US10706152B2 - Systems and methods for concealed object store in a virtualized information handling system - Google Patents
Systems and methods for concealed object store in a virtualized information handling system Download PDFInfo
- Publication number
- US10706152B2 US10706152B2 US15/784,409 US201715784409A US10706152B2 US 10706152 B2 US10706152 B2 US 10706152B2 US 201715784409 A US201715784409 A US 201715784409A US 10706152 B2 US10706152 B2 US 10706152B2
- Authority
- US
- United States
- Prior art keywords
- hypervisor
- concealed
- namespace
- virtual machines
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims description 17
- 230000015654 memory Effects 0.000 claims abstract description 75
- 230000002085 persistent effect Effects 0.000 claims description 9
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 238000003860 storage Methods 0.000 description 29
- 238000004891 communication Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000002093 peripheral effect Effects 0.000 description 4
- 230000004075 alteration Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000002411 adverse Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 239000011810 insulating material Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45583—Memory management, e.g. access or allocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Definitions
- This disclosure relates generally to virtualized information handling systems and more particularly to data security in an information handling system comprising a plurality of virtualized information handling systems.
- An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information.
- information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated.
- the variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications.
- information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
- a virtualized information handling system a single physical server may instantiate multiple, independent virtual servers.
- Server virtualization is enabled primarily by a piece of software (often referred to as a “hypervisor”) that provides a software layer between the server hardware and the multiple operating systems, also referred to as guest operating systems (guest OS).
- hypervisor provides a container that presents a logical hardware interface to the guest operating systems.
- VM virtual machine
- virtualized architectures may be employed for numerous reasons, such as, but not limited to: (1) increased hardware resource utilization; (2) cost-effective scalability across a common, standards-based infrastructure; (3) workload portability across multiple servers; (4) streamlining of application development by certifying to a common virtual interface rather than multiple implementations of physical hardware; and (5) encapsulation of complex configurations into a file that is easily replicated and provisioned, among other reasons.
- the information handling system may include one or more operating systems, for example, executing as guest operating systems in respective virtual machines.
- An operating system serves many functions, such as controlling access to hardware resources and controlling the execution of application software. Operating systems also provide resources and services to support application software. These resources and services may include data storage, support for at least one file system, a centralized configuration database (such as the registry found in Microsoft Windows operating systems), a directory service, a graphical user interface, a networking stack, device drivers, device management software, and memory. In some instances, services may be provided by other application software running on the information handling system, such as a database server.
- a hypervisor of a host operating system upon which a virtual machine executed may have many vulnerabilities. Due to native virtualization architecture which may require specially configured hardware, most virtualization deployments are implemented with the hosted architecture. With vulnerabilities and security holes in most modern operating systems, malicious attacks can be carried out to gain control of the host operating system. Because the hypervisor is often a layer executing on the host operating system, once an attacker has control of a host operating system, the hypervisor is essentially compromised.
- an attacker may corrupt critical portions of virtual machines, including a virtual machine boot on memory namespaces (including, for example, persistent memory namespace such as non-volatile dual-inline memory module (NV-DIMM) namespaces) and can perform one or more malicious activities on any of the virtual machines hosted by the hypervisor.
- memory namespaces including, for example, persistent memory namespace such as non-volatile dual-inline memory module (NV-DIMM) namespaces
- Attacks on a hypervisor through a guest operating system may use the guest operating system to gain unauthorized access to other virtual namespaces on a memory module (e.g., NV-DIMM).
- NV-DIMM memory module
- many virtual machines may share the same physical resources (e.g., NV-DIMM namespaces)
- the attacker may be able to conduct attacks directly on the real physical resources.
- the attacker may adversely affect multiple virtual machines and the hypervisor, and potentially all virtual machine and operating systems boots may fail.
- Any small namespace attribute change may cause block input/output (I/O) issues in a namespace, and as a result, an entire virtual machine may fail to load/boot.
- a virtual machine has access only to read/write to namespace data areas but namespace attributes or metadata is often not accessible to a virtual machine because of security reasons. But the vulnerabilities of a hypervisor may allow an attacker to gain access to virtual machines to corrupt the namespace object data. Because NV-DIMM namespace labels and metadata objects are created within NV-DIMM storage space and maintained at the hypervisor level, such namespace labels and metadata objects are prone to corruption.
- the disadvantages and problems associated with data security in a virtualized information handling system architecture may be reduced or eliminated.
- an information handling system may include a processor subsystem configured to execute a hypervisor, wherein the hypervisor is configured to host a plurality of virtual machines and a memory subsystem communicatively coupled to the processor subsystem.
- the memory subsystem may be configured to implement namespaces for the hypervisor and the plurality of virtual machines and implement for each of the namespaces a concealed namespace object store as a hidden metadata area of the memory subsystem unexposed to the hypervisor and the plurality of virtual machines, each concealed namespace object store comprising metadata for an associated namespace.
- a method may include, in an information handling system comprising a processor subsystem configured to execute a hypervisor, wherein the hypervisor is configured to host a plurality of virtual machines and comprising a memory subsystem communicatively coupled to the processor subsystem, implementing, within the memory subsystem, namespaces for the hypervisor and the plurality of virtual machines.
- the method may also include implementing, within the memory subsystem, for each of the namespaces a concealed namespace object store as a hidden metadata area of the memory subsystem unexposed to the hypervisor and the plurality of virtual machines, each concealed namespace object store comprising metadata for an associated namespace.
- an article of manufacture may include a non-transitory computer-readable medium and computer-executable instructions for a proxy server carried on the computer-readable medium, the instructions readable by a processor, the instructions, when read and executed, for causing the processor to, in an information handling system comprising a processor subsystem configured to execute a hypervisor, wherein the hypervisor is configured to host a plurality of virtual machines and comprising a memory subsystem communicatively coupled to the processor subsystem: implement, within the memory subsystem, namespaces for the hypervisor and the plurality of virtual machines; and implement, within the memory subsystem, for each of the namespaces a concealed namespace object store as a hidden metadata area of the memory subsystem unexposed to the hypervisor and the plurality of virtual machines, each concealed namespace object store comprising metadata for an associated namespace.
- FIG. 1 illustrates a block diagram of selected elements of an example information handling system, in accordance with embodiments of the present disclosure
- FIG. 2 illustrates a block diagram of selected elements of another example information handling system, in accordance with embodiments of the present disclosure.
- FIG. 3 illustrates a block diagram of selected elements of yet another example information handling system, in accordance with embodiments of the present disclosure.
- FIGS. 1-3 wherein like numbers are used to indicate like and corresponding parts.
- an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, entertainment, or other purposes.
- an information handling system may be a personal computer, a personal digital assistant (PDA), a consumer electronic device, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
- the information handling system may include memory, one or more processing resources such as a central processing unit (“CPU”), microcontroller, or hardware or software control logic.
- Additional components of the information handling system may include one or more storage devices, one or more communications ports for communicating with external devices as well as various input/output (“I/O”) devices, such as a keyboard, a mouse, and a video display.
- the information handling system may also include one or more buses operable to transmit communication between the various hardware components.
- an information handling system may include firmware for controlling and/or communicating with, for example, hard drives, network circuitry, memory devices, I/O devices, and other peripheral devices.
- the hypervisor and/or other components may comprise firmware.
- firmware includes software embedded in an information handling system component used to perform predefined tasks. Firmware is commonly stored in non-volatile memory, or memory that does not lose stored data upon the loss of power.
- firmware associated with an information handling system component is stored in non-volatile memory that is accessible to one or more information handling system components.
- firmware associated with an information handling system component is stored in non-volatile memory that is dedicated to and comprises part of that component.
- Computer-readable media may include any instrumentality or aggregation of instrumentalities that may retain data and/or instructions for a period of time.
- Computer-readable media may include, without limitation, storage media such as a direct access storage device (e.g., a hard disk drive or floppy disk), a sequential access storage device (e.g., a tape disk drive), compact disk, CD-ROM, DVD, random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), and/or flash memory; as well as communications media such as wires, optical fibers, microwaves, radio waves, and other electromagnetic and/or optical carriers; and/or any combination of the foregoing.
- storage media such as a direct access storage device (e.g., a hard disk drive or floppy disk), a sequential access storage device (e.g., a tape disk drive), compact disk, CD-ROM, DVD, random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-
- information handling resources may broadly refer to any component system, device or apparatus of an information handling system, including without limitation processors, service processors, basic input/output systems (BIOSs), buses, memories, I/O devices and/or interfaces, storage resources, network interfaces, motherboards, and/or any other components and/or elements of an information handling system.
- processors service processors, basic input/output systems (BIOSs), buses, memories, I/O devices and/or interfaces, storage resources, network interfaces, motherboards, and/or any other components and/or elements of an information handling system.
- BIOS basic input/output systems
- circuit boards may broadly refer to printed circuit boards (PCBs), printed wiring boards (PWBs), printed wiring assemblies (PWAs) etched wiring boards, and/or any other board or similar physical structure operable to mechanically support and electrically couple electronic components (e.g., packaged integrated circuits, slot connectors, etc.).
- a circuit board may comprise a substrate of a plurality of conductive layers separated and supported by layers of insulating material laminated together, with conductive traces disposed on and/or in any of such conductive layers, with vias for coupling conductive traces of different layers together, and with pads for coupling electronic components (e.g., packaged integrated circuits, slot connectors, etc.) to conductive traces of the circuit board.
- a hyphenated form of a reference numeral refers to a specific instance of an element and the un-hyphenated form of the reference numeral refers to the element generically.
- device “12-1” refers to an instance of a device class, which may be referred to collectively as devices “12” and any one of which may be referred to generically as a device “12”.
- FIG. 1 illustrates a block diagram of selected elements of an example information handling system 100 - 1 , in accordance with embodiments of the present disclosure.
- system 100 - 1 may represent an information handling system comprising physical hardware 102 and executable instructions 180 (including hypervisor 104 and one or more virtual machines 105 ).
- System 100 - 1 may also include external or remote elements, for example, network 155 and network storage resource 170 .
- components of physical hardware 102 may include, but are not limited to, processor subsystem 120 , which may comprise one or more processors, and system bus 121 that may communicatively couple various system components to processor subsystem 120 including, for example, a BIOS 106 , a memory subsystem 130 , an I/O subsystem 140 , local storage resource 150 , and a network interface 160 .
- System bus 121 may represent a variety of suitable types of bus structures, e.g., a memory bus, a peripheral bus, or a local bus using various bus architectures in selected embodiments.
- such architectures may include, but are not limited to, Micro Channel Architecture (MCA) bus, Industry Standard Architecture (ISA) bus, Enhanced ISA (EISA) bus, Peripheral Component Interconnect (PCI) bus, PCIe bus, HyperTransport (HT) bus, and Video Electronics Standards Association (VESA) local bus.
- MCA Micro Channel Architecture
- ISA Industry Standard Architecture
- EISA Enhanced ISA
- PCI Peripheral Component Interconnect
- PCIe PCIe bus
- HT HyperTransport
- VESA Video Electronics Standards Association
- Network interface 160 may comprise any suitable system, apparatus, or device operable to serve as an interface between information handling system 100 - 1 and network 155 .
- Network interface 160 may enable information handling system 100 - 1 to communicate over network 155 using a suitable transmission protocol or standard, including, but not limited to, transmission protocols or standards enumerated below with respect to the discussion of network 155 .
- network interface 160 may be communicatively coupled via network 155 to network storage resource 170 .
- Network 155 may be implemented as, or may be a part of, a storage area network (SAN), personal area network (PAN), local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a wireless local area network (WLAN), a virtual private network (VPN), an intranet, the Internet or another appropriate architecture or system that facilitates the communication of signals, data or messages (generally referred to as data).
- SAN storage area network
- PAN personal area network
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- WLAN wireless local area network
- VPN virtual private network
- intranet the Internet or another appropriate architecture or system that facilitates the communication of signals, data or messages (generally referred to as data).
- Network 155 may transmit data using a desired storage or communication protocol, including, but not limited to, Fibre Channel, Frame Relay, Asynchronous Transfer Mode (ATM), Internet protocol (IP), other packet-based protocol, small computer system interface (SCSI), Internet SCSI (iSCSI), Serial Attached SCSI (SAS) or another transport that operates with the SCSI protocol, advanced technology attachment (ATA), serial ATA (SATA), advanced technology attachment packet interface (ATAPI), serial storage architecture (SSA), integrated drive electronics (IDE), and/or any combination thereof.
- Network 155 and its various components may be implemented using hardware, software, firmware, or any combination thereof.
- processor subsystem 120 may comprise any suitable system, device, or apparatus operable to interpret and/or execute program instructions and/or process data, and may include a microprocessor, microcontroller, digital signal processor (DSP), application specific integrated circuit (ASIC), or another digital or analog circuitry configured to interpret and/or execute program instructions and/or process data.
- processor subsystem 120 may interpret and execute program instructions or process data stored locally (e.g., in BIOS 106 , memory subsystem 130 , or another component of physical hardware 102 ).
- processor subsystem 120 may interpret and execute program instructions or process data stored remotely (e.g., in network storage resource 170 ).
- processor subsystem 120 may represent a multi-processor configuration that includes at least a first processor and a second processor (see also FIG. 2 ).
- BIOS 106 may include any system, device, or apparatus configured to identify, test, and/or initialize information handling resources of information handling system 100 - 1 , and/or initialize interoperation of information handling system 102 with other information handling systems.
- BIOS may broadly refer to any system, device, or apparatus configured to perform such functionality, including without limitation, a Unified Extensible Firmware Interface (UEFI).
- BIOS 106 may be implemented as a program of instructions that may be read by and executed on processor subsystem 120 to carry out the functionality of BIOS 106 .
- BIOS 106 may comprise boot firmware configured to be the first code executed by processor subsystem 120 when information handling system 100 - 1 is booted and/or powered on.
- code for BIOS 106 may be configured to set components of information handling system 100 - 1 into a known state, so that one or more applications (e.g., an operating system or other application programs) stored on compatible media (e.g., disk drives) may be executed by processor subsystem 120 and given control of information handling system 100 - 1 .
- applications e.g., an operating system or other application programs
- compatible media e.g., disk drives
- Memory subsystem 130 may comprise any suitable system, device, or apparatus operable to retain and retrieve program instructions and data for a period of time (e.g., computer-readable media).
- Memory subsystem 130 may comprise random access memory (RAM), electrically erasable programmable read-only memory (EEPROM), a PCMCIA card, flash memory, magnetic storage, opto-magnetic storage, or a suitable selection or array of volatile or non-volatile memory that retains data after power to an associated information handling system, such as system 100 - 1 , is powered down.
- RAM random access memory
- EEPROM electrically erasable programmable read-only memory
- PCMCIA card electrically erasable programmable read-only memory
- flash memory magnetic storage
- opto-magnetic storage or a suitable selection or array of volatile or non-volatile memory that retains data after power to an associated information handling system, such as system 100 - 1 , is powered down.
- memory subsystem 130 may comprise persistent memory, such as one or more Non-Volatile Dual-Inline Memory Modules (NV-DIMMs) configured to maintain persistence of data written to the persistent memory in the event of a power event in which electrical energy to the persistent memory is withdrawn.
- NV-DIMMs Non-Volatile Dual-Inline Memory Modules
- Local storage resource 150 may comprise computer-readable media (e.g., hard disk drive, floppy disk drive, CD-ROM, and/or other type of rotating storage media, flash memory, EEPROM, and/or another type of solid state storage media) and may be generally operable to store instructions and data.
- network storage resource 170 may comprise computer-readable media (e.g., hard disk drive, floppy disk drive, CD-ROM, or other type of rotating storage media, flash memory, EEPROM, or other type of solid state storage media) and may be generally operable to store instructions and data.
- I/O subsystem 140 may comprise any suitable system, device, or apparatus generally operable to receive and transmit data to or from or within system 100 - 1 .
- I/O subsystem 140 may represent, for example, any one or more of a variety of communication interfaces, graphics interfaces, video interfaces, user input interfaces, and peripheral interfaces.
- Hypervisor 104 may comprise software (i.e., executable code or instructions) and/or firmware generally operable to allow multiple operating systems to run on a single information handling system at the same time. This operability is generally allowed via virtualization, a technique for hiding the physical characteristics of information handling system resources from the way in which other systems, applications, or end users interact with those resources.
