version control

Methods, systems, and computer program products are included for providing snapshot version control. A method includes creating a snapshot corresponding to a file system at a first point in time. ... Red Hat

Non-repudiable transaction protocol

A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide nro-w evidence of a work request from a client to the resource manager and provide nrr-w evidence to the client that the resource manager has completed initial work for the work request. ... Red Hat

Distributed file system with integrated file object conversion

Systems and methods for enhancing a distributed file system to provide multiple formats of a file object by creating the file object in a requested format. An example method may comprise: receiving, by a distributed file system comprising a plurality of nodes, a request for a file object in a first format; determining whether the file object in the first format is available on the distributed file system; in response to determining the file object in the first format is missing, querying a node of the plurality of nodes to determine whether the file object is available in a second format on the distributed file system; and creating, by a processing device of the distributed file system, the file object in the first format in view of a file object in the second format when the file object is available in the second format.. ... Red Hat

Preservation of modifications after overlay removal from a container

An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. ... Red Hat

Automated exception resolution during a software development session based on previous exception encounters

Automated exception resolution during a software development session based on previous exception encounters is disclosed. A first software development session of a user is monitored. ... Red Hat

11/30/17 / #20170344460

Exception resolution in a software development session

Mechanisms for exception resolution in a software development session are provided. An exception is detected during a software development session. ... Red Hat

11/30/17 / #20170344457

System for expression evaluation at debug time

A system for expression evaluation at debug time includes a debugger which receives an executable program with debugging information from a compiler, where the executable program with the debugging information is generated by compiling a source code program and generating debugging information corresponding to the executable program. The compiler embeds at least a first abstract syntax tree of a first expression of the source code program in the debugging information. ... Red Hat

11/23/17 / #20170337208

Collecting test results in different formats for storage

Systems and methods are provided for storing test results. An example method includes receiving a notification that a job has completed execution in a test execution server. ... Red Hat

11/23/17 / #20170337074

Hypervisor-visible guest thread management

Responsive to receiving a first request from an application to create a thread for the application, a guest operating system sends a first notification to a hypervisor to create a dedicated virtual processor for the thread. Responsive to receiving an identifier associated with the dedicated virtual processor from the hypervisor, the guest operating system starts the thread using the dedicated virtual processor, and pins the thread to the dedicated virtual processor.. ... Red Hat

11/23/17 / #20170337073

System and method for configuring a virtual device

Methods, systems, and computer program products are included for providing a virtual machine guest with access to a host device. A method includes providing a hypervisor with access to an enhanced allocation capability entry of a host device. ... Red Hat

11/23/17 / #20170337054

Source to image transformation pipeline for a platform-as-a-service system

Implementations provide for a source to image transformation pipeline for a platform-as-a-service (paas) system. A method of the disclosure includes receiving a request to create an application for execution on a platform-as-a-service (paas) system, identifying, by a processing device, at least one of language or a framework corresponding to the application, identifying, by the processing device, a build image corresponding to the identified at least one of the language or the framework, constructing, by the processing device, a build configuration object, a deployment configuration object, and a networking configuration object for the application, and transmitting, by the processing device, the build configuration object, the deployment configuration object, and the networking configuration object to the paas system to enable the paas system to build and deploy the application at one or more nodes of the paas system without user intervention.. ... Red Hat

11/16/17 / #20170329618

Modification of write-protected memory using code patching

Systems and methods are provided for modifying a set of memory pages. An example method includes loading kernel code and patching code of a kernel into a guest memory. ... Red Hat

11/09/17 / #20170323024

Camera-activated data transfer from a source computing device to a target computing device

Mechanisms for transferring data from a source computing device to a target computing device are provided. A filename identifier (id) that identifies a file stored on the source computing device is presented on a display device. ... Red Hat

10/26/17 / #20170310494

Measuring resource consumption in a multi-tenant platform-as-a-service (paas) system

Implementations for measuring resource consumption in a cloud provider system are disclosed. A method of the disclosure includes determining that a resource of an application of a cloud provider system is initializing, determining whether each operation in a list of initialization operations used in the initialization of the resources is performed successfully, prior to a create usage record operation in the list of initialization operations, in response to determining that each of the initialization operations prior to the create usage record operation in the list of initialization operations is performed successfully, creating a usage record for the resource using the create usage record operation based on a threshold usage level associated with the application, and in response to determining that at least one of the initialization operations prior to the create usage record operation in the list of initialization operations has failed, performing a roll-back operation or a re-try operation for the at least one of the initialization operations that has failed.. ... Red Hat

10/26/17 / #20170308312

Disk image deletion with failure resistent data erasure

Systems and methods for disk image deletion with failure resistant data erasure. An example method may comprise: receiving a request to delete a first disk image associated with a data storage portion; associating the data storage portion with a second disk image responsive to receiving the request to delete the first disk image; deleting the first disk image; and initiating a data erasure procedure on the data storage portion.. ... Red Hat

10/12/17 / #20170295228

Using a shared data store for peer discovery

An example method includes: identifying, by a new node, an address of a shared data store comprising information on a current membership in a peer-to-peer system, wherein the shared data store is shared by a plurality of nodes that are current members of the peer-to-peer system, wherein the shared data store is a container for storing data in a storage cloud; sending, by the new node, a first message comprising an address of the new node to the shared data store; requesting, by the new node, at least one membership data structure from the shared data store; receiving, by the new node, a second message comprising the at least one membership data structure; generating, by the new node, a new membership data structure comprising the address of the new node and the plurality of addresses for the plurality of nodes identified in the at least one membership data structure; sending, by the new node, a third message comprising the new membership data structure to the shared data store; and joining, by the new node, the peer-to-peer system, wherein the joining comprises using the new membership data structure to identify nodes of the plurality of nodes to receive a plurality of messages from the new node.. . ... Red Hat

10/12/17 / #20170295059

Distributed remote execution

A remote execution request is received from a client, specifying first and second remote execution tools and execution data pertaining to the tools and comprising a query to select host machines. First and second host machines are selected in view of a result of the query and the first and second tools. ... Red Hat

10/05/17 / #20170286445

Migrating lock data within a distributed file system

Systems and methods for migrating locking data for a file system object within a distributed file system. An example method may comprise: initiating a transfer of locking data from a first node of a distributed file system to a second node of the distributed file system, wherein the locking data is associated with a file system object and comprises a connection identifier indicating a connection between a client requesting a lock and the first node; constructing a modified connection identifier that indicates a connection between the client and the second node; and updating the second node to include the locking data with the modified connection identifier.. ... Red Hat

10/05/17 / #20170284815

Providing an instruction notification for navigation

A mechanism for providing an instruction notification for navigation. A method includes receiving destination data of a user device and generating default navigation instruction in view of the destination data. ... Red Hat

09/28/17 / #20170277572

Migration of network entities to a cloud infrastructure

A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (sla) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an sla for each node of the migration group with a provider of the cloud computing infrastructure in view of sla information from the corresponding migration configuration file.. ... Red Hat

09/21/17 / #20170272399

Managed ldap entries

A method and apparatus for maintaining in a lightweight directory access protocol (ldap) repository entries that are managed by an ldap directory server. An ldap directory server receives a client request to add a specified entry to an ldap repository, determines, based on a managed entry configuration, that the specified entry requires a managed entry operation, and adds the specified entry to the ldap repository. ... Red Hat

09/21/17 / #20170270287

Methods and apparatus for using credentials to access computing resources

Mechanisms for controlling access to credentials are disclosed. A computing device receives, at a first time, a request associated with a user to initiate a plurality of actions against a computing resource of a plurality of computing resources, the request including a credential identifier that identifies a credential. ... Red Hat

09/21/17 / #20170270135

Distributed deduplication using locality sensitive hashing

Deduplication in a distributed storage system is described. A deduplication manager defines a first extent on a first node in a distributed storage system. ... Red Hat

09/21/17 / #20170270028

System, method and apparatus for debugging of reactive applications

A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. ... Red Hat

09/14/17 / #20170262462

Correcting a volume chain after a volume creation failure is detected

A system and method are disclosed for detecting and handling volume creation failures. In one implementation, a request to create a new volume in a volume chain for a virtual machine is received. ... Red Hat

09/14/17 / #20170262270

Configuration of an application in a computing platform

A platform executing on a computer system identifies a capability to be used by an application based on an application descriptor for the application and determines a component that provides the capability based on a component descriptor of the component. The platform identifies an additional capability to be used by the component based on the component descriptor and determines an additional component that provides the additional capability. ... Red Hat

09/07/17 / #20170255548

Method and system for dynamically updating data fields of buffers

A computing system can include memory management capabilities. In one embodiment, the system receives a request to update a first size of each of a plurality of portions of memory to a second size. ... Red Hat

09/07/17 / #20170255539

Obtaining application performance data for different performance events via a unified channel

A system for obtaining performance data for different performance events includes a first application monitoring performance of a second application executing on a computing system. The first application identifies the type of event to be measured with respect to the second application, issues a first system call identifying the type of event, receives an identifier corresponding to the event type, and causes the second application to begin execution. ... Red Hat

08/31/17 / #20170251082

Dynamic cache-efficient event suppression for network function virtualization

A system and method for dynamic cache-efficient event suppression includes recording, by a system processor, a quantity of messages received from a client during an interval of time between at least two events of a plurality of events. The system processor is in communication with a shared memory having a register with a first field, a second field, and a third field. ... Red Hat

08/31/17 / #20170251076

Quality of service in a distributed system

A method is provided that includes receiving a tenant identifier. The method also includes identifying a quality of service (qos) policy associated with a tenant identified by the tenant identifier, by looking up the tenant identifier in a memory data structure. ... Red Hat

08/31/17 / #20170251047

Syslog advertisements

A computer system identifies a pattern of log messages in view of an alarm rule. The computer system generates one or more log messages in view of the identified pattern of messages. ... Red Hat

08/31/17 / #20170251019

Secure performance monitoring of remote application servers

Mechanisms for obtaining performance metric information securely are provided. A first application server executing on a computing device comprising a processor establishes that communications with a plurality of remote application servers utilize an encrypted communication protocol. ... Red Hat

08/31/17 / #20170250988

Access guards for multi-tenant logging

Implementations of the present disclosure provide access guards for multi-tenant logging. A method of the disclosure includes receiving, by a processing device of a multi-tenant system, an access request to access a logging stack comprising application logs associated with an execution of an application. ... Red Hat

08/31/17 / #20170250910

Routing traffic between networks governed by different versions of the internet protocol

Systems and methods for routing traffic between networks governed by different internet protocol (ip) versions. An example method may comprise: receiving a network packet having an original source address defined in a first address space and an original destination address defined in the first address space, wherein the first address space is associated with a first open systems interconnection (osi) network layer protocol; identifying, using a network layer address mapping transformation, a new destination address associated with the original destination address, wherein the new destination address is defined in a second address space associated with a second osi network layer protocol; substituting the original destination address of the network packet with the new destination address; selecting, from a pool of available network layer addresses defined in the second address space, a new source address; substituting the original source address of the network packet with the new source address; and causing the network packet to be transmitted to a destination host identified by the new destination address.. ... Red Hat

08/31/17 / #20170250886

Network traffic capture analysis

A method relates to receiving, by a processing device, a plurality of data items, wherein each data item of the plurality of data items comprises at least part of a network packet captured at a network access point, identifying a group of data items representing network packets having a common source open systems interconnect (osi) layer 3 (network layer) address and a common destination network layer address, identifying a plurality of subsets of the identified group, wherein all data items comprised by a particular subset of the plurality of subsets represent network packets that share a common sequence number, determining a packet retransmission rate in view of a number of data items in the group and a total number of data items in the identified plurality of subsets, determining that the packet retransmission rate exceeds a threshold value, and causing an alert message to be presented via a user interface, the alert message indicating a high packet retransmission rate between the common source network layer address and the common destination network layer address.. . ... Red Hat

08/31/17 / #20170250876

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user.. ... Red Hat

08/31/17 / #20170250871

Skeletal refresh for management platforms

A method of implementations includes determining, by a processing device in a management platform, an occurrence of an inventory event in a computing environment managed by the management platform, wherein the computing environment comprises a plurality of managed objects, and invoking a relationship handler to obtain identifying attributes for a target managed object corresponding to the inventory event. The relationship handler is further to update the identifying attributes and relationship attributes corresponding to the target managed object in an inventory tree maintained by the management platform, the relationship attributes comprising an identification of affiliations between two or more managed objects and for each managed object affiliated to the target managed object, and schedule a job in a message queue to update each of the attributes for the managed object, the detailed attributes comprising attributes of the managed object that are not identifying attributes or relationship attributes.. ... Red Hat

08/31/17 / #20170250865

Customizable event processing for third party infrastructure events

A processing device receives a request to include a custom action in a processing definition. The custom action is to be performed in response to an occurrence of an infrastructure event in a third party infrastructure platform. ... Red Hat

08/31/17 / #20170250863

Centralized configuration data in a distributed file system

A request to change a configuration of a distributed file system that includes servers may be received. A subset of the servers that corresponds to a configuration cluster may be identified. ... Red Hat

08/31/17 / #20170250857

Managing computing infrastructure events having different event notification formats

A processing device receives event notifications for occurrences of infrastructure events from a different event sources. The event notifications have different formats to represent a same type of infrastructure event. ... Red Hat

08/31/17 / #20170250837

Packet tunneling in a wireless network

A communication pathway or tunnel can be established between a service node (or other similar node) of a wireless network and an external network using software-defined networking. Packet-based communications can be routed through the wireless network using the communication pathway without requiring a specific node, such as a gateway node, for interfacing with the external network. ... Red Hat

08/31/17 / #20170250824

Efficient certificate revocation list processing

Efficient certificate revocation list (crl) processing is disclosed. A desired modification to an encoded crl is determined. ... Red Hat

08/31/17 / #20170250817

Securing code loading by a guest in a virtual environment

Methods, systems, and computer program products are included for loading a code module. A method includes verifying, by a guest, a digital signature of a code module stored in an initial guest memory buffer. ... Red Hat

08/31/17 / #20170249477

Securing delegated remote management with digital signature

A system and method of executing a script includes receiving, by a service user account module, a user script from a first user account. The method includes issuing, by a management system, execution data including the user script and validation parameters. ... Red Hat

08/31/17 / #20170249469

Accessing file systems in a virtual environment

An access control engine can enable a host operating system to propagate a private resource of an isolated virtual environment, such as a container, running on the host operating system outside of the isolated virtual environment. The private resource can include, for example, a file system mounted within the isolated virtual environment. ... Red Hat

08/31/17 / #20170249465

Host-driven application memory protection for virtual machines

A memory protection system includes a memory, one or more physical processors, a hypervisor, and a virtual machine including a guest os executing on the one or more processors. The hypervisor notifies the guest os of a first location of a first device and a second location of a second device. ... Red Hat

08/31/17 / #20170249458

Application memory protection using a host page table switching virtual machine function

A hypervisor generates first and second page views, where a guest physical address points to a first page of the first page view and a second page of the second page view. A first pointer value is written to the first page and a second pointer value is written to the second page. ... Red Hat

