TECHNOLOGIES FOR MULTI-LEVEL VIRTUALIZATION

    公开(公告)号:US20170090963A1

    公开(公告)日:2017-03-30

    申请号:US14866187

    申请日:2015-09-25

    Abstract: Technologies for multi-level virtualization include a computing device having a processor that supports a root virtualization mode and a non-root virtualization mode. A non-root hypervisor determines whether it is executed under control of a root hypervisor, and if so, registers a callback handler and trigger conditions with the root hypervisor. The non-root hypervisor hosts one or more virtual machines. In response to a virtual machine exit, the root hypervisor determines whether a callback handler has been registered for the virtual machine exit reason and, if so, evaluates the trigger conditions associated with the callback handler. If the trigger conditions are satisfied, the root hypervisor invokes the callback handler. The callback handler may update a virtual virtualization support object based on changes made by the root hypervisor to a virtualization support object. The root hypervisor may invoke the callback handler in the non-root virtualization mode. Other embodiments are described and claimed.

    Platform security using processor assists
    5.
    发明申请
    Platform security using processor assists 审中-公开
    平台安全使用处理器协助

    公开(公告)号:US20160308903A1

    公开(公告)日:2016-10-20

    申请号:US14998087

    申请日:2015-12-24

    Abstract: Systems, apparatuses and methods may provide for detecting an attempt by an operating system (OS) to access a non-OS managed resource and injecting, in response to the attempt, an access event into a platform security component via a guest kernel associated with the OS. Additionally, a response to the attempt may be made based on a policy response from the platform security component. In one example, the attempt is detected with respect to one or more extended page table (EPT) permissions set by a security virtual machine monitor (SVMM). Moreover, injecting the access event into the platform security component may include invoking a previously registered policy callback.

    Abstract translation: 系统,装置和方法可以提供用于检测操作系统(OS)尝试访问非OS管理的资源,并且响应于该尝试,通过与所述客户端内核相关联的访客内核将访问事件注入平台安全组件 操作系统。 此外,可以基于来自平台安全组件的策略响应来对尝试做出响应。 在一个示例中,针对由安全虚拟机监视器(SVMM)设置的一个或多个扩展页表(EPT)权限检测到该尝试。 此外,将访问事件注入到平台安全组件中可以包括调用先前注册的策略回调。

    Integrity protection of a mandatory access control policy in an operating system using virtual machine extension root operations
    7.
    发明申请
    Integrity protection of a mandatory access control policy in an operating system using virtual machine extension root operations 审中-公开
    在使用虚拟机扩展根操作的操作系统中强制访问控制策略的完整性保护

    公开(公告)号:US20160335429A1

    公开(公告)日:2016-11-17

    申请号:US14757948

    申请日:2015-12-24

    Abstract: Systems, apparatuses and methods may provide for conducting a signature verification of a mandatory access control policy and provisioning the mandatory access control policy into kernel memory if the signature verification is successful. Additionally, the kernel memory may be protected from unauthorized write operations by one or more processes having system level privileges. In one example, the mandatory access control policy is provisioned without a system reboot.

    Abstract translation: 系统,装置和方法可以提供强制访问控制策略的签名验证,并且如果签名验证成功,则将强制访问控制策略提供给内核存储器。 此外,可以通过具有系统级特权的一个或多个进程来保护内核存储器免于未授权的写入操作。 在一个示例中,强制访问控制策略被配置,而不需要重新启动系统。

    Platform security using processor assists

    公开(公告)号:US10248786B2

    公开(公告)日:2019-04-02

    申请号:US14998087

    申请日:2015-12-24

    Abstract: Systems, apparatuses and methods may provide for detecting an attempt by an operating system (OS) to access a non-OS managed resource and injecting, in response to the attempt, an access event into a platform security component via a guest kernel associated with the OS. Additionally, a response to the attempt may be made based on a policy response from the platform security component. In one example, the attempt is detected with respect to one or more extended page table (EPT) permissions set by a security virtual machine monitor (SVMM). Moreover, injecting the access event into the platform security component may include invoking a previously registered policy callback.

Patent Agency Ranking