- Hypervisor 104 may be one of a variety of proprietary and/or commercially available virtualization platforms, including, but not limited to, IBM's Z/VM, XEN, ORACLE VM, VMWARE's ESX SERVER, L4 MICROKERNEL, TRANGO, MICROSOFT's HYPER-V, SUN's LOGICAL DOMAINS, HITACHI's VIRTAGE, KVM, VMWARE SERVER, VMWARE WORKSTATION, VMWARE FUSION, QEMU, MICROSOFT's VIRTUAL PC and VIRTUAL SERVER, INNOTEK's VIRTUALBOX, and SWSOFT's PARALLELS WORKSTATION and PARALLELS DESKTOP.
- hypervisor 104 may comprise a specially designed operating system (OS) with native virtualization capabilities.
- hypervisor 104 may comprise a standard OS with an incorporated virtualization component for performing virtualization.
- hypervisor 104 may comprise a standard OS running alongside a separate virtualization application.
- the virtualization application of hypervisor 104 may be an application running above the OS and interacting with physical hardware 102 only through the OS.
- the virtualization application of hypervisor 104 may, on some levels, interact indirectly with physical hardware 102 via the OS, and, on other levels, interact directly with physical hardware 102 (e.g., similar to the way the OS interacts directly with physical hardware 102 , and as firmware running on physical hardware 102 ), also referred to as device pass-through.
- device pass-through the virtual machine may utilize a physical device directly without the intermediate use of operating system drivers.
- the virtualization application of hypervisor 104 may, on various levels, interact directly with physical hardware 102 (e.g., similar to the way the OS interacts directly with physical hardware 102 , and as firmware running on physical hardware 102 ) without utilizing the OS, although still interacting with the OS to coordinate use of physical hardware 102 .
- virtual machine 1 105 - 1 may represent a host for guest OS 108 - 1
- virtual machine 2 105 - 2 may represent a host for guest OS 108 - 2
- hypervisor 104 may virtualize certain hardware resources of physical hardware 102 and present virtualized computer hardware representations to each of virtual machines 105 .
- hypervisor 104 may assign to each of virtual machines 105 , for example, one or more processors from processor subsystem 120 , one or more regions of memory in memory subsystem 130 , one or more components of I/O subsystem 140 , etc.
- the virtualized hardware representation presented to each of virtual machines 105 may comprise a mutually exclusive (i.e., disjointed or non-overlapping) set of hardware resources per virtual machine 105 (e.g., no hardware resources are shared between virtual machines 105 ).
- the virtualized hardware representation may comprise an overlapping set of hardware resources per virtual machine 105 (e.g., one or more hardware resources are shared by two or more virtual machines 105 ).
- hypervisor 104 may assign hardware resources of physical hardware 102 statically, such that certain hardware resources are assigned to certain virtual machines, and this assignment does not vary over time. Additionally or alternatively, hypervisor 104 may assign hardware resources of physical hardware 102 dynamically, such that the assignment of hardware resources to virtual machines varies over time, for example, in accordance with the specific needs of the applications running on the individual virtual machines. Additionally or alternatively, hypervisor 104 may keep track of the hardware-resource-to-virtual-machine mapping, such that hypervisor 104 is able to determine the virtual machines to which a given hardware resource of physical hardware 102 has been assigned.
- each of virtual machines 105 may respectively include an instance of a guest operating system (guest OS) 108 , along with any applications or other software running on guest OS 108 .
- guest OS may represent an OS compatible with and supported by hypervisor 104 , even when guest OS 108 is incompatible to a certain extent with physical hardware 102 , which is virtualized by hypervisor 104 .
- each guest OS 108 may be a separate instance of the same operating system or an instance of a different operating system.
- each guest OS 108 may comprise a LINUX OS.
- guest OS 108 - 1 may comprise a LINUX OS
- guest OS 108 - 2 may comprise a MICROSOFT WINDOWS OS
- another guest OS on another virtual machine may comprise a VXWORKS OS.
- system 100 - 1 is depicted as having two virtual machines 105 - 1 and 105 - 2 , it will be understood that, in particular embodiments, different numbers of virtual machines 105 may be executing on system 100 - 1 at any given time.