08/31/17 / #20170249457

Secure receive packet processing for network function virtualization applications

A transmit packet processing system includes a memory, one or more processors in communication with the memory, and an operating system. The one or more processors execute a packet processing thread and a rearming thread. ... Red Hat

08/31/17 / #20170249374

Container clustering in a container-based architecture

Implementations provide for container clustering in a container-based architecture. A method of the disclosure includes generating by a processing device executing a container deploying an instance of an application image, a domain name server (dns) query to request identification of other containers in a container cluster. ... Red Hat

08/31/17 / #20170249373

Granular entry self-healing

A processing device on a first server in a distributed file system detects that the first server has rebooted after being out of service for a period of time. The processing device sends a request to a second server to determine whether a file index stored on the second server comprises any entries corresponding to replicas of a directory in the distributed file system. ... Red Hat

08/31/17 / #20170249351

Removable data volume management

A method performed by a computing system includes detecting that a removable data volume has been attached to the computing system, the removable data volume being identified by a unique label. The method further includes, in response to determining that a portion of the unique label matches a predefined value, invoking a catalog container based on a rule within a first rule database. ... Red Hat

08/31/17 / #20170249335

Snapshot management in distributed file systems

A system and method are disclosed for managing snapshots of a distributed file system. In accordance with one implementation, a list of snapshots of a file system is presented to a user, where the snapshots include one or more active snapshots and one or more inactive snapshots. ... Red Hat

08/31/17 / #20170249334

Granular data self-healing

A granular data self-healing manager in a file system is described. A first storage server of the file system receives a request to perform an operation on the data file. ... Red Hat

08/31/17 / #20170249327

Detecting stale storage layouts without using client locks

Systems and methods for reducing locks on a storage layout of a distributed file system by detecting and notifying clients of stale storage layouts. An example method may comprise: receiving a request to modify a file system object associated with a storage layout, the request comprising an index range and the storage layout comprising an index range; determining whether the request is associated with a stale storage layout in view of a comparison of the index range of the request and the one or more index ranges of the storage layout; receiving a lock request to prevent changes to the storage layout; and transmitting at least a portion of the storage layout to update the stale storage layout.. ... Red Hat

08/31/17 / #20170249304

File system quota versioning

A system and method for handling file system quotas are disclosed. In one implementation, a processing device receives a first command to disable a quota capability of a file system. ... Red Hat

08/31/17 / #20170249263

Kernel transitioning in a protected kernel environment

Methods, systems, and computer program products are included for providing one or more additional kernels kernel in a protected kernel environment. A method includes providing, by a hypervisor, a virtual machine that includes a first kernel. ... Red Hat

08/31/17 / #20170249252

Cache block apparatus and methods

A method and apparatus for creating and using cached blocks of bytecode are disclosed. An example apparatus includes a virtual machine execution engine configured to load an input variable value in conjunction with starting execution of bytecode associated with an application. ... Red Hat

08/31/17 / #20170249240

Automated test planning using test case relevancy

A test automation tool detects a first set of parameters defining one or more software environments to be tested, where the first set of parameters includes at least a component to be tested. The test automation tool then identifies a general test plan, where the general test plan includes a first set of test cases, and where the first set of test cases are defined by the first set of parameters. ... Red Hat

08/31/17 / #20170249236

Kernel tracing in a protected kernel environment

Methods, systems, and computer program products are included for performing tracing in a protected kernel environment. A method includes scanning at least a portion of a kernel to locate one or more instructions. ... Red Hat

08/31/17 / #20170249230

Breakpoint insertion into kernel pages

A method includes, with a hypervisor, receiving a first request from a guest'to write a first piece of data to a first memory location within a kernel code page. The method further includes determining that the first request triggers a violation based on a kernel protection mechanism, and in response to determining that the first request triggers the violation, determining that the first piece of data includes a breakpoint. ... Red Hat

08/31/17 / #20170249216

Native snapshots in distributed file sytems

Methods and systems are disclosed to initiate a snapshot of a volume distributed across a plurality of storage nodes of a distributed file system. The systems may create in the plurality of storage nodes a writeable sub-volume associated with the volume of the distributed file system. ... Red Hat

08/31/17 / #20170249199

Correlation-based monitoring and events for a unified storage manager

A method of implementations includes receiving, by a processing device executing a unified storage manager (usm), notification of an event from a storage entity of a storage service managed by the usm, referencing a rule set maintained by the usm with information corresponding to the event, identifying, in view of the referencing, a rule from the rule set, executing a handler function and an action from the identified rule, the handler function to cause the event to be resolved by the storage service, determining a cascading rule from the action, executing the cascading rule to cause the event to be resolved at other storage entities associated with the storage entity corresponding to the event, and notifying, according to the action, a user of the event.. . ... Red Hat

08/31/17 / #20170249196

Interacting with a source object via a virtual object

An example method of interacting with a source object via a virtual object, the method includes associating a first set of properties of a virtual object with a second set of properties of a source object that is defined in a program. The method also includes defining a set of functions corresponding to the associated first and second sets of properties and receiving a first request to instantiate the virtual object. ... Red Hat

08/31/17 / #20170249181

Dynamic guest virtual machine identifier allocation

An example method of updating a virtual machine (vm) identifier (id) stored in a memory buffer allocated from guest memory includes supplying firmware to a guest running on a vm that is executable on a host machine. The firmware includes instructions to allocate a memory buffer. ... Red Hat

08/31/17 / #20170249179

Guest initiated atomic instructions for shared memory page host copy on write

A guest os detects a dma write request for a device assigned to the guest os to perform a dma write to a shared page of memory that has a write protection attribute to cause a protection page fault upon an attempt to write to the shared page of memory. The guest os reads a portion of the shared page of memory from a location of that page, determines the value of the portion, and executes an atomic instruction that writes the value back to the location of the shared page of memory to trigger the page protection fault. ... Red Hat

08/31/17 / #20170249178

Kernel state data collection in a protected kernel environment

Methods, systems, and computer program products are included for collecting kernel data in a protected kernel environment. A method includes allocating a first portion of a memory for a first kernel and reserving a second portion of the memory for a second kernel. ... Red Hat

08/31/17 / #20170249177

Extending user interface of a web console

A method relates to launching, by a processing device executing a virtual machine deployment application, an asset server communicatively coupled to a data storage, launching a container comprising a file server that stores configuration data associated with a web console, wherein the web console provide a user interface to access the virtual machine deployment application, recording, in a configuration data structure residing in the data storage, a network address associated with the container, retrieving, by the asset server, the configuration data stored in the file server using the network address recorded in the configuration data structure, and providing the configuration data to a cache associated with the web console to modify the user interface.. . ... Red Hat

08/31/17 / #20170249176

Systems and methods for configuration knowledge search

Various examples are directed to systems and methods for searching for possible configuration for software, for example, middleware. A computing device may collect and store user statistics of a configuration of the middleware in a designated database. ... Red Hat

08/31/17 / #20170249175

Customizable virtual machine retirement in a management platform

The subject matter of this specification can be implemented in, among other things, a method that includes responsive to occurrence of a virtual machine (vm) retirement event, invoking, by a processing device in a management platform, a vm retirement state machine of the management platform to handle retirement of a vm corresponding to the vm retirement event, setting, via the vm retirement state machine, a vm retirement attribute corresponding to the vm to a retiring state, determining, via the vm retirement state machine, that the vm is in a correct state to retire, performing, via the vm retirement state machine, user-customized pre-retirement processes corresponding to the vm, retiring, via the vm retirement state machine, the vm, and setting, via the vm retirement state machine, the vm retirement attribute to a retired state.. . ... Red Hat

