DYNAMIC REASSIGNMENT FOR MULTI-OPERATING SYSTEM DEVICES
    1.
    发明公开
    DYNAMIC REASSIGNMENT FOR MULTI-OPERATING SYSTEM DEVICES 审中-公开
    动力学研究与开发

    公开(公告)号:EP3114562A1

    公开(公告)日:2017-01-11

    申请号:EP15758659.5

    申请日:2015-03-04

    申请人: Intel Corporation

    发明人: NAKAJIMA, Jun

    IPC分类号: G06F9/44 G06F9/50

    摘要: The present application is directed to dynamic reassignment for multi-OS devices. An example device may comprise equipment, at least two operating systems, a kernel for each OS to provide an interface between the OS and the equipment and a virtual machine manager (VMM). OS selection agents in each OS may interact with a kernel mode controller (KMC) in the VMM. For example, the OS selection agent may transmit a message instructing the KMC to transition the foreground OS to the background and transition a background OS to the foreground. The KMC may transmit signals to the kernels of the foreground and background operating systems causing at least one driver in the foreground OS kernel to save a current equipment state and release control over the equipment while also causing at least one driver in the background OS kernel to restore an equipment state and to take control over the equipment.

    摘要翻译: 本申请涉及多OS设备的动态重新分配。 示例设备可以包括设备,至少两个操作系统,用于每个OS的内核以在OS和设备之间提供接口以及虚拟机管理器(VMM)。 每个OS中的OS选择代理可以与VMM中的内核模式控制器(KMC)进行交互。 例如,OS选择代理可以发送指示KMC的消息将前景OS转换到背景并将背景OS转换到前景。 KMC可以向前台和后台操作系统的内核传送信号,导致前台OS内核中的至少一个驱动程序保存当前的设备状态并释放对设备的控制,同时还使后台OS内核中的至少一个驱动程序 恢复设备状态并控制设备。

    TECHNOLOGIES FOR SECURE INTER-VIRTUAL-MACHINE SHARED MEMORY COMMUNICATION
    3.
    发明公开
    TECHNOLOGIES FOR SECURE INTER-VIRTUAL-MACHINE SHARED MEMORY COMMUNICATION 有权
    FOR安全的技术,之间的虚拟机共享内存通信

    公开(公告)号:EP2985718A1

    公开(公告)日:2016-02-17

    申请号:EP15176644.1

    申请日:2015-07-14

    申请人: Intel Corporation

    摘要: Technologies for secure inter-virtual-machine shared memory communication include a computing device with hardware virtualization support. A virtual machine monitor (VMM) authenticates a view switch component of a target virtual machine. The VMM adds configures a secure memory view to access a shared memory segment. The shared memory segment may include memory pages of a source virtual machine or the VMM. The view switch component switches to the secure memory view without generating a virtual machine exit event, using the hardware virtualization support. The view switch component may switch to the secure memory view by modifying an extended page table (EPT) pointer. The target virtual machine accesses the shared memory segment via the secure memory view. The target virtual machine and the source virtual machine may coordinate ownership of memory pages using a secure view control structure stored in the shared memory segment. Other embodiments are described and claimed.

    摘要翻译: 用于安全间虚拟机共享存储器通信技术包括与硬件虚拟化支持的计算设备。 虚拟机监视器(VMM)认证目标虚拟机的视图开关组件。 在VMM将配置一个安全存储器以访问共享存储器段。 共享存储器段可以包括源虚拟机或VMM的存储器页。 视图开关元件切换到安全存储器视图,而不会产生一个虚拟机退出事件,使用硬件虚拟化支持。 视图开关元件可以通过在扩展页表(EPT)的指针修改切换到安全存储器视图。 目标虚拟机访问经由所述安全存储器视图共享存储器段。 目标虚拟机和源虚拟机可以协调的使用存储在共享存储器段安全视图控制结构的存储器页的所有权。 其他实施例中描述并要求保护。

    TECHNIQUES FOR ROUTING PACKETS BETWEEN VIRTUAL MACHINES

    公开(公告)号:EP3338413A1

    公开(公告)日:2018-06-27

    申请号:EP16837789.3

    申请日:2016-08-17

    申请人: Intel Corporation

    摘要: Various embodiments are generally directed to techniques for improving the efficiency of exchanging packets between pairs of VMs within a communications server. An apparatus may include a processor component; a network interface to couple the processor component to a network; a virtual switch to analyze contents of at least one packet of a set of packets to be exchanged between endpoint devices through the network and the communications server, and to route the set of packets through one or more virtual servers of multiple virtual servers based on the contents; and a transfer component of a first virtual server of the multiple virtual servers to determine whether to route the set of packets to the virtual switch or to transfer the set of packets to a second virtual server of the multiple virtual servers in a manner that bypasses the virtual switch based on a routing rule.