- hypervisor 104 of information handling system 100 - 1 may virtualize the hardware resources of physical hardware 102 and present virtualized computer hardware representations to each of virtual machines 105 .
- Each guest OS 108 of virtual machines 105 may then begin to operate and run applications and/or other software. While operating, each guest OS 108 may utilize one or more hardware resources of physical hardware 102 assigned to the respective virtual machine by hypervisor 104 .
- FIG. 2 illustrates a block diagram of selected elements of an example information handling system 100 - 2 , in accordance with embodiments of the present disclosure.
- system 100 - 2 may represent an information handling system that is an embodiment of system 100 - 1 (see FIG. 1 ).
- system 100 - 2 may include further details regarding the operation and use of components for implementing increased data security, while other elements shown in system 100 - 1 have been omitted from FIG. 2 for descriptive clarity.
- each virtual machine 105 may execute an application 202 and a guest OS 108 under which a storage driver 204 may be installed and loaded.
- a storage driver 204 may enable a virtual machine 105 to access storage resources via I/O stack 244 , virtual file system 246 , hypervisor (HV) storage driver 216 , and/or HV network integrated controller (NIC) driver 214 , which may be loaded into hypervisor 104 .
- I/O stack 244 may provide interfaces to VM-facing I/O by hypervisor 104 to interact with a storage driver 204 executing on a virtual machine 105 .
- Virtual file system 246 may comprise a file system provided by hypervisor 104 , for example, for access by a guest OS 108 . As shown in FIG. 2 , virtual file system 246 may interact with HV storage driver 216 and HV NIC driver 214 , to access physical hardware including memory subsystem 130 .
- a management library 206 as shown in FIG. 2 may execute within hypervisor 104 or in conjunction therewith to execute concealed services which may create and manage one or more concealed namespace object stores (e.g., concealed namespace object stores 250 ) to provide data security within system 100 - 2 .
- concealed namespace object stores e.g., concealed namespace object stores 250
- a concealed namespace object store 250 may be created for each namespace in memory subsystem 130 .
- memory subsystem 130 may comprise a persistent memory subsystem including one or more NV-DIMMs.
- Each concealed namespace object store 250 may, for its associated namespace, store metadata related to the associated namespace including, without limitation, enumeration information for the associated namespace, memory offset location for the associated namespace, and/or other attributes of the associated namespace.
- Each concealed object store 250 may be created by NVDIMM Firmware Interface Table (NFIT) core 224 executing within management library 206 , wherein NFIT table core 224 may maintain a concealed namespace object table 226 defining attributes for the various concealed namespace object stores 250 .
- NFIT NVDIMM Firmware Interface Table
- each concealed namespace object store 250 may comprise a hidden data area which is unexposed to a host OS of hypervisor 104 and guest OSes 108 of virtual machines 105 .
- management library 206 may have access to read concealed namespace object table 226 and does not report address ranges of the concealed namespace object stores 250 to the host OS of the hypervisor 104 or the guest OSes 108 of virtual machines 105 .
- Privileges to concealed namespace object stores 250 may be controlled by concealed real-time service 220 in order to provide secure access to concealed namespace object stores 250 .
- a concealed namespace object store 250 may comprise a pre-boot device handler which may be exposed at runtime to a host OS of hypervisor 104 or a guest OS 108 of a virtual machine 105 via concealed real-time service 220 .
- Concealed real-time service 220 may comprise a special runtime service of management library 206 that enables privilege to a concealed namespace object store 250 by an authorized host OS or guest OS 108 by securely validating a signature of a host OS or guest OS 108 . Such signatures may be stored within a store of management library 206 and used for secure validation.
- concealed real-time service 220 may, during a secure session, open a port of NFIT core 224 to allow access by the validated host OS or guest OS 108 to the concealed namespace object store 250 , thus providing such host OS or guest OS 108 the metadata required to interact with namespaces for which the OS is authorized to interact.
- the secure session may be short lived, thus requiring frequent validation in order to keep the NFIT core port open.
- management library 206 may also include concealed boot service 222 .
- Concealed boot service 222 may be implemented as part of a BIOS boost service table (e.g., EFI boot service table) in order to obtain secure boot handlers to facilitate secure boot for images stored within a concealed namespace object store 250 .
