摘要:
A method to Suspend-and-Resume across various operational environment contexts is disclosed. An environmental context is saved in a disk partition corresponding to the saved environment. The system is suspended. Upon resume, a selected environmental context is selected for boot or resume. This method of switching contexts may also be used for trusted execution, manageability, and other purposes.
摘要:
A method and system to utilize platform-based optimization routines by a computer system. An application executing on the computer system initializes a user library bound to the application. The user library requests that an optimized library be copied into the user space of the computer system. The optimized library includes functions optimized for the hardware configuration of the computer system and is advertised by the firmware of the computer system. The entry points of the optimized functions are exported to the application, the optimized functions corresponding to non-optimized functions of the application. In one embodiment, the optimized library is validated before being copied into user space.
摘要:
Methods and apparatus to associate boot objects with trust credentials are disclosed. In one example a method of booting a processor system includes accepting a selection of a desired operating system to be booted, accepting a user credential associated with a user who has selected the desired operating system to be booted, and determining if the user credential corresponds to the desired operating system to be booted. Additionally, the example disclosed method includes enabling booting of the desired operating system if the user credential corresponds to the desired operating system.
摘要:
Methods and apparatus to provide conditional legacy support are disclosed. In particular, the methods and apparatus initialize a processor in a pre-boot environment using a first computer readable medium. The processor determines if the legacy support is required and selectively locates and loads a compatibility support module into the processor from a second computer readable medium if the processor requires legacy support.
摘要:
Methods and systems for performing network port authentication without requiring any operating system (OS) complicity are disclosed. Under one method, port authentication instructions are loaded into a protected memory space during a pre-boot of a supplicant system. In response to a port authentