Patent classifications
G06F9/45545
Display module test platform
The present application relates to the field of display technology, and discloses a display module test platform, including a core processor. The core processor is capable of supporting installation of a terminal operating system. A display output terminal of the core processor is connected to a display module to be tested. The display module to be tested includes a touch structure. The touch structure and the core processor communicate with each other via an Inter-Integrated Circuit (I2C) bus.
Technologies for controlling memory access transactions received from one or more I/O devices
Technologies for secure I/O include a compute device, which further includes a processor, a memory, a trusted execution environment (TEE), one or more input/output (I/O) devices, and an I/O subsystem. The I/O subsystem includes a device memory access table (DMAT) programmed by the TEE to establish bindings between the TEE and one or more I/O devices that the TEE trusts and a memory ownership table (MOT) programmed by the TEE when a memory page is allocated to the TEE.
Memory encryption for virtual machines by hypervisor-controlled firmware
Systems and methods for encryption support for virtual machines. An example method may comprise initializing, by a firmware module associated with a virtual machine running on a host computer system, an exclusion range register associated with the virtual machine with a value specifying a first portion of guest memory, wherein the first portion of the guest memory comprises an exclusion range marked as reserved; encrypting, by the firmware using an ephemeral encryption key, a second portion of the guest memory; booting, by a hypervisor of the host computer system, the virtual machine; and responsive to intercepting, by the hypervisor, a privileged instruction executed by the virtual machine, performing at least one of: copying data for performing the privileged instruction to the first portion of the guest memory or copying data for performing the privileged instruction from the first portion of the guest memory.
VIRTUAL DEVICE ASSIGNMENT FRAMEWORK
Examples described herein relate to circuitry configured to generate at least one virtual device interface to utilize the processor circuitry and provide the at least one virtual device interface to a server to assign to a process to provide the process with capability to utilize the processor circuitry. In some examples, the processor circuitry is to perform one or more of local area network access, cryptographic processing, and/or storage access. In some examples, the storage access comprises access to one or more Non-volatile Memory Express (NVMe) devices.
SYSTEM AND METHOD FOR PROVIDING PAGE MIGRATION
Methods and apparatus for providing page migration of pages among tiered memories identify frequently accessed memory pages in each memory tier and generate page hotness ranking information indicating how frequently memory pages are being accessed. Methods and apparatus provide the page hotness ranking information to an operating system or hypervisor depending on which is used in the system, the operating system or hypervisor issues a page move command to a hardware data mover, based on the page hotness ranking information and the hardware data mover moves a memory page to a different memory tier in response to the page move command from the operating system.
POD DEPLOYMENT IN A GUEST CLUSTER EXECUTING AS A VIRTUAL EXTENSION OF MANAGEMENT CLUSTER IN A VIRTUALIZED COMPUTING SYSTEM
An example virtualized computing system includes a host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts, the virtualization layer supporting execution of virtual machines (VMs), the VMs including pod VMs, the pod VMs including container engines supporting execution of containers in the pod VMs; and an orchestration control plane integrated with the virtualization layer, the orchestration control plane including a master server configured to manage the pod VMs and first VMs of the VMs. The virtualized computing system further includes a guest cluster executing in the first VMs and managed by the orchestration control plane, the guest cluster including a guest master server configured to, in cooperation with the master server, deploy first pods in the pod VMs.
Methods for identifying a source location in a service chaining topology
In an embodiment, a computer-implemented method provides mechanisms for identifying a source location in a service chaining topology. In an embodiment, a method comprises: receiving a query, from a service plane implementation module executing on a host of a service virtual machine (“SVM”), for a location of a source host implementing a guest virtual machine (“source GVM”) that originated a packet in a computer network and that serviced the packet; in response to receiving the query, performing a search of bindings associated with one or more virtual network identifiers (“VNIs”) or service virtual network identifiers (“SVNIs”) to identify a particular binding that includes a MAC address of the host implementing the source GVM; identifying, in the particular binding, the location of the source host; and providing the location of the source host to the host of the SVM to facilitate forwarding of the packet from the SVM to the GVM.
System and method to commit container changes on a VM-based container
Disclosed herein are embodiments for committing changes of an image of a virtual machine-based container running on a host computer system. A starting image for a container is obtained from a guest starting folder, and while the container runs the starting image changes to the image made by the running container are captured in a guest folder that is union mounted with the guest starting folder. Another union folder, which is the union of a new host folder and the starting folder, contains the changed image which can be used for the container or transferred to a different container.
SELECTIVE MEMORY DEDUPLICATION FOR VIRTUALIZED COMPUTER SYSTEMS
A processing device executing a guest receives a request from an application to disable memory deduplication for a memory page associated with the application; identifies a non-mergeable memory range for memory space of the guest, where the non-mergeable memory range is associated with guest memory pages not to be deduplicated; maps, in a page table of the guest, an entry for the memory page to a memory address within the non-mergeable memory range; and causes a host to disable memory deduplication for the memory page responsive to detecting an access of the memory page by the application.
DYNAMIC CONNECTION SWITCHING IN VIRTUAL DESKTOPS UNDER NESTED MODE
System and method are described for dynamically switching redirection of features between a first and a second virtual desktop that are accessed by a client in nested mode. To connect to the desktops in the nested configuration, the client can establish a first session on the first virtual desktop and then establish a session on the second virtual desktop within the first desktop. A connection can be established between the client and an agent in the first desktop for exchanging feature redirection data corresponding to a feature such as USB, clipboard, etc., and the feature can subsequently be redirected to the first desktop by exchanging corresponding data over the connection. A request can be received to switch the feature redirection to the second desktop. In response to the request, the client can establish a connection for redirecting the feature with an agent in the second desktop and the feature can be subsequently redirected to the second desktop by exchanging corresponding data over the new connection. As a result, feature redirection can be switched between desktops dynamically without terminating either virtual desktop session.