- BIOS boost service table e.g., EFI boot service table
- FIG. 3 illustrates a block diagram of selected elements of an example information handling system 100 - 3 , in accordance with embodiments of the present disclosure.
- system 100 - 3 may represent an information handling system that is an embodiment of system 100 - 1 (see FIG. 1 ) and/or system 100 - 2 (see FIG. 2 ).
- system 100 - 3 may include further details regarding the operation and use of components for implementing increased data security, while other elements shown in system 100 - 1 and system 100 - 2 have been omitted from FIG. 3 for descriptive clarity.
- each virtual machine 105 may execute an application 202 .
- An application 202 may access storage resources via a file system 306 , direct access (DAX) enabled file system 308 , block translation table (BTT) 310 , block window driver 312 , and persistent memory (PMEM) block driver 314 , which may execute within hypervisor 104 .
- DAX direct access
- BTT block translation table
- PMEM persistent memory
- a management library 206 as shown in FIG. 3 may execute within hypervisor 104 or in conjunction therewith to execute concealed real time service 220 which may in turn execute NFIT core 224 to create and manage one or more concealed namespace object stores (e.g., concealed namespace object stores 250 ) to provide data security within system 100 - 3 .
- concealed real time service 220 may in turn execute NFIT core 224 to create and manage one or more concealed namespace object stores (e.g., concealed namespace object stores 250 ) to provide data security within system 100 - 3 .
- NFIT core 224 may interface with an Advanced Configuration and Power Interface (ACPI) NFIT 304 in which concealed namespace object table 228 may be implemented.
- ACPI Advanced Configuration and Power Interface
- references in the appended claims to an apparatus or system or a component of an apparatus or system being adapted to, arranged to, capable of, configured to, enabled to, operable to, or operative to perform a particular function encompasses that apparatus, system, or component, whether or not it or that particular function is activated, turned on, or unlocked, as long as that apparatus, system, or component is so adapted, arranged, capable, configured, enabled, operable, or operative.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/784,409 US10706152B2 (en) | 2017-10-16 | 2017-10-16 | Systems and methods for concealed object store in a virtualized information handling system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/784,409 US10706152B2 (en) | 2017-10-16 | 2017-10-16 | Systems and methods for concealed object store in a virtualized information handling system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190114427A1 US20190114427A1 (en) | 2019-04-18 |
US10706152B2 true US10706152B2 (en) | 2020-07-07 |
Family
ID=66097059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/784,409 Active 2037-12-21 US10706152B2 (en) | 2017-10-16 | 2017-10-16 | Systems and methods for concealed object store in a virtualized information handling system |
Country Status (1)
Country | Link |
---|---|
US (1) | US10706152B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240354411A1 (en) * | 2023-04-21 | 2024-10-24 | Vmware, Inc. | Rapid ransomware detection and recovery |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10866963B2 (en) | 2017-12-28 | 2020-12-15 | Dropbox, Inc. | File system authentication |
US10754737B2 (en) * | 2018-06-12 | 2020-08-25 | Dell Products, L.P. | Boot assist metadata tables for persistent memory device updates during a hardware fault |
CN114546266B (en) * | 2022-02-07 | 2024-07-26 | 联想开天科技有限公司 | Configuration method, device and storage medium for hidden partition of solid state disk |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080047015A1 (en) * | 2006-08-08 | 2008-02-21 | Andrew Cornwall | Method to provide a secure virtual machine launcher |
US7962738B2 (en) * | 2007-12-20 | 2011-06-14 | Intel Corporation | Hypervisor runtime integrity support |
US20140215277A1 (en) * | 2013-01-29 | 2014-07-31 | International Business Machines Corporation | Selective restoration of data from non-volatile storage to volatile memory |
US20180004559A1 (en) * | 2016-06-30 | 2018-01-04 | Western Digital Technologies, Inc. | Controlling access to namespaces of a storage device |
-
2017
- 2017-10-16 US US15/784,409 patent/US10706152B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080047015A1 (en) * | 2006-08-08 | 2008-02-21 | Andrew Cornwall | Method to provide a secure virtual machine launcher |
US7962738B2 (en) * | 2007-12-20 | 2011-06-14 | Intel Corporation | Hypervisor runtime integrity support |
US20140215277A1 (en) * | 2013-01-29 | 2014-07-31 | International Business Machines Corporation | Selective restoration of data from non-volatile storage to volatile memory |
US20180004559A1 (en) * | 2016-06-30 | 2018-01-04 | Western Digital Technologies, Inc. | Controlling access to namespaces of a storage device |
Non-Patent Citations (1)
Title |
---|
