Hypervisor context switching using a redirection exception vector in processors having more than two hierarchical privilege levels

    公开(公告)号:US10255090B2

    公开(公告)日:2019-04-09

    申请号:US14312207

    申请日:2014-06-23

    Applicant: VMware, Inc.

    Abstract: In a virtualized computer system operable in more than two hierarchical privilege levels, components of a hypervisor, which include a virtual machine kernel and virtual machine monitors (VMMs), are assigned to different privilege levels. The virtual machine kernel operates at a low privilege level to be able to exploit certain features provided by the low privilege level, and the VMMs operate at a high privilege level to support execution of virtual machines. Upon determining that a context switch from the virtual machine kernel to a VMM is to be performed, the computer system exits the low privilege level, and enters the high privilege level to execute a trampoline that supports context switches to VMMs, such as state changes, and then the VMM. The trampoline is deactivated after execution control is switched to the VMM.

    NEGATIVE PATH TESTING IN A BOOTLOADER ENVIRONMENT

    公开(公告)号:US20190026203A1

    公开(公告)日:2019-01-24

    申请号:US15652363

    申请日:2017-07-18

    Applicant: VMware, Inc.

    Abstract: Negative path testing in a bootloader environment can include backing up a global state of a component under test, injecting a fault to trigger an error in the component under test in a bootloader environment, executing error handling instructions until a checkpoint of the component under test in the bootloader environment is reached, restoring the global state to the component under test from the backup, and restarting the component under test.

    Creating a communication channel between different privilege levels using wait-for-event instruction in systems operable at multiple levels hierarchical privilege levels
    26.
    发明授权
    Creating a communication channel between different privilege levels using wait-for-event instruction in systems operable at multiple levels hierarchical privilege levels 有权
    在系统中使用等待事件指令创建不同权限级别之间的通信通道,可在多层次的层次级别权限级别中运行

    公开(公告)号:US09535772B2

    公开(公告)日:2017-01-03

    申请号:US14572516

    申请日:2014-12-16

    Applicant: VMware, Inc.

    Abstract: In a computer system operable at multiple hierarchical privilege levels, a “wait-for-event” (WFE) communication channel between components operating at different privilege levels is established. Initially, a central processing unit (CPU) is configured to to “trap” WFE instructions issued by a client, such as an operating system, operating at one privilege level to an agent, such as a hypervisor, operating at a more privileged level. After storing a predefined special sequence in a storage component (e.g., a register), the client executes a WFE instruction. As part of trapping the WFE instruction, the agent reads and interprets the special sequence from the storage component and may respond to the special sequence by storing another special sequence in a storage component that is accessible to the client. Advantageously, the client may leverage this WFE communication channel to establish low-overhead watchdog functionality for the client.

    Abstract translation: 在可操作于多个分级特权级别的计算机系统中,建立以不同权限级别操作的组件之间的“等待事件”(WFE)通信信道。 最初,中央处理单元(CPU)被配置为“以特殊级别操作的代理(例如虚拟机管理程序)”捕获由诸如操作系统的客户端发出的WFE指令。 在将预定义的特殊序列存储在存储组件(例如,寄存器)中之后,客户机执行WFE指令。 作为捕获WFE指令的一部分,代理从存储组件读取和解释特殊序列,并且可以通过将另一个特殊序列存储在客户端可访问的存储组件中来响应特殊序列。 有利地,客户端可以利用该WFE通信信道为客户端建立低开销看门狗功能。

    Deploying enclaves on different tee backends using a universal enclave binary

    公开(公告)号:US12147530B2

    公开(公告)日:2024-11-19

    申请号:US17960738

    申请日:2022-10-05

    Applicant: VMware, Inc.

    Abstract: The disclosure herein describes deploying a Virtual Secure Enclave (VSE) using a universal enclave binary and a Trusted Runtime (TR). A universal enclave binary is generated that includes a set of binaries of Instruction Set Architectures (ISAs) associated with Trusted Execution Environment (TEE) hardware backends. A TEE hardware backend is identified in association with a VSE-compatible device. A VSE that is compatible with the identified TEE hardware backend is generated on the VSE-compatible device and an ISA binary that matches the TEE hardware backend is selected from the universal enclave binary. The selected binary is linked to a runtime library of the TR and loads the linked binary into memory of the generated VSE. The execution of a trusted application is initiated in the generated VSE using a set of interfaces of the TR. The trusted application depends on the TR interfaces rather than the selected ISA binary.

    DEVICE TREE RUNTIME MECHANISM
    28.
    发明公开

    公开(公告)号:US20240256286A1

    公开(公告)日:2024-08-01

    申请号:US18102379

    申请日:2023-01-27

    Applicant: VMware, Inc.

    CPC classification number: G06F9/4401

    Abstract: Systems and methods are included for causing a computing device to boot by retrieving hardware information from a device tree and further properties by utilizing a native access method call identified in the device tree. The access method can allow for getting a property, getting a property length, or setting a property. A table within firmware can identify the method, which then can retrieve the property information from memory. This Device tree Runtime (“DTRT”) mechanism can allow the computing device to retrieve the hardware configuration and act as a power management interface for turning on the correct hardware and hardware properties on the computing device.

Patent Agency Ranking