Guest time scaling for a virtual machine in a virtualized computer system

    公开(公告)号:US12248799B2

    公开(公告)日:2025-03-11

    申请号:US17553607

    申请日:2021-12-16

    Applicant: VMware, Inc.

    Abstract: An example method of managing guest time for a virtual machine (VM) supported by a hypervisor of a virtualized host computer includes: configuring, by the hypervisor, a central processing unit (CPU) of the host computer to trap, to the hypervisor, access by guest code in the VM to a physical counter and timer of the CPU; configuring, by the hypervisor, the guest code in the VM to use the physical counter and timer of the CPU rather than a virtual counter and timer of the CPU; trapping, at the hypervisor, an access to the physical counter and timer by the guest code; and executing, by the hypervisor, the access to the physical counter and timer on behalf of the guest code while compensating for an adjustment of a system count of the physical counter and timer to maintain the guest time as scaled with respect to frequency of the physical counter and timer.

    PROVISIONING DPU MANAGEMENT OPERATING SYSTEMS USING HOST AND DPU BOOT COORDINATION

    公开(公告)号:US20230325203A1

    公开(公告)日:2023-10-12

    申请号:US17715288

    申请日:2022-04-07

    Applicant: VMware, Inc.

    CPC classification number: G06F9/4416 G06F9/4406

    Abstract: Disclosed are various examples of provisioning a data processing unit (DPU) management operating system (OS). A host device boots a host provisioning image, which executes a host provisioning agent. The host provisioning agent launches a server component that serves a DPU management OS. A provisioning command is transmitted to a DPU device installed to the host device. The server component transmits the DPU management OS from the host device to the DPU device. A host OS is executed once an indication that the DPU device is executing on the DPU management OS is received.

    BOOT FAILURE PROTECTION ON SMARTNICS AND OTHER COMPUTING DEVICES

    公开(公告)号:US20230229558A1

    公开(公告)日:2023-07-20

    申请号:US17577714

    申请日:2022-01-18

    Applicant: VMware, Inc.

    Abstract: Boot failure protection on smartNICs and other computing devices is described. During a power-on stage of a booting process for a computing device, a boot loading environment is directed to install an application programming interface (API) able to be invoked to control operation of a hardware-implemented watchdog. During an operating system loading stage of the booting process, the application programming interface is invoked to enable the hardware-implemented watchdog. During an operating system hand-off stage of the booting process, a last watchdog refresh of the hardware-implemented watchdog is performed, and execution of the boot loading environment is handed off to a kernel boot loader of an operating system. The application programming interface may not be accessible after the hand off to the kernel boot loader.

    Method for converting device tree data into ACPI data for edge device operating in a network

    公开(公告)号:US11263019B2

    公开(公告)日:2022-03-01

    申请号:US16521434

    申请日:2019-07-24

    Applicant: VMware, Inc.

    Abstract: A method for generating boot tables for a device having access to device information. It is determined whether there exists at least one system boot table stored in a memory. If it is determined that a system boot table does not exist, the device information is retrieved, and the device information is converted to at least one boot table. The converting includes generating a first boot table by populating the first boot table with information of components of the device that have a correspondence to a computer system boot information standard. The generating also includes generating a second boot table for another component of the device that does not have a correspondence to the computer system boot information standard, by creating an entry in the second boot table that is populated with an identifier used to find a compatible component defined in the computer system boot standard.

    Virtualization detection in a computing system

    公开(公告)号:US10698783B2

    公开(公告)日:2020-06-30

    申请号:US15865770

    申请日:2018-01-09

    Applicant: VMware, Inc.

    Abstract: A method of detecting virtualization in a computing system, which includes a processor having at least three hierarchical privilege levels including a third privilege level more privileged than a second privilege level, the second privilege level more privileged than a first privilege level, is described. The method includes: executing a program on the processor at a privilege level less privileged than the third privilege level, the program including a load-exclusive instruction of the processor, followed by at least one instruction of the processor capable of being trapped to the third privilege level, followed by a store-exclusive instruction of the processor; and determining presence or absence of virtualization software at least a portion of which executes at the third privilege level in response to a return status of the store-exclusive instruction.

    Hypervisor context switching using a trampoline scheme in processors having more than two hierarchical privilege levels

    公开(公告)号:US10019275B2

    公开(公告)日:2018-07-10

    申请号:US14312175

    申请日:2014-06-23

    Applicant: VMware, Inc.

    Abstract: In a virtualized computer system operable in more than two hierarchical privilege levels, components of a hypervisor, which include a virtual machine kernel and virtual machine monitors (VMMs), are assigned to different privilege levels. The virtual machine kernel operates at a low privilege level to be able to exploit certain features provided by the low privilege level, and the VMMs operate at a high privilege level to support execution of virtual machines. Upon determining that a context switch from the virtual machine kernel to a VMM is to be performed, the computer system exits the low privilege level, and enters the high privilege level to execute a trampoline that supports context switches to VMMs, such as state changes, and then the VMM. The trampoline is deactivated after execution control is switched to the VMM.

Patent Agency Ranking