08/31/17 / #20170249174

Module management in a protected kernel environment

Methods, systems, and computer program products are included for performing module unloading in a protected kernel environment. A method includes loading a module into a kernel, the module including an exit function. ... Red Hat

08/31/17 / #20170249173

Guest protection from application code execution in kernel mode

Systems and methods are disclosed for securing an application running on a guest. An example method includes detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application. ... Red Hat

08/31/17 / #20170249162

Safe transmit packet processing for network function virtualization applications

A transmit packet processing system includes a nic, a memory, one or more processors in communication with the memory, and a device driver. The memory has a first set and a second set of physical memory pages. ... Red Hat

08/31/17 / #20170249141

Hot deployment in a distributed cluster system

Implementations provide for a source to image framework for a platform-as-a-service (paas) system in a distributed cluster system that can apply modifications to source code. A method of the disclosure includes invoking source-to-image (sti) methodology to execute an instance of an application image. ... Red Hat

08/31/17 / #20170249128

Maintaining build secrets in a build container

Implementations provide for a container-based architecture that can maintain build secrets. A method of the disclosure includes storing a file in a destination directory of a build container. ... Red Hat

08/31/17 / #20170249127

Add-on image for a platform-as-a-service system

Implementations provide for an add-on image framework for a platform-as-a-service (paas) system. A method of the disclosure includes launching a build container for a build process based on a base image of an application of a multi-tenant platform-as-a-service (paas) system. ... Red Hat

08/31/17 / #20170249106

Multiple input-output memory management units with fine grained device scopes for virtual machines

A system and method of emulated input-output memory management units includes a management software associating a first device with a first input-output memory management unit having a first security designation, and associating a second device with a second input-output memory management unit having a second security designation different from the first security designation. A hypervisor constructs a table that describes associations between the plurality of devices and the plurality of input-output memory management units. ... Red Hat

08/31/17 / #20170249090

Scalable page migration after memory de-duplication

A system and method of de-duplication includes receiving a first page, scanning a first structure, identifying a first match, determining a quantity of mappings to the first match is less than a threshold, and adding a first mapping to the first match. The method includes receiving a second page, scanning the first structure, identifying the first match, determining the quantity of mappings to the first match meets the threshold, and storing the second page in a second structure. ... Red Hat

08/31/17 / #20170249088

Adding or removing a storage provider in a unified storage manager

A method of implementations includes receiving, by a processing device executing a unified storage manager (usm), an update package comprising a configuration file for a storage service to add to the usm, adding, by the processing device, the configuration file to a set of configuration files maintained by the usm, responsive to detecting the addition of the configuration file, causing, by the processing device, a re-load of the set of configuration files at the usm without a shutdown and re-start of the usm, loading, by the processing device, the configuration file in the usm, and initializing, by the processing device, an adaptor component for the storage service at the usm, the adaptor component comprising a set of application programming interface (api) methods for the usm to communicate with the storage service.. . ... Red Hat

08/31/17 / #20170249082

Determining status of a host operation without accessing the host in a shared storage environment

Implementations of the disclosure provides for determining status of a host operation without accessing the host in a shared storage environment. A method of the disclosure includes acquiring, by a processing device, a lease on a storage volume associated with a storage domain. ... Red Hat

08/24/17 / #20170244557

Multiple encryption keys for a virtual machine

A method includes, with a computing system, exiting a context of a virtual machine, the exiting in response to a request from a guest operating system of the virtual machine to switch from a first encryption key identifier for the virtual machine to a second encryption key identifier for the virtual machine. The method further includes, with the computing system, loading the second encryption key identifier into a virtual machine control module of a virtual processor of the virtual machine and after loading the second encryption key identifier, entering the context of the virtual machine.. ... Red Hat

08/24/17 / #20170242811

Multi-queue device assignment to virtual machine groups

A system and method of device assignment includes receiving an assignment request to assign a device to a plurality of guest virtual machines. The plurality of guest virtual machines includes a first guest virtual machine with a first guest memory having a first physical address and a second guest virtual machine with a second guest memory having a second physical address. ... Red Hat

08/24/17 / #20170242761

Fault tolerant listener registration in the presence of node crashes in a data grid

A processing device to receive, from a second node in the data grid system, a first filter. The processing device may detect a failure of a third node of the data grid system. ... Red Hat

08/24/17 / #20170242755

Failure recovery in shared storage operations

Systems and methods for failure recovery in shared storage operations. An example method comprises: acquiring a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image; creating a component of a new volume associated with the disk image; destroying the transaction marker; and releasing the lock with respect to the storage domain.. ... Red Hat

08/24/17 / #20170242726

Batched commit in distributed transactions

Various examples are directed to systems and methods for executing distributed transactions. A transaction manager may send to a resource manager a first prepare message that describes a first work item to be performed by the resource manager for a first transaction. ... Red Hat

08/24/17 / #20170242721

Protection from guest interrupts in a virtual machine function

An example method for secure virtual machine access to a protected virtual machine function includes storing a first virtual machine function instruction, which is executable to configure access privileges of a guest according to a trampoline view, as a last instruction on a first trampoline page. The method also includes storing a clear interrupt flag instruction as a first instruction on a second trampoline page. ... Red Hat

08/24/17 / #20170242719

Securing code loading in a virtual environment

Methods, systems, and computer program products are included for loading a code module. A method includes providing, by a hypervisor, a virtual machine that includes a guest operating system. ... Red Hat

08/24/17 / #20170242617

Size adjustable volumes for containers

Implementations of the disclosure provide for size adjustable volumes for containers. A method of the disclosure includes determining, by a processing device of the paas system, a size used space in a storage volume with respect to a container associated with an execution of an application. ... Red Hat

08/17/17 / #20170236062

Thread coordination in a rule engine using a state machine

A processing device executes a multi-threaded rule engine having multiple threads. A first thread is associated with user interactions. ... Red Hat

08/17/17 / #20170235765

Overlay-based file tagging using virtual file systems

Systems and methods for overlay-based file tagging using virtual file systems. An example method may include: receiving, from a file system client, a request to perform a file operation with respect to a file; identifying a part of the file name representing a mount point of a virtual file system associated with the file; identifying a memory pointer associated with the mount point; identifying, using the memory pointer, an instance of a class implementing the virtual file system; retrieving the metadata associated with a file using a memory data structure associated with the instance of the class, the memory data structure comprising a plurality of records, each record associating a file identifier with a metadata item; and performing the file operation using the metadata associated with the file.. ... Red Hat

08/17/17 / #20170235755

Replication of data in a distributed file system using an arbiter

A request to perform a write operation on a file stored in a distributed file system that includes a first and second storage server and an arbiter system may be received. An identification of whether whether one of the first or second storage servers is available to perform the write operation and that the other of the first or second storage servers is not available to perform the write operation may be performed. ... Red Hat

08/17/17 / #20170235741

Disassembly and reassembly of a tar archive

Mechanisms for disassembling and reassembling a tar archive are disclosed. A computing device accesses a tar archive comprising a file payload data segment and a plurality of non-payload data segments. ... Red Hat

08/17/17 / #20170235679

Non-uniform memory access support in a virtual environment

Methods, systems, and computer program products for configuring devices in a virtual environment are described. An example method includes determining a numa node assigned to a virtual machine. ... Red Hat

08/17/17 / #20170235613

Automatically scaling up physical resources in a computing infrastructure

A processing device determines that utilization of a resource that is executing a workload meets a utilization threshold. The resource is part of multiple resources in a cluster. ... Red Hat

08/10/17 / #20170230308

Cloud-based service resource provisioning based on network characteristics

A network characteristic of current resources providing a network service may be identified. A determination as to whether the network characteristic of the current resources satisfies a load policy may be made. ... Red Hat

08/10/17 / #20170230266

Evaluating resource performance from misaligned cloud data

A processing device sends a request to a cloud provider for data for a metric for a particular resource being provided by the cloud provider, receives one or more data steams for the metric for the particular resource from the cloud provider. The one or more data streams includes data points over a specified period of time. ... Red Hat

08/10/17 / #20170228412

Certificate based expiration of file system objects

Systems and methods for enhancing file systems with file system objects that automatically expire. An example method may comprise: initiating a creation of a file system object in a file system; determining an expiration time for the file system object in view of an expiration policy; transmitting a request to create a certificate associated with the file system object, the request to create the certificate comprising the expiration time for the file system object to include in the certificate; and upon receiving the certificate associated with the file system object, causing the certificate to be stored with a plurality of certificates, wherein the certificate is to indicate whether the file system object is valid at a point in time.. ... Red Hat

08/10/17 / #20170228409

In-memory journaling

Systems and methods for indexing and searching an event log to determine whether an object of a file system is current. An example method may comprise: arranging a plurality of events into multiple segments, the plurality of events comprising operations affecting a plurality of objects; generating multiple indexes in view of the one or more segments, the indexes comprising a composite index representing the plurality of objects modified by the plurality of events; and inspecting the composite index to determine an object of the plurality of objects is modified by at least one of the plurality of events.. ... Red Hat

08/10/17 / #20170228392

Deduplicated file system

An apparatus and a method for maintaining a file system is described. A method may include receiving a request for allocating a first block of a file system to a file, the first block comprising a first data from the file. ... Red Hat

08/10/17 / #20170228390

Hash-based mount point lookup in virtual file systems

Systems and methods for performing hash-based mount point lookup in virtual file systems. An example method may include: receiving a first character string representing a file name; identifying, within an array of mount point strings, a second character string having a second string length not exceeding a first string length of the first character string; responsive to ascertaining that the first character string comprises the second character string, identifying a file system object associated with a mount point path represented by the second character string; and utilizing the file system object to access a file referenced by the file name.. ... Red Hat

08/10/17 / #20170228271

Page fault-based fast memory-mapped i/o for virtual machines

Implementations provide for page fault-based fast memory-mapped i/o for virtual machines. A method of the disclosure includes detecting, by a processing device executing a hypervisor on a host machine, a protection fault at the hypervisor, the protection fault caused by a guest of the hypervisor attempting to write to an address marked as valid and read-only in a host page table entry at the hypervisor, the address associated with memory-mapped input-output (mmio) for a virtual device of the guest, referencing, by the processing device, a mmio data structure of the hypervisor with the address that caused the protection fault, identifying, by the processing device, the virtual device and a mmio-based instruction mapped to the address in the mmio data structure at the hypervisor, and executing, by the processing device, the mmio instruction at the hypervisor on behalf of the guest.. ... Red Hat

08/10/17 / #20170228230

Provisioning a device with multiple bit-size versions of a software component

A provisioning system to automatically determine the appropriate components to install or make available for installation on a target computer system. An example system may comprise: receiving data indicative of a bit-size and a virtual machine extension support of a processing device of the client device; determining that the processing device supports a plurality of bit-size versions of a software component; querying the client device to select a preferred version of the software component associated with the virtual machine extension support; determining that the version of a software component associated with the first bit-size is unavailable; provisioning the version of the software component associated with the virtual machine extension support and the second bit-size to the client device in view of the determination; and notifying the client device when the version of the software component associated with the first bit-size and the virtual machine extension support is available for installation.. ... Red Hat

08/03/17 / #20170223115

Shared resource management

Various examples are directed to systems and methods for executing a computing job at a computing node of a distributed computing system. A node controller may receive computing job request data from a system controller. ... Red Hat

08/03/17 / #20170222997

Multi-tenant enterprise application management

A method performed by a computing system includes receiving from a client component of an enterprise application, a request destined for a service component of the enterprise application, the request comprising authentication data and request data, the authentication data being associated with a current user of the client component, the user associated with an organization. The method further includes performing an authentication process to create principal data and role data associated with the request, the principal data identifying a user. ... Red Hat

08/03/17 / #20170220467

Cache system with multiple cache unit states

A cache system stores a number of different datasets. The cache system includes a number of cache units, each in a state associated with one of the datasets. ... Red Hat

07/27/17 / #20170214683

Secret store for oauth offline tokens

An authentication system includes an authentication server, an application having a proxy, and a token store. The token store receives an authentication request and sends the request to the authentication server. ... Red Hat

07/27/17 / #20170214670

Symmetric encryption key generation/distribution

Various examples are directed to systems and methods for exchanging encrypted information. A first computing device may select a first private key and generate a session key based at least in part on the first private key. ... Red Hat

07/27/17 / #20170214612

Chaining network functions to build complex datapaths

A virtual switch executes on a computer system to forward packets to one or more destinations. A method of the disclosure includes receiving, by a processing device executing a virtual network switch, a network packet comprising a header and a payload, identifying, in view of the header, a port of the virtual switch for forwarding the network packet, storing the network packet to a shared memory buffer associated with the port, wherein the shared memory buffer is accessible to a network function, notifying the network function that the network packet is stored to the shared memory buffer; and processing the network packet by the network function.. ... Red Hat

07/27/17 / #20170212864

Shared memory communication in software defined networking

A virtual switch executes on a computer system to forward packets to one or more destinations. A method of the disclosure includes receiving, by a virtual switch application being executed by a processing device, a packet comprising a header, determining, that the packet does not match a distribution table associated with the virtual switch and storing, by the processing device, the packet to a shared memory buffer that is accessible to a network controller application being executed by the processing device.. ... Red Hat

07/13/17 / #20170200083

Building a hybrid reactive rule engine for relational and graph reasoning

A processing device executing a rule engine receives a first object. The processing device determines whether the first object is represented by a relational model or an object-oriented model. ... Red Hat

07/13/17 / #20170199842

Exposing pre-registered memory regions for remote direct memory access in a distributed file system

The subject matter of this specification can be implemented in, among other things, a method that includes pre-registering multiple memory regions for input/output (io) buffers of a remote direct memory access (rdma) interface. The method includes receiving a buffer reservation request from a non-system-based user (nsbu) application through an application programming interface (api). ... Red Hat

07/13/17 / #20170199841

Pre-registering memory regions for remote direct memory access in a distributed file system

The subject matter of this specification can be implemented in, among other things, a method that includes pre-registering, by a processing device at a client device, multiple input/output (io) buffers at the client device with a remote direct memory access (rdma) interface at the client device. The client device accesses multiple server devices of a distributed file system using the rdma interface. ... Red Hat

07/13/17 / #20170199679

System and method for using persistent memory to accelerate write performance

A central processing unit (cpu) executes a write request for first data to be written to a first block of a storage device. Executing the write request includes determining whether the first block is remapped to a first memory block in the persistent memory and whether the first memory block is in an uncommitted state. ... Red Hat

07/06/17 / #20170192816

Setup of management system in a virtualization system

Implementations for setup of management system in a virtualization system are disclosed. A method of the disclosure includes verifying, by a setup program executed by a processing device of a host machine, that a management system is installed on a virtual machine (vm) executing on the host machine, wherein the management system installed on the vm is a host controller that manages the vm and manages other vms of the host machine, confirming that the management system is responsive, and in response to confirming that the management system is responsive, transmitting, by the processing device via the setup program, a command to the management system to add the host machine to a list of host machines associated with the management system.. ... Red Hat