Dan Ports et al., "Towards Application Security on Untrusted Operating Systems", 2008, pp. 1-7 (Year: 2008). * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240354411A1 (en) * | 2023-04-21 | 2024-10-24 | Vmware, Inc. | Rapid ransomware detection and recovery |
Also Published As
Publication number | Publication date |
---|---|
US20190114427A1 (en) | 2019-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8209459B2 (en) | System and method for increased system availability in virtualized environments | |
US9405566B2 (en) | Access to storage resources using a virtual storage appliance | |
US11789764B2 (en) | Systems and methods for multi-link platform configuration with containerized compute instances | |
US10503922B2 (en) | Systems and methods for hardware-based security for inter-container communication | |
US9495535B2 (en) | Systems and methods for authenticated system partition access | |
US9417886B2 (en) | System and method for dynamically changing system behavior by modifying boot configuration data and registry entries | |
US20190391835A1 (en) | Systems and methods for migration of computing resources based on input/output device proximity | |
US10782993B2 (en) | Systems and methods for secure runtime dynamic resizing of memory namespaces | |
US10296369B2 (en) | Systems and methods for protocol termination in a host system driver in a virtualized software defined storage architecture | |
US10706152B2 (en) | Systems and methods for concealed object store in a virtualized information handling system | |
US20180335956A1 (en) | Systems and methods for reducing data copies associated with input/output communications in a virtualized storage environment | |
US10235195B2 (en) | Systems and methods for discovering private devices coupled to a hardware accelerator | |
US10782994B2 (en) | Systems and methods for adaptive access of memory namespaces | |
US10248596B2 (en) | Systems and methods for providing a lower-latency path in a virtualized software defined storage architecture | |
US10025580B2 (en) | Systems and methods for supporting multiple operating system versions | |
US10936353B2 (en) | Systems and methods for hypervisor-assisted hardware accelerator offloads in a virtualized information handling system environment | |
US10776145B2 (en) | Systems and methods for traffic monitoring in a virtualized software defined storage architecture | |
US11100033B1 (en) | Single-root input/output virtualization-based storage solution for software defined storage | |
US9870246B2 (en) | Systems and methods for defining virtual machine dependency mapping | |
US11899602B2 (en) | Smart network interface controller operating system binding | |
US12032969B2 (en) | Management controller as bios | |
US11822499B1 (en) | Dynamic slot mapping | |
US20230351019A1 (en) | Secure smart network interface controller firmware update | |
US20220405390A1 (en) | Containerized metadata with uefi firmware file system | |
US12124342B2 (en) | Recovery of smart network interface controller operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DELL PRODUCTS L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SURYANARAYANA, SHEKAR BABU;KULKARNI, YOGESH P.;SIGNING DATES FROM 20171013 TO 20171016;REEL/FRAME:043873/0262 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;AND OTHERS;REEL/FRAME:044535/0109 Effective date: 20171128 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: PATENT SECURITY AGREEMENT (CREDIT);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;AND OTHERS;REEL/FRAME:044535/0001 Effective date: 20171128 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT (CREDIT);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;AND OTHERS;REEL/FRAME:044535/0001 Effective date: 20171128 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;AND OTHERS;REEL/FRAME:044535/0109 Effective date: 20171128 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST AT REEL 044535 FRAME 0001;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0475 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST AT REEL 044535 FRAME 0001;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0475 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST AT REEL 044535 FRAME 0001;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0475 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST AT REEL 044535 FRAME 0001;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0475 Effective date: 20211101 |
|
AS | Assignment |
Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (044535/0109);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060753/0414 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (044535/0109);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060753/0414 Effective date: 20220329 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (044535/0109);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060753/0414 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (044535/0109);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060753/0414 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |