Implementing per-processor memory areas with non-preemptible operations using virtual aliases

    公开(公告)号:US10331556B2

    公开(公告)日:2019-06-25

    申请号:US14838541

    申请日:2015-08-28

    Applicant: VMware, Inc.

    Abstract: A computer system provides a mechanism for assuring a safe, non-preemptible access to a private data area (PRDA) belonging to a CPU. PRDA accesses generally include obtaining an address of a PRDA and performing operations on the PRDA using the obtained address. Safe, non-preemptible access to a PRDA generally ensures that a context accesses the PRDA of the CPU on which the context is executing, but not the PRDA of another CPU. While a context executes on a first CPU, the context obtains the address of the PRDA. After the context is migrated to a second CPU, the context performs one or more operations on the PRDA belonging to the second CPU using the address obtained while the context executed on the first CPU. In another embodiment, preemption and possible migration of a context from one CPU to another CPU is delayed while a context executes non-preemptible code.

    Exposing memory-mapped IO devices to drivers through firmware
    43.
    发明授权
    Exposing memory-mapped IO devices to drivers through firmware 有权
    通过固件将内存映射IO设备暴露给驱动程序

    公开(公告)号:US09489211B2

    公开(公告)日:2016-11-08

    申请号:US14675381

    申请日:2015-03-31

    Applicant: VMware, Inc.

    CPC classification number: G06F9/4411

    Abstract: A mapping table is passed to system software upon loading of the system software in a computer system. The mapping table is generated from a user-defined configuration file and maps device identifiers of various devices implemented in the computer system, as assigned by the device manufacturers, to device identifiers that are recognizable by the system software. The mapping is used by the system software when it performs binding of device drivers to devices so that devices that have been given generic and sometimes obscure names by the device manufacturers can still be associated with and bound to device drivers loaded by the system software.

    Abstract translation: 在计算机系统中加载系统软件时,将映射表传递给系统软件。 映射表是从用户定义的配置文件生成的,并将在设备制造商分配的计算机系统中实现的各种设备的设备标识符映射到系统软件可识别的设备标识符。 当系统软件执行设备驱动程序到设备的绑定时,系统软件将使用该映射,以便设备制造商给予通用且有时是模糊的名称的设备仍然可以与系统软件加载的设备驱动程序相关联并绑定到设备驱动程序。

    Implementing upcall from secure to non-secure mode by injecting exception into non-secure mode
    44.
    发明授权
    Implementing upcall from secure to non-secure mode by injecting exception into non-secure mode 有权
    通过将异常注入非安全模式,实现从安全模式到非安全模式的upcall

    公开(公告)号:US09465617B1

    公开(公告)日:2016-10-11

    申请号:US14753720

    申请日:2015-06-29

    Applicant: VMware, Inc.

    Abstract: A computer system that does not natively support non-maskable interrupts (NMIs) implements NMI-like functionality in a secure monitor. The computer system detects a high priority interrupt and determines whether or not interrupts are enabled or disabled. If interrupts are enabled, the computer system injects an exception into a currently executing thread of system software operating at the second privilege level, and an exception handler processes the exception like a standard exception. If interrupts are disabled, the computer system saves the current system state (e.g., the current program counter and CPU state) and values of one or more exception handling registers in temporary storage and injects an exception into the currently executing thread of the system software, and the exception handler processes the exception in a special manner.

    Abstract translation: 本机不支持不可屏蔽中断(NMI)的计算机系统在安全监视器中实现类似NMI的功能。 计算机系统检测到高优先级中断,并确定中断是否被使能或禁止。 如果启用了中断,则计算机系统将在第二个权限级别的系统软件当前正在执行的线程中注入异常,并且异常处理程序像标准异常一样处理异常。 如果中断被禁用,计算机系统将临时存储器中的当前系统状态(例如当前程序计数器和CPU状态)以及一个或多个异常处理寄存器的值保存在系统软件当前正在执行的线程中, 异常处理程序以特殊方式处理异常。

    HARDWARE-ASSISTED PARAVIRTUALIZED HARDWARE WATCHDOG

    公开(公告)号:US20230229538A1

    公开(公告)日:2023-07-20

    申请号:US17577627

    申请日:2022-01-18

    Applicant: VMware, Inc.

    Abstract: A hardware-assisted paravirtualized hardware watchdog is described that is used to detect and recover from computer malfunctions. A computing device determines that a hardware-implemented watchdog of the computing device does not comply with predetermined watchdog criteria, where the hardware-implemented watchdog is configured to send a reset signal when a first predetermined amount of time elapses without receipt of a first refresh signal. If the hardware-implemented watchdog does not comply with the predetermined watchdog criteria, a runtime watchdog service is initialized using a second predetermined amount of time. The runtime watchdog service is directed to periodically send the refresh signal to the hardware-implemented watchdog before an expiration of the first predetermined amount of time that causes the hardware-implemented watchdog to expire. The hardware-implemented watchdog is directed to send the reset signal when the second predetermined amount of time elapses without receipt of a second refresh signal.

Patent Agency Ranking