Disk block streaming using a broker computer system

    公开(公告)号:US10303454B2

    公开(公告)日:2019-05-28

    申请号:US15156118

    申请日:2016-05-16

    Applicant: VMware, Inc.

    Abstract: A method for sending executable content to a first computer is provided. The executable content includes computer instructions. A second computer receives a request from the first computer for contents of an identified disk block that contains a portion of the executable content, the identified disk block being identified by a block parameter that is stored in a data structure at the first computer. Then, the second computer identifies a third computer that includes an application that is available, the application including the disk block within a file structure. The request is provided to the third computer where the third computer uses a mapping between the block parameter and an actual location of the portion of the executable content and sends the portion of the executable content of the identified disk block to the first computer.

    Isolating data within a computer system using private shadow mappings

    公开(公告)号:US10241819B2

    公开(公告)日:2019-03-26

    申请号:US15055468

    申请日:2016-02-26

    Applicant: VMware, Inc.

    Abstract: Virtualization software establishes multiple execution environments within a virtual machine, wherein software modules executing in one environment cannot access private memory of another environment. A separate set of shadow memory address mappings is maintained for each execution environment. For example, a separate shadow page table may be maintained for each execution environment. The virtualization software ensures that the shadow address mappings for one execution environment do not map to the physical memory pages that contain the private code or data of another execution environment. When execution switches from one execution environment to another, the virtualization software activates the shadow address mappings for the new execution environment. A similar approach, using separate mappings, may also be used to prevent software modules in one execution environment from accessing the private disk space or other secondary storage of another execution environment.

    HIGH AVAILABILITY FOR PERSISTENT MEMORY
    63.
    发明申请

    公开(公告)号:US20180322023A1

    公开(公告)日:2018-11-08

    申请号:US15586020

    申请日:2017-05-03

    Applicant: VMware, Inc.

    Abstract: Techniques for implementing high availability for persistent memory are provided. In one embodiment, a first computer system can detect an alternating current (AC) power loss/cycle event and, in response to the event, can save data in a persistent memory of the first computer system to a memory or storage device that is remote from the first computer system and is accessible by a second computer system. The first computer system can then generate a signal for the second computer system subsequently to initiating or completing the save process, thereby allowing the second computer system to restore the saved data from the memory or storage device into its own persistent memory.

    MICRO-JOURNAL BASED TRANSACTION LOGGING
    65.
    发明申请

    公开(公告)号:US20170344440A1

    公开(公告)日:2017-11-30

    申请号:US15192940

    申请日:2016-06-24

    Applicant: VMware, Inc.

    Abstract: Techniques for using micro-journals to ensure crash consistency of a transactional application are provided. In one embodiment, a computer system can receive a transaction associated with the transactional application, where the transaction includes a plurality of modifications to data or metadata of the transactional application. The computer system can further select a free micro-journal from a pool of micro-journals, where the pool of micro-journals are stored in a byte-addressable persistent memory of the computer system, and where each micro-journal in the pool is configured to record journal entries for a single transaction at a time. The computer system can then write journal entries into the micro-journal corresponding to the plurality of modifications included in the transaction and commit the journal entries to the byte-addressable persistent memory.

    DISK BLOCK STREAMING USING A BROKER COMPUTER SYSTEM
    66.
    发明申请
    DISK BLOCK STREAMING USING A BROKER COMPUTER SYSTEM 审中-公开
    使用经纪人计算机系统的磁盘块流

    公开(公告)号:US20170024200A1

    公开(公告)日:2017-01-26

    申请号:US15156118

    申请日:2016-05-16

    Applicant: VMware, Inc.

    Abstract: A method for sending executable content to a first computer is provided. The executable content includes computer instructions. A second computer receives a request from the first computer for contents of an identified disk block that contains a portion of the executable content, the identified disk block being identified by a block parameter that is stored in a data structure at the first computer. Then, the second computer identifies a third computer that includes an application that is available, the application including the disk block within a file structure. The request is provided to the third computer where the third computer uses a mapping between the block parameter and an actual location of the portion of the executable content and sends the portion of the executable content of the identified disk block to the first computer.

    Abstract translation: 提供了一种用于向第一计算机发送可执行内容的方法。 可执行内容包括计算机指令。 第二计算机从第一计算机接收对包含可执行内容的一部分的所识别的磁盘块的内容的请求,所识别的磁盘块由存储在第一计算机的数据结构中的块参数标识。 然后,第二计算机识别包括可用的应用的第三计算机,该应用包括在文件结构内的磁盘块。 将该请求提供给第三计算机,其中第三计算机使用块参数与可执行内容的一部分的实际位置之间的映射,并将所识别的磁盘块的可执行内容的一部分发送到第一计算机。

    Coherence-based attack detection
    67.
    发明授权

    公开(公告)号:US12147528B2

    公开(公告)日:2024-11-19

    申请号:US17383342

    申请日:2021-07-22

    Applicant: VMware, Inc.

    Abstract: While an application or a virtual machine (VM) is running, a device tracks accesses to cache lines to detect access patterns that indicate security attacks, such as cache-based side channel attacks or row hammer attacks. To enable the device to detect accesses to cache lines, the device is connected to processors via a coherence interconnect, and the application/VM data is stored in a local memory of the device. The device collects the cache lines of the application/VM data that are accessed while the application/VM is running into a buffer and the buffer is analyzed for access patterns that indicate security attacks.

Patent Agency Ranking