摘要:
Methods and apparatus for initializing a memory are disclosed. A disclosed system initializes a subset of memory and then loads an operating system. Subsets of a remaining memory are initialized during operating system idle periods. A notification for the operating system to dynamically incorporate the subsets of the remaining memory is created.
摘要:
A method according to one embodiment may include retrieving selected data from one or more mass storage devices, based at least in part on historical device access information of at least one requester of data. A method according to another embodiment may include retrieving, by an integrated circuit, device data layout information from one or more mass storage devices, and storing, by the integrated circuit, the device data layout information in cache memory. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
摘要:
A method, system, and article of manufacture to share trusted hardware across multiple operational environments. A virtual machine monitor (VMM) is loaded to support a plurality of virtual machines in a computer system, the VMM including a VMM multiplexer. A first and a second virtual machine (VM) are loaded. A trusted hardware device is shared between the first VM and the second VM using the VMM multiplexer. In one embodiment, the trusted hardware device includes a trusted platform module (TPM).
摘要:
Methods and apparatus to provide robust code update functionality are disclosed. One example method includes receiving a pre-boot code update, storing the pre-boot code update to a first non-volatile memory if the pre-boot code update fits within an allocated space in the first non-volatile memory, and setting an indication that a pre-boot code update is to be implemented. The example method further includes reading the pre-boot code update, implementing the pre-boot code update, and clearing the indication that the pre-boot code update is to be implemented.
摘要:
An embodiment of the present invention is a system and method relating to seamlessly enable enhanced management and scripting of a computer system and its add-in devices. In at least one embodiment, the present invention enables a system administrator or integrator to script a common configuration for multiple devices and then automatically configure the devices using the script. The language construct and central data repository for configuration settings are extended to comprehend a scripting language. A script is read by a script engine during either pre-boot or runtime. The script engine searches a keyword database on the central data repository to determine requested configuration settings. A data offset is corresponding to a specific op-code is used to determine where configuration settings are located, for modification.
摘要:
Methods and apparatus to support the storage of boot options and other integrity information on a portable token for use in a pre-operating system environment are disclosed. In one example, a disclosed method may include receiving data at the computer system from a token and selectively locating and receiving an OS image at the computer system from a computer readable medium based on the data, wherein the computer readable medium is different from the token.
摘要:
Methods, apparatus, and articles of manufacture to provide protection for firmware resources are disclosed. In particular, the methods, apparatus, and articles of manufacture initialize firmware resources in a pre-boot environment and generate descriptors for the firmware resources. The descriptors are stored in a resource protection list and the resource protection list is stored in a location accessible in a post-boot environment.
摘要:
Methods and apparatus to provide network traffic support and physical security support are described herein. In an example method, a virtual machine monitor (VMM) in a processor system is initialized. At least one of a network traffic intrusion event and a physical security intrusion event is identified by the VMM. At least one of a network traffic support and a physical security support is implemented in response to at least one of the network traffic intrusion event and the physical security intrusion event.
摘要:
Methods and systems for allocating address space resources to resource requesting peripheral devices in an efficient manner. Resource request are gathered for enumerated peripheral devices host by a computer platform. A map containing resource alignment requirements is built, and a virtual resource allocation map is computed based on aggregated resource requests and the alignment requirements. The resource aggregations are, in turn, based on a hierarchy of the peripheral devices. A bin-packing algorithm is employed to determine allocation of the resource requests so as to minimize resource address space allocations. The virtual resource map is then used to perform actual resource allocations. The resources include peripheral device I/O address allocation and peripheral device memory address allocations.
摘要:
Methods and systems for allocating address space resources to resource requesting peripheral devices in an efficient manner. Resource requests are gathered for enumerated peripheral devices host by a computer platform. A map containing resource alignment requirements is built, and a virtual resource allocation map is computed based on aggregated resource requests and the alignment requirements. The resource aggregations are, in turn, based on a hierarchy of the peripheral devices. A bin-packing algorithm is employed to determine allocation of the resource requests so as to minimize resource address space allocations. The virtual resource map is then used to perform actual resource allocations. The resources include peripheral device I/O address allocation and peripheral device memory address allocations.