06/29/17 / #20170185325

Allocating storage in a distributed storage system

A method of allocating storage in a distributed storage system includes receiving a data structure including a plurality of identifiers of storage devices organized by failure zones. Any device of a first failure zone does not share a point of failure with any device of a second failure zone. ... Red Hat

06/22/17 / #20170177611

Enforcing consistency of file to storage node mapping

Systems and methods for enforcing consistency of file to storage node mappings in distributed file systems. An example method may include: receiving a request to perform a file operation with respect to a file associated with a volume of a distributed file system; identifying, among a plurality of storage nodes of the distributed file system, a storage node associated with the file; obtaining a lock of a layout of the volume; and responsive to determining, by a processing device, that a directory layout version number matches a volume layout version number, performing the requested file operation with respect to the file.. ... Red Hat

06/15/17 / #20170170921

Timestamp alignment across a plurality of computing devices

Methods, systems, and computer program products are included for processing data structures to align timestamps of the data structures. An method includes receiving a first data structure from a first server that includes a first node corresponding to an activity, wherein the first node includes a first identifier, a first timestamp, and a first time duration corresponding to the activity. ... Red Hat

06/15/17 / #20170169069

Data integrity checking in a distributed filesystem using object versioning

A processing device identifies an object that is assigned an object version indicating a modification operation has been performed on the object, and a signature version representing a version of data of the object for which a first signature has been created. The first signature is stored in a data store. ... Red Hat

06/08/17 / #20170161502

Secure remote kernel module signing

Implementations for a secure remote kernel module signing are disclosed. In one example, the method includes receiving an indicator of a public key associated with a client computing device, determining that the public key associated with the client computing device is in common with a public key associated with a first server computing device, compiling the script, signing the compiled script with a private key that is associated with the public key that is in common with the client computing device and the first server computing device without generating a new private key, and sending the signed compiled script to the client computing device.. ... Red Hat

06/01/17 / #20170155620

Mac address allocation for virtual machines

Systems and methods for mac address allocation for virtual machines. An example method may include: initializing a virtual machine, determining that a network identifier has not been assigned to the virtual machine, in view of a determination that a network identifier has not been assigned to the virtual machine, transmitting, via a network, a network identifier request, receiving, via the network, one or more data packets, processing, by a processing device, the one or more data packets to identify a network identifier directed to the virtual machine, and assigning the network identifier to the virtual machine.. ... Red Hat

06/01/17 / #20170153952

Reverse network address translation failover

In an example system, a first interface has a first address and a first port number. A second interface has a second address and a second port number. ... Red Hat

06/01/17 / #20170153911

Distributed transactions on mobile devices via a messaging service provided by a mobile network operator

A method includes receiving, by a mobile device associated with a distributed transaction, a message via a messaging service provided by a mobile network operator. The method further includes determining, by a content based router of the mobile device, that the message is associated with the distributed transaction by determining that the message includes a transaction identifier that corresponds with an entry in a transaction table of the content based router. ... Red Hat

05/18/17 / #20170142202

Filesystem i/o scheduler

Methods, systems, and computer program products are provided for scheduling i/o requests in a cloud storage system. An application instance that corresponds to a client is created. ... Red Hat

05/18/17 / #20170142134

Virtual machine malware scanning

Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at the virtual machine. After performing the task at the virtual machine, an indicator corresponding to a shutdown of the virtual machine is detected. ... Red Hat

05/18/17 / #20170139782

Recreating a computing environment using tags and snapshots

A processing device receives a request to recreate an application from a particular point in time and determines a set of tags in a data store of hierarchical tags. The set of tags describe a computing environment hosting the application from the particular point in time. ... Red Hat

05/18/17 / #20170139755

Efficient chained post-copy virtual machine migration

A hypervisor receives, from a second host at a third host, at a second time after a first time, a first plurality pages. The first plurality of pages were copied at the first time, from a first host to the second host. ... Red Hat

05/11/17 / #20170135033

Selection of a mesh access point in a wireless mesh network

An example method of transmitting data to a destination node in a wireless communications network includes detecting, at a wireless device, a plurality of mesh nodes connected to a common communications medium used to access a wireless communications network. The method also includes calculating a score for the mesh nodes of the plurality of mesh nodes, where the score is based on a hop distance between the respective mesh node and a root access point connected to the wireless communications network, the quality of signal between the wireless device and the respective mesh node, the data bandwidth between the wireless device and the respective mesh node, and/or the current number of mesh nodes using the respective mesh node as a wireless access point to connect to the wireless communications network. ... Red Hat

05/11/17 / #20170134370

Enabling single sign-on authentication for accessing protected network services

Embodiments of the disclosure enable single sign-on for secure network services. In one embodiment, a method is provided. ... Red Hat

05/11/17 / #20170134325

Memory-mapped input/output (i/o) channel

Various examples are directed to systems and methods for utilizing a memory-mapped i/o channel. A first application may request that a message be sent to a channel counterparty. ... Red Hat

05/11/17 / #20170132028

Application of a pattern to inactive pages in guest memory

Systems and methods are disclosed for migrating a virtual machine from a source hypervisor to a destination hypervisor. An example method of migrating a virtual machine from a source hypervisor to a destination hypervisor includes receiving, by a source hypervisor running a virtual machine, an indication to migrate the virtual machine to a destination hypervisor. ... Red Hat

05/04/17 / #20170124320

Enabling resource access for secure application containers

Embodiments of the disclosure enable resource access for secure application containers. In accordance with one embodiment, a method is provided that comprises identifying a tracing wrapper for an application to be executed by a processing system. ... Red Hat

05/04/17 / #20170123960

System, method and apparatus for debugging of reactive applications

A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. ... Red Hat

05/04/17 / #20170123958

Service implementation based debugger for service oriented architecture projects

A meta-debugger receives a first debugging command from a debugger client to set a breakpoint in a first service in a first language and sets the breakpoint in a first native debugger. After receiving a service message invoking the first service, the breakpoint is triggered and the meta-debugger provides to the debugger client a first graphical representation of the first native debugger. ... Red Hat

04/27/17 / #20170118219

Restricting access by services deployed on an application server

An example method for controlling access to services coupled to an application server includes receiving a set of method calls issued from originator services to target services and recording information about the set of method calls into a data structure. The method also includes modifying, based on user input, the data structure to exclude each unauthorized method call from the data structure. ... Red Hat

04/27/17 / #20170116092

Managing network failure using back-up networks

A method of managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of networks. The method includes determining whether the plurality of hypervisors satisfies an unavailability condition, and, in response to determining that the plurality of hypervisors satisfies the unavailability condition, re-assigning a first network role of a first network to a back-up network.. ... Red Hat

04/27/17 / #20170115896

Multithreaded memory manager to de-allocate memory objects using private freelists

A method for memory de-allocation may include identifying, by a processing device, a first memory object to be de-allocated within a scope of a function, creating a private freelist associated with the function, the private freelist comprising a reference to the first memory object, performing, within the scope of the function, a plurality of iterations to de-allocate a plurality of memory objects, wherein each iteration comprises adding, to the private freelist, a reference to a memory object of the plurality of memory objects, and causing, by a processing device, a public freelist to reference the private freelist.. . ... Red Hat

04/27/17 / #20170115889

Systems and methods for set membership matching

Various examples are directed to systems and methods for matching a test data block to a data block set. A computing device may receive the test data block. ... Red Hat

04/20/17 / #20170109199

Scheduling multi-phase computing jobs

A scheduler for scheduling multi-phase computing jobs is disclosed. A profile of a computing job is received. ... Red Hat

