Device simulation in a secure mode supported by hardware architectures

    公开(公告)号:US09952887B2

    公开(公告)日:2018-04-24

    申请号:US14312249

    申请日:2014-06-23

    Applicant: VMware, Inc.

    CPC classification number: G06F9/45516 G06F9/45533 G06F21/74

    Abstract: A secure mode of a computer system is used to provide simulated devices. In operation, if an instruction executing in a non-secure mode accesses a simulated device, then a resulting exception is forwarded to a secure monitor executing in the secure mode. Based on the address accessed by the instruction, the secure monitor identifies the device and simulates the instruction. The secure monitor executes independently of other applications included in the computer system, and does not rely on any hardware virtualization capabilities of the computer system.

    Provisioning DPU management operating systems

    公开(公告)号:US12197939B2

    公开(公告)日:2025-01-14

    申请号:US17704052

    申请日:2022-03-25

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples of provisioning a data processing unit (DPU) management operating system (OS). A management hypervisor installer executed on a host device launches or causes a server component to provide a management operating system (OS) installer image at a particular URI accessible over a network internal to the host device. A baseboard management controller (BMC) transfers the DPU management OS installer image to the DPU device. A volatile memory based virtual disk is created using the DPU management OS installer image. The DPU device is booted to a DPU management OS installer on the volatile memory based virtual disk. The DPU management OS installer installs a DPU management operating system to a nonvolatile memory of the DPU device on reboot of the DPU device.

    EXPOSING PCIE CONFIGURATION SPACES AS ECAM COMPATIBLE

    公开(公告)号:US20240028547A1

    公开(公告)日:2024-01-25

    申请号:US17869272

    申请日:2022-07-20

    Applicant: VMware, Inc.

    Inventor: Andrei Warkentin

    CPC classification number: G06F13/4221 G06F2213/0026

    Abstract: Disclosed are various approaches for exposing peripheral component interconnect express (PCIe) configuration space implementations as Enhanced Configuration Access Mechanism (ECAM)-compatible. In some examples, a bridge device is identified on a segment corresponding to a root complex of a computing device. An endpoint device is connected to a bus downstream from the bridge device. A synthetic segment identifier is assigned to the bus once the endpoint device is identified as connected to the bus. Synthetic address data is generated for the endpoint device. The synthetic address data includes the synthetic segment identifier for the bus and sets a bus identifier of the bus to zero regardless of a hierarchical position of the bus in a standard peripheral component interconnect express (PCIe) bus hierarchy.

    LOADING MANAGEMENT HYPERVISORS FROM USER SPACE

    公开(公告)号:US20230325223A1

    公开(公告)日:2023-10-12

    申请号:US17716083

    申请日:2022-04-08

    Applicant: VMware, Inc.

    CPC classification number: G06F9/45558 G06F9/4401 G06F2009/45583

    Abstract: Disclosed are various examples of loading management hypervisors from user space. In some examples, a host device executes a first stage bootloader of a management hypervisor from within a host operating system. The first stage bootloader loads management hypervisor data and handoff instructions into a memory of the host device, and invokes a kernel execute call of the host operating system. The handoff instructions invoke a second stage bootloader that configures and launches the management hypervisor using the management hypervisor data.

    Unified hypercall interface across processors in virtualized computing systems

    公开(公告)号:US11550609B2

    公开(公告)日:2023-01-10

    申请号:US16744356

    申请日:2020-01-16

    Applicant: VMware, Inc.

    Abstract: An example method of interfacing with a hypervisor in a computing system is described, which includes a processor having at least three hierarchical privilege levels including a third privilege level more privileged than a second privilege level, the second privilege level more privileged than a first privilege level. The method includes: identifying an input/output (I/O) space instruction, not supported by the processor, to be performed for backdoor communication between the hypervisor and guest software executing in a virtual machine (VM) managed by the hypervisor, the hypervisor executing at the third privilege level; writing one or more parameters to one or more registers of the processor that are mapped to one or more unsupported registers used by the I/O space instruction; writing a value indicative of the I/O space instruction to a designated register of the processor; executing an instruction, by the guest software executing at the first or second privilege level, which is trapped to the third privilege level.

    Partitioning a hypervisor into virtual hypervisors

    公开(公告)号:US11422840B2

    公开(公告)日:2022-08-23

    申请号:US14982837

    申请日:2015-12-29

    Applicant: VMware, Inc.

    Abstract: In an example, a computer system includes a hardware platform and a hypervisor executing on the hardware platform. The hypervisor includes a kernel and a plurality of user-space instances within a user-space above the kernel. Each user-space instance is isolated from each other user-space instance through namespaces. Each user-space instance includes resources confined by hierarchical resource groups. The computer system includes a plurality of virtual hypervisors, where each virtual hypervisor executes in a respective user-space instance of the plurality of user-space instances.

Patent Agency Ranking