-
公开(公告)号:US11550609B2
公开(公告)日:2023-01-10
申请号:US16744356
申请日:2020-01-16
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Cyprien Laplace , Regis Duchesne , Alexander Fainkichen , Shruthi Muralidhara Hiriyuru , Ye Li
IPC: G06F9/455
Abstract: An example method of interfacing with a hypervisor in a computing system is described, which includes a processor having at least three hierarchical privilege levels including a third privilege level more privileged than a second privilege level, the second privilege level more privileged than a first privilege level. The method includes: identifying an input/output (I/O) space instruction, not supported by the processor, to be performed for backdoor communication between the hypervisor and guest software executing in a virtual machine (VM) managed by the hypervisor, the hypervisor executing at the third privilege level; writing one or more parameters to one or more registers of the processor that are mapped to one or more unsupported registers used by the I/O space instruction; writing a value indicative of the I/O space instruction to a designated register of the processor; executing an instruction, by the guest software executing at the first or second privilege level, which is trapped to the third privilege level.
-
公开(公告)号:US11422840B2
公开(公告)日:2022-08-23
申请号:US14982837
申请日:2015-12-29
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Harvey Tuch , Cyprien Laplace , Alexander Fainkichen
IPC: G06F9/455
Abstract: In an example, a computer system includes a hardware platform and a hypervisor executing on the hardware platform. The hypervisor includes a kernel and a plurality of user-space instances within a user-space above the kernel. Each user-space instance is isolated from each other user-space instance through namespaces. Each user-space instance includes resources confined by hierarchical resource groups. The computer system includes a plurality of virtual hypervisors, where each virtual hypervisor executes in a respective user-space instance of the plurality of user-space instances.
-
3.
公开(公告)号:US10282226B2
公开(公告)日:2019-05-07
申请号:US15385568
申请日:2016-12-20
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Cyprien Laplace , Regis Duchesne , Ye Li , Alexander Fainkichen
IPC: G06F1/32 , G06F9/455 , G06F11/34 , G06F1/3287 , G06F1/3234 , G06F9/50
Abstract: Techniques for optimizing CPU usage in a host system based on VM guest OS power and performance management are provided. In one embodiment, a hypervisor of the host system can capture information from a VM guest OS that pertains to a target power or performance state set by the guest OS for a vCPU of the VM. The hypervisor can then perform, based on the captured information, one or more actions that align usage of host CPU resources by the vCPU with the target power or performance state.
-
4.
公开(公告)号:US20180173553A1
公开(公告)日:2018-06-21
申请号:US15385568
申请日:2016-12-20
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Cyprien Laplace , Regis Duchesne , Ye Li , Alexander Fainkichen
CPC classification number: G06F9/45558 , G06F1/3234 , G06F1/3287 , G06F9/5077 , G06F11/3423
Abstract: Techniques for optimizing CPU usage in a host system based on VM guest OS power and performance management are provided. In one embodiment, a hypervisor of the host system can capture information from a VM guest OS that pertains to a target power or performance state set by the guest OS for a vCPU of the VM. The hypervisor can then perform, based on the captured information, one or more actions that align usage of host CPU resources by the vCPU with the target power or performance state.
-
5.
公开(公告)号:US09582849B2
公开(公告)日:2017-02-28
申请号:US14065309
申请日:2013-10-28
Applicant: VMware, Inc.
Inventor: Sébastien Baudouin , Cyprien Laplace , Damien Dejean , Eric Donnat
IPC: G06T15/00 , G06T1/60 , G06T1/00 , G06T15/04 , G09G5/36 , G06T1/20 , G06F9/38 , G06T15/10 , G06T17/20 , G06T17/00 , G06F9/455
CPC classification number: G06T1/60 , G06F9/3851 , G06F9/45508 , G06F9/45533 , G06F9/45545 , G06F9/45558 , G06F9/46 , G06F9/544 , G06F2009/45591 , G06F2209/509 , G06T1/00 , G06T1/20 , G06T15/00 , G06T15/005 , G06T15/04 , G06T15/10 , G06T17/00 , G06T17/20 , G09G5/363
Abstract: Methods and systems configured to virtualize graphic processing services in a virtual machine environment are disclosed. A virtual machine monitor (VMM) may be configured to maintain a virtual machine (VM) based on a host operating system (OS) executing in the system. The VM may contain a virtualized graphics library (vGLib) configured to support a graphic command from an application executing in the VM. The host OS may contain a graphics library (GLib) configured to support the graphic command and utilize a graphics processing unit (GPU) in the system to process the graphic command. Upon receiving the graphic command from the application, the vGLib may be configured to allocate a memory section in the VM to store the graphic command. And the VMM may be further configured to share access to the memory section with the host OS, thereby allowing the host OS to retrieve the graphic command from the memory section and deliver the graphic command to the GLib for processing.
Abstract translation: 公开了在虚拟机环境中虚拟化图形处理服务的方法和系统。 可以将虚拟机监视器(VMM)配置为基于在系统中执行的主机操作系统(OS)来维护虚拟机(VM)。 VM可以包含虚拟化图形库(vGLib),其被配置为支持在VM中执行的应用程序的图形命令。 主机OS可以包含被配置为支持图形命令并利用系统中的图形处理单元(GPU)来处理图形命令的图形库(GLib)。 在从应用程序接收到图形命令之后,vGLib可被配置为在虚拟机中分配存储器部分以存储图形命令。 并且VMM可以进一步配置为与主机OS共享对存储器部分的访问,从而允许主机OS从存储器部分检索图形命令,并将图形命令传递到GLib进行处理。
-
公开(公告)号:US12248799B2
公开(公告)日:2025-03-11
申请号:US17553607
申请日:2021-12-16
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Ye Li , Alexander Fainkichen , Regis Duchesne , Cyprien Laplace , Shruthi Muralidhara Hiriyuru , Sunil Kumar Kotian
IPC: G06F9/455
Abstract: An example method of managing guest time for a virtual machine (VM) supported by a hypervisor of a virtualized host computer includes: configuring, by the hypervisor, a central processing unit (CPU) of the host computer to trap, to the hypervisor, access by guest code in the VM to a physical counter and timer of the CPU; configuring, by the hypervisor, the guest code in the VM to use the physical counter and timer of the CPU rather than a virtual counter and timer of the CPU; trapping, at the hypervisor, an access to the physical counter and timer by the guest code; and executing, by the hypervisor, the access to the physical counter and timer on behalf of the guest code while compensating for an adjustment of a system count of the physical counter and timer to maintain the guest time as scaled with respect to frequency of the physical counter and timer.
-
公开(公告)号:US12182602B2
公开(公告)日:2024-12-31
申请号:US17704040
申请日:2022-03-25
Applicant: VMWARE, INC.
Inventor: Andrei Warkentin , Karthik Ramachandra , Timothy P. Mann , Jared Mcneill , Sunil Kotian , Cyprien Laplace , David A Dunn
IPC: G06F9/455
Abstract: Disclosed are various examples of provisioning a data processing unit (DPU) management operating system using a capsule. A management hypervisor installer executed on a host device receives a listing DPU device from a baseboard management controller (BMC). A preinstalled DPU management operating system image is identified for a DPU device from the listing, and is wrapped with a capsule that specifies the capsule as a DPU management operating system image capsule. A server component provides the DPU management operating system image capsule at a particular URI, and the URI is transmitted to the BMC.
-
公开(公告)号:US11436318B2
公开(公告)日:2022-09-06
申请号:US16905652
申请日:2020-06-18
Applicant: VMware, Inc.
Inventor: Ye Li , David Ott , Cyprien Laplace , Alexander Fainkichen , Shruthi Hiriyuru
Abstract: System and method for performing a remote attestation for creation of a trusted execution environment (TEE) using a virtual secure enclave device running in a virtualized environment utilizes a trusted bootloader appliance in a TEE virtual computing instance, which is created in response to a request for a TEE from a software process running in the system. The trusted bootloader appliance manages the provisioning of a TEE in the TEE virtual computing instance for the software process. The remote attestation includes performing a first stage attestation on the trusted bootloader appliance by a hardware platform of the computer system and performing a second stage attestation on the provisioned TEE by the trusted bootloader appliance.
-
9.
公开(公告)号:US11263019B2
公开(公告)日:2022-03-01
申请号:US16521434
申请日:2019-07-24
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Cyprien Laplace , Ye Li , Alexander Fainkichen , Regis Duchesne
IPC: G06F15/177 , G06F9/00 , G06F9/4401 , G06F16/22
Abstract: A method for generating boot tables for a device having access to device information. It is determined whether there exists at least one system boot table stored in a memory. If it is determined that a system boot table does not exist, the device information is retrieved, and the device information is converted to at least one boot table. The converting includes generating a first boot table by populating the first boot table with information of components of the device that have a correspondence to a computer system boot information standard. The generating also includes generating a second boot table for another component of the device that does not have a correspondence to the computer system boot information standard, by creating an entry in the second boot table that is populated with an identifier used to find a compatible component defined in the computer system boot standard.
-
公开(公告)号:US10698783B2
公开(公告)日:2020-06-30
申请号:US15865770
申请日:2018-01-09
Applicant: VMware, Inc.
Inventor: Andrei Warkentin , Cyprien Laplace , Regis Duchesne , Ye Li , Alexander Fainkichen
Abstract: A method of detecting virtualization in a computing system, which includes a processor having at least three hierarchical privilege levels including a third privilege level more privileged than a second privilege level, the second privilege level more privileged than a first privilege level, is described. The method includes: executing a program on the processor at a privilege level less privileged than the third privilege level, the program including a load-exclusive instruction of the processor, followed by at least one instruction of the processor capable of being trapped to the third privilege level, followed by a store-exclusive instruction of the processor; and determining presence or absence of virtualization software at least a portion of which executes at the third privilege level in response to a return status of the store-exclusive instruction.
-
-
-
-
-
-
-
-
-