04/13/17 / #20170104767

Monitoring cloud computing environments

An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines. ... Red Hat

04/13/17 / #20170103086

Deduplicated file system

An apparatus and a method for maintaining a file system is described. A method may include receiving a request for allocating a first block of a file system to a file, the first block comprising a first data and computing, by a processing device, a first hash value of the first block. ... Red Hat

04/06/17 / #20170097952

Custom object paths for object storage management

A processing device receives a request that identifies an object to store in a storage system. The request includes a custom path for the object that represents content of the object. ... Red Hat

04/06/17 / #20170097851

Quality of service tagging for computing jobs

A processing device receives a job request to allocate one or more resources in a resource environment to a job. The job is related to an application. ... Red Hat

03/30/17 / #20170093736

Packet size control using maximum transmission units for facilitating packet transmission

A system and method of facilitating packet transmission comprises a first node, a second node, and an intermediate node. The intermediate node receives a first packet, from the first node, determines a packet size, determines a maximum transmission unit (mtu) size, and determines whether the packet size is greater than the mtu size, sends a second packet to the first node specifying the mtu size to the first node. ... Red Hat

03/30/17 / #20170091129

Scsi command jammer

Methods, systems, and computer program products are included for selecting, on the server computer, a selected host number that corresponds to the client computer; receiving, by the server computer, a network communication that includes a scsi command, the network communication originating from the client computer; reading, by the server computer, a host number from the scsi command; identifying, by the server, that the selected host number corresponds to the host number from the scsi command; and preventing, by the server, the scsi command from reaching a block i/o layer of the server computer.. . ... Red Hat

03/30/17 / #20170091075

Distributed system test automation framework

Described herein is a method for testing distributed systems. The method includes receiving, by a processing device, a software testing executable script. ... Red Hat

03/30/17 / #20170091066

Debugger write interceptor

Methods, systems, and computer program products are included for executing one or more instructions of a program in a debugging session; receiving a command at a debugger, the command comprising an expression for the debugger to evaluate in the debugging session; evaluating the expression, at least in part by the debugger, the evaluating including attempting to perform a write operation to write a data value to a target; preventing the data value from being written to the target; and outputting, by the debugger, a result of the evaluating.. . ... Red Hat

03/30/17 / #20170090968

Deferred assignment of devices in virtual machine migration

Systems and methods for deferred assignment of devices in virtual machine migration. An example method comprises: starting, by a processing device of a first host computer system, a virtual machine being migrated from a second host computer system in a post-copy migration mode; receiving a request to associate an input/output (i/o) device with the virtual machine; and responsive to receiving, from the second host computer system, one or more memory pages comprised by a memory buffer associated with the i/o device, performing at least one of: associating an identifier of the i/o device with the memory buffer or allowing the virtual machine to access the i/o device.. ... Red Hat

03/30/17 / #20170090965

Dirty memory tracking with assigned devices by exitless paravirtualization

An example method of tracking memory modified by an assigned device includes allocating, by a hypervisor running a virtual machine, guest memory to a guest running on the virtual machine, where a device is assigned to the virtual machine. The method also includes reading, while the virtual machine is running on the hypervisor, a first input/output (i/o) state that indicates whether the device is currently processing one or more i/o requests, where the first i/o state is writable by the guest. ... Red Hat

03/30/17 / #20170090964

Post-copy virtual machine migration with assigned devices

A hypervisor updates a mapping at a first time by storing a first mapping of the first plurality of pages in an input-output memory management unit. A guest of a virtual machine attempts to access at least one byte of each of a second plurality of pages on the migration destination, which are absent from the migration destination, such that a plurality of page faults are generated responsive to the guest access attempt. ... Red Hat

03/30/17 / #20170090816

Protection for memory deduplication by copy-on-write

An example method of providing deduplication support for one or more memory pages includes setting, by a memory manager, an initial memory page to a write protection mode. The initial memory page is located in an address space allocated to a memory consumer. ... Red Hat

03/23/17 / #20170083430

Code coverage plugin

A method for starting a level of testing on a first package file is disclosed. The method receives, via an application programming interface, at a plugin, a request to start the level of testing on the first package file. ... Red Hat

03/16/17 / #20170078378

System and method for flexible holding storage during messaging

A system and method of flexible holding storage during messaging includes determining one or more properties of a message, the message to be stored in a holding storage area of a messaging system, determining status of one or more candidate holding storage devices, determining one or more storage selection rules, adjusting the one or more storage selection rules based on information associated with the status of the one or more candidate holding storage devices, and selecting a holding storage device for the message from the candidate holding storage devices based on the adjusted storage selection rules and information associated with the properties of the message. The one or more storage selection rules express preferences among the one or more candidate holding storage devices. ... Red Hat

03/16/17 / #20170078228

Providing centralized message notification

Providing centralized message notification for user interface is described. A method includes receiving a plurality of message notifications. ... Red Hat

03/16/17 / #20170075814

Multi-level page data structure

Methods, systems, and computer program products for receiving a memory allocation request; comparing a memory size corresponding to the memory allocation request to a memory size threshold; allocating a memory page that has a size larger than the memory size threshold, the memory page having a page entry in a page management data structure; and allocating a portion of the memory page, the portion of the memory page corresponding to a sub-page of the memory page.. . ... Red Hat

03/16/17 / #20170075770

Virtual device backend recovery

Methods, systems, and computer program products for restoring a backend after a backend disconnect. The method includes detecting a disconnect of a backend. ... Red Hat

03/16/17 / #20170075711

Identifying application usage roles for devices provided to virtual machines

Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine. ... Red Hat

03/16/17 / #20170075706

Using emulated input/output devices in virtual machine migration

Systems and methods for using emulated i/o devices in virtual machine live migration. An example method comprises: creating an emulated input/output (i/o) device corresponding to a virtual function i/o device associated with a virtual machine being migrated from a first host computer system to a second host computer system; intercepting, by a processing device of the first host computer system, virtual machine calls to the virtual function i/o device; processing the intercepted virtual machine calls using the emulated i/o device; and disassociating the virtual function i/o device from the virtual machine.. ... Red Hat

03/16/17 / #20170075582

Translating access requests for a multi-level page data structure

Methods, systems, and computer program products for receiving a memory access request, the memory access request including a virtual memory address; locating a page entry in a page entry structure, the page entry corresponding to the virtual memory address; identifying that a page corresponding to the page entry includes a sub-page, the sub-page included within a subset of a memory space allocated to the page; determining a page frame number corresponding to the sub-page and an offset corresponding to the sub-page; and accessing the offset within the sub-page.. . ... Red Hat

03/09/17 / #20170070497

Multi-factor simple password exponential key exchange (speke) authentication

A method relates to receiving, by a processing device of an authentication server over a public network, an authentication request from a client device, the authentication request comprising a user identifier associated with first factor data, in which the first factor data comprises a password stored in a storage associated with the authentication server, calculating a generator value in view of the first factor data and a second factor data associated with the user identifier, and generating a session key in view of the generator value and a first public key received from the client device.. . ... Red Hat

03/09/17 / #20170068634

Asynchronous mapping of hot-plugged device associated with virtual machine

Systems and methods for asynchronous mapping of a hot-plugged i/o device associated with a virtual machine. An example method comprises: executing, by a first processing thread running on a host computer system, a virtual processor associated with a virtual machine; initializing, by a second processing thread, a table entry of a guest input/output (i/o) table associated with the virtual machine, wherein the table entry maps a device identifier of an i/o device to a memory buffer associated with the i/o device; pinning the memory buffer associated with the i/o device; responsive to receiving, by a hypervisor running on the host computer system, a completion signal from the second processing thread, notifying the virtual machine of the i/o device being hot-plugged.. ... Red Hat

