Search

Radu Rugina

from Sunnyvale, CA
Age ~53

Radu Rugina Phones & Addresses

  • 960 Sara Ave, Sunnyvale, CA 94086 (408) 689-2438
  • 479 Senna Ct, Sunnyvale, CA 94086
  • 200 Randolph Rd, Ithaca, NY 14850 (607) 277-0668
  • 422 Buffalo St, Ithaca, NY 14850 (607) 277-0668
  • Cambridge, MA

Publications

Us Patents

Probing The Boot Sequence Of A Computer System

View page
US Patent:
20140059336, Feb 27, 2014
Filed:
Aug 23, 2012
Appl. No.:
13/593463
Inventors:
Radu RUGINA - Sunnyvale CA, US
Assignee:
VMware, Inc. - Palo Alto CA
International Classification:
G06F 15/177
US Classification:
713 2
Abstract:
Probes are instrumented into a boot sequence of a computer system to enable probing of the boot sequence. As part of the boot sequence, a value stored in a predetermined storage location within a boot device is read and, if the value indicates that probing of the boot sequence has been enabled, executable code for probing the boot sequence is injected into the boot sequence. Outputs of the probing during the boot process are collected into a buffer and analyzed after the completion of the boot process.

Simultaneous Probing Of Multiple Software Modules Of A Computer System

View page
US Patent:
20140007090, Jan 2, 2014
Filed:
Jun 29, 2012
Appl. No.:
13/539163
Inventors:
Radu RUGINA - Sunnyvale CA, US
Ricardo E. Gonzalez - Portola Valley CA, US
Alok Kataria - Sunnyvale CA, US
Doug Covelli - Cambridge MA, US
Robert Benson - San Francisco CA, US
Matthias Hausner - Belmont CA, US
Assignee:
VMware, Inc. - Palo Alto CA
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
Probes are instrumented in multiple software modules of a computer system having virtual machines running therein and executed in a coordinated manner. An output of one probe may be used to conditionally trigger another probe so that the precision of collected data may be improved. In addition, outputs of probes that are triggered in different software modules by related events may be synchronized and analyzed collectively. Probes also may be parallel processed in different processors so that multiple probes can be processed concurrently.

Enabling Live Migration Of Virtual Machines With Passthrough Pci Devices

View page
US Patent:
20190146853, May 16, 2019
Filed:
Dec 17, 2018
Appl. No.:
16/223071
Inventors:
- Palo Alto CA, US
Bryan Tan - Mountain View CA, US
Wei Xu - Santa Clara CA, US
Tao Ren - Santa Clara CA, US
Radu Rugina - Sunnyvale CA, US
Vivek Mohan Thampi - Sunnyvale CA, US
International Classification:
G06F 9/50
G06F 13/16
G06F 13/42
G06F 9/455
G06F 13/28
Abstract:
Techniques for enabling live migration of VMs with passthrough PCI devices are provided. In one set of embodiments, a hypervisor of a host system can create a copy of a DMA buffer used by a VM of the host system and a passthrough PCI device of the VM. The hypervisor can further designate one of the DMA buffer or the copy of the DMA buffer as a vCPU buffer that is accessible by the VM, and designate the other of the DMA buffer or the copy of the DMA buffer as a device buffer that is accessible by the passthrough PCI device. The hypervisor can then synchronize the vCPU buffer and the device buffer with each other as the VM and passthrough PCI device interact with their respective buffers, and as part of the synchronization can intercept DMA work requests submitted by the VM/completed by the passthrough PCI device.

Techniques For Protecting Memory Pages Of A Virtual Computing Instance

View page
US Patent:
20170300430, Oct 19, 2017
Filed:
Feb 28, 2017
Appl. No.:
15/444350
Inventors:
- Palo Alto CA, US
WEI XU - Palo Alto CA, US
RADU RUGINA - Palo Alto CA, US
JEFFREY W. SHELDON - Palo Alto CA, US
JAMES S. MATTSON - Seattle WA, US
RAKESH AGARWAL - Palo Alto CA, US
DAVID DUNN - Bellevue WA, US
International Classification:
G06F 12/14
G06F 9/455
G06F 9/46
G06F 21/74
G06F 9/455
G06F 9/455
Abstract:
Mechanisms to protect the integrity of memory of a virtual machine are provided. The mechanisms involve utilizing certain capabilities of the hypervisor underlying the virtual machine to monitor writes to memory pages of the virtual machine. A guest integrity driver communicates with the hypervisor to request such functionality. Additional protections are provided for protecting the guest integrity driver and associated data, as well as for preventing use of these mechanisms by malicious software. These additional protections include an elevated execution mode, termed “integrity mode,” which can only be entered from a specified entry point, as well as protections on the memory pages that store the guest integrity driver and associated data.
Radu Rugina from Sunnyvale, CA, age ~53 Get Report