Software-controlled interrupts for I/O devices

    公开(公告)号:US11068422B1

    公开(公告)日:2021-07-20

    申请号:US16804480

    申请日:2020-02-28

    Applicant: VMware, Inc.

    Abstract: Described herein are embodiments that adaptively reduce the number of interrupts that occur between a device controller and a computer system. Device commands are submitted to the controller by an operating system on behalf of an application. The device performs the received commands and indicates command completions to the controller. A counter counts completions, and if the count exceeds a threshold number, the controller generates an interrupt to the computer system. If the count is greater than zero and the timeout interval has expired, then the controller generates an interrupt to the computer system. In some embodiments, the application attaches flags to one of the commands indicating that an interrupt relating to completion of the flagged command should be generated as soon as possible or that an interrupt relating to completion of all commands prior to and including the flagged command should be generated as soon as possible.

    32-BIT ADDRESS SPACE CONTAINMENT TO SECURE PROCESSES FROM SPECULATIVE ROGUE CACHE LOADS

    公开(公告)号:US20190243776A1

    公开(公告)日:2019-08-08

    申请号:US15960467

    申请日:2018-04-23

    Applicant: VMware, Inc.

    Abstract: Embodiments are disclosed to mitigate the meltdown vulnerability by selectively using page table isolation. Page table isolation is enabled for 64-bit applications, so that unprivileged areas in the kernel address space cannot be accessed in user mode due to speculative execution by the processor. On the other hand, page table isolation is disabled for 32-bit applications thereby providing mapping into unprivileged areas in the kernel address space. However, speculative execution is limited to a 32-bit address space in a 32-bit application, and s access to unprivileged areas in the kernel address space can be inhibited.

    SEPARATE CORES TO SECURE PROCESSES FROM SPECULATIVE ROGUE CACHE LOADS

    公开(公告)号:US20190243990A1

    公开(公告)日:2019-08-08

    申请号:US16016254

    申请日:2018-06-22

    Applicant: VMware, Inc.

    Abstract: The present disclosure addresses the meltdown vulnerability resulting from speculative execution in a multi-core processing system. The operating system (OS) can be loaded for execution on one of several processing cores (OS core), while an application can be loaded for execution on another of the processing cores (application core). The OS core uses process page tables that map the entire kernel address space to physical memory. Conversely, the application core uses pages tables that map only a portion of the kernel address space to physical memory.

Patent Agency Ranking