03/09/17 / #20170068554

Hypervisor driven gradual balloon inflation

A hypervisor determines a target cpu usage of a virtual machine in responding to a request to allocate guest memory. Then the hypervisor receives a first balloon request for a first quantity of guest memory to be ballooned. ... Red Hat

03/09/17 / #20170068530

Updating software utilizing domain name system (dns)

Examples described herein are directed to systems and methods for updating software. An update system may generate a first domain name system (dns) record comprising first version data indicating a version of an update to the software. ... Red Hat

03/02/17 / #20170063731

Determining state of virtual router instance

Systems and methods for determining the state of a virtual router instance. An example method comprises: monitoring, by a processing device of a host computer system, a network interface associated with an instance of a virtual router; responsive to determining that a certain ip address has been assigned to the network interface, identifying a state of the instance of the virtual router as a master state; and transmitting a message identifying the state of the instance of the virtual router.. ... Red Hat

03/02/17 / #20170061289

Pluggable knowledge types in a rule engine

Systems and methods for allowing pluggable knowledge types to be discovered, registered, and added to a rule engine are disclosed. An example method may include retrieving, by a processing device executing a rule engine, a list of pluggable services associated with a specified knowledge type; identifying a first pluggable service on the list of pluggable services; identifying one or more knowledge types that the first pluggable service is configured to process, wherein the one or more knowledge types comprise the specified knowledge type; and indexing, by the processing device, the first pluggable knowledge in the service registry by information identifying the one or more knowledge types.. ... Red Hat

02/16/17 / #20170048402

Mobile device camera display projection

An example method of providing data to an application running on a mobile device includes receiving a request from a first application to activate a camera interface. The method also includes switching the mobile device into an application selection mode and displaying a set of applications on the display of the mobile device. ... Red Hat

02/16/17 / #20170048249

Isolating network resources in a virtualized environment

Embodiments of the disclosure provide techniques for isolating network resources in a virtualized environment. A method is provided that includes identifying a security context data structure including a first security context label, a resource identifier and a plurality of access types. ... Red Hat

02/16/17 / #20170046255

Virtual machine based huge page balloon support

Systems and methods for virtual machine based huge page balloon support are provided. A guest operating system (os) receives a request from a hypervisor for guest memory to be made available to a host operating system (os). ... Red Hat

02/16/17 / #20170046187

Guest driven surprise removal for pci devices

A hypervisor receives a notification from a guest operating system of a virtual machine that includes a capability indicator of support provided by a virtual device driver for recovering from a surprise removal of a corresponding virtual device from the virtual machine. The hypervisor, upon receiving a request to remove the virtual device from the virtual machine, uses the capability indicator received from the guest operating system to identify one or more actions to be performed to remove the virtual device from the virtual machine. ... Red Hat

02/16/17 / #20170046186

Limited hardware assisted dirty page logging

A hypervisor identifies a set of pages to be polled for updates made by a guest operating system, each page having a write protection attribute that causes an exit to a hypervisor upon a guest operating system attempt to update a corresponding page. The hypervisor modifies the write protection attribute for each page of the set of pages to avoid the exit to the hypervisor upon the guest attempt to update the corresponding page. ... Red Hat

02/16/17 / #20170046185

Page table based dirty page tracking

A hypervisor identifies a set of pages associated with a guest operating system (os) of a virtual machine (vm) that are shared with an application. The hypervisor maps each of the set of pages associated with the guest os to a corresponding page associated with the application. ... Red Hat

02/16/17 / #20170046184

Guest management of devices assigned to a virtual machine

Systems and methods are disclosed for providing device state information to a destination hypervisor. An example method of providing device state information to a destination hypervisor includes sending, by a source hypervisor to a guest running on a virtual machine, a request to save a state of a device into a memory region that is accessible by the source hypervisor. ... Red Hat

02/09/17 / #20170039380

Unified system for authentication and authorization

A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. In view of the request, it is determined whether the client application is authorized to access the trusted application in view of an authorization policy. ... Red Hat

02/09/17 / #20170039365

Non-repudiation of broadcast messaging

A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the publishing entity, time-stamping the first piece of evidence, storing the time-stamped first piece of evidence, sending the message to a first subscribing entity, receiving from the first subscribing entity a second piece of evidence that the message was received by the first subscribing entity, time-stamping the second piece of evidence, and storing the time-stamped second piece of evidence.. . ... Red Hat

02/09/17 / #20170039238

Asymmetric distributed cache with data chains

An example method of loading data from a database includes receiving, at a cache node, a current query and a data chain that includes a sequence of ordered queries. The method also includes determining whether a hash of the current query matches a hash of an expected query in the data chain. ... Red Hat

02/02/17 / #20170031810

Host virtual address reservation for guest memory hot-plugging

An example method for host virtual address reservation comprises: reserving a host virtual address range within a virtual address space of a computer system; associating a first virtual memory device with a first guest physical address range a virtual machine running on the computer system; associating a second virtual memory device with a second guest physical address range of the virtual machine; mapping a first guest physical address of the first guest physical address range to a first host virtual address of the host virtual address range, wherein the first host virtual address is identified by an offset with respect to the first guest physical address; mapping a second guest physical address of the second guest physical address range to a second host virtual address of the host virtual address range, wherein the second host virtual address is identified by the offset with respect to the second guest physical address.. . ... Red Hat

02/02/17 / #20170031593

Maintaining guest input/output tables in swappable memory

Systems and methods for maintaining guest input/output (i/o) tables in a swappable memory. An example method comprises: allocating, by a hypervisor running on a host computer system, one or more memory pages mapped into a memory space of a virtual machine running on the host computer system, to store a guest input/output (i/o) table comprising a plurality of i/o table entries, wherein each i/o table entry maps a device identifier of an i/o device to a memory address of a memory buffer associated with the i/o device; determining, by a processing device of the host computer system, that a memory page comprises one or more i/o table entries that reference memory buffers that are marked as being not accessible by associated i/o devices; and swapping out the memory page to a backing storage.. ... Red Hat

01/26/17 / #20170024313

Entropy increase by executable loader

Methods, systems, and computer program products for parsing a binary, the parsing including identifying a section that includes a relocation entry; locating padding in a memory page of the section, the section including one or more memory pages; and inserting entropy into the padding.. . ... Red Hat

01/26/17 / #20170024231

Configuration of a computer system for real-time response from a virtual machine

A system and methods are disclosed for configuring a virtualized system for real-time response from virtual machines (vms). In accordance with one embodiment, a vm request is received, where the request specifies a number n of virtual processors for executing real-time tasks, and where n is a positive integer. ... Red Hat

01/12/17 / #20170012786

Creating a digital certificate for a service using a local certificate authority

A computing machine creates a local certificate authority (ca) that has certificate signing authority, creates a certificate signing request (csr) that includes data of a local service that is hosted by the computing machine, creates a service certificate for the local service using at least a portion of the data in the csr, signs the service certificate using a private key of the local ca, and provides the service certificate to the local service. The private key is stored locally on the computing machine.. ... Red Hat

01/05/17 / #20170006500

Data reduction in a system

An example method for reducing data communications includes receiving, at a data hub, a first set of messages from a first device. Each message of the first set includes a value. ... Red Hat

01/05/17 / #20170005991

Hybrid security batch processing in a cloud environment

An example method for processing a batch job that includes a plurality of sequentially ordered tasks includes obtaining a message that includes inputs of a plurality of tasks included in a batch job. The plurality of tasks includes a first task that is sequentially ordered before a second task. ... Red Hat








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###