Target injection safe method for inlining large call tables

    公开(公告)号:US10834255B1

    公开(公告)日:2020-11-10

    申请号:US16748734

    申请日:2020-01-21

    Applicant: VMware, Inc.

    Abstract: A method redirecting an indirect call in a call table to direct call includes the steps of: recording frequencies of calls in a frequency table; updating a search trampoline to cache, as direct calls, calls of the call table that are most frequently made according to the recorded calls in the frequency table; receiving a request to perform one of the calls in the call table; performing a search of the search trampoline to determine whether or not the requested call is cached in the search trampoline; if the requested call is cached in the search trampoline, performing the requested call that is cached in the search trampoline; and if the requested call is not cached in the search trampoline, performing the requested call by accessing the call via the call table.

    Dynamic Timeout-Based Fault Detection
    24.
    发明申请

    公开(公告)号:US20200186455A1

    公开(公告)日:2020-06-11

    申请号:US16211027

    申请日:2018-12-05

    Applicant: VMware, Inc.

    Abstract: Techniques for implementing dynamic timeout-based fault detection in a distributed system are provided. In one set of embodiments, a node of the distributed system can set a timeout interval to a minimum value and transmit poll messages to other nodes in the distributed system. The node can further wait for acknowledgement messages from all of the other nodes, where the acknowledgement messages are responsive to the poll messages, and can check whether it has received the acknowledgement messages from all of the other nodes within the timeout interval. If the node has failed to receive an acknowledgement message from at least one of the other nodes within the timeout interval and if the timeout interval is less than a maximum value, the node can increment the timeout interval by a delta value and can repeat the setting, the transmitting, the waiting, and the checking steps.

    Method for transparently logging and replicating distributed services

    公开(公告)号:US10574571B2

    公开(公告)日:2020-02-25

    申请号:US15789819

    申请日:2017-10-20

    Applicant: VMware, Inc.

    Inventor: Michael Wei Ke Wang

    Abstract: The disclosure provides an approach for transferring a packet from a source client to a destination application across a network. The approach generally includes writing an identifier to the packet by a switch, transferring the packet to a distributed log, logging a copy of the packet at the distributed log, and analyzing the packet for misplaced requests. The approach further includes, transmitting the packet from the distributed log to the destination, intercepting the packet by a shim layer and comparing the identifier to a counter maintained by the shim layer, and forwarding the packet to the destination application.

    CLOCK CALIBRATION IN A COMPUTING SYSTEM USING TEMPERATURE SENSORS

    公开(公告)号:US20230089659A1

    公开(公告)日:2023-03-23

    申请号:US17478063

    申请日:2021-09-17

    Applicant: VMware, Inc.

    Abstract: Described herein are systems, methods, and software to manage time calibration associated with an oscillator of a computing system. In one example, a computing system monitors clock cycles for an oscillator on the computing system, receives timing messages from a server, and calculates the frequency of the oscillator at intervals based on the monitored clock cycles and timing messages. The computing system further identifies a temperature from a temperature sensor at each of the intervals and generates a function to demonstrate frequency of the oscillator versus temperatures from the temperature sensor based on the identified temperatures and frequencies at the intervals.

    Early acknowledgement of translation lookaside buffer shootdowns

    公开(公告)号:US11321242B2

    公开(公告)日:2022-05-03

    申请号:US17021834

    申请日:2020-09-15

    Applicant: VMware, Inc.

    Abstract: Techniques for implementing early acknowledgement for translation lookaside buffer (TLB) shootdowns are provided. In one set of embodiments, a first (i.e., remote) processing core of a computer system can receive an inter-processor interrupt (IPI) from a second (i.e., initiator) processing core of the computer system for performing a TLB shootdown of the first processing core. Upon receiving the IPI, an interrupt handler of the first processing core can communicate an acknowledgement to the second processing core that the TLB of the first processing core has been flushed, prior to actually flushing the TLB.

    EARLY ACKNOWLEDGEMENT OF TRANSLATION LOOKASIDE BUFFER SHOOTDOWNS

    公开(公告)号:US20220083476A1

    公开(公告)日:2022-03-17

    申请号:US17021834

    申请日:2020-09-15

    Applicant: VMware, Inc.

    Abstract: Techniques for implementing early acknowledgement for translation lookaside buffer (TLB) shootdowns are provided. In one set of embodiments, a first (i.e., remote) processing core of a computer system can receive an inter-processor interrupt (IPI) from a second (i.e., initiator) processing core of the computer system for performing a TLB shootdown of the first processing core. Upon receiving the IPI, an interrupt handler of the first processing core can communicate an acknowledgement to the second processing core that the TLB of the first processing core has been flushed, prior to actually flushing the TLB.

    Just-in-time hardware for field programmable gate arrays

    公开(公告)号:US10990730B2

    公开(公告)日:2021-04-27

    申请号:US16030551

    申请日:2018-07-09

    Applicant: VMware, Inc.

    Abstract: A method for implementing a distributed hardware system includes retrieving a hardware design described in a hardware description language, where the hardware design includes a plurality of modules. The method includes sending modules of the design to software engines, where the runtime software maintains for each module being simulated an update queue and evaluate queue. The update queue contains events that update stateful objects in the module and cause evaluation events to be enqueued onto the evaluate queue, while the evaluate queue contains evaluate events that update stateless objects and cause update events to be enqueued onto the update queue. Having a update and evaluate queues for each module permits the runtime to manage module simulations so that the executions of each module run concurrently with each other.

    ENFORCING CODE INTEGRITY USING A TRUSTED COMPUTING BASE

    公开(公告)号:US20210026785A1

    公开(公告)日:2021-01-28

    申请号:US16519616

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: One or more kernel-modifying procedures are stored in a trusted computing base (TCB) when bringing up a guest operating system (OS) on a virtual machine (VM) on a virtualization platform. When the guest OS invokes an OS-level kernel-modifying procedure, a call is made to the hypervisor. If the hypervisor determines the TCB to be valid, the kernel-modifying procedure in the TCB that corresponds to the OS-level kernel-modifying procedure is invoked so that the kernel code can be modified.

Patent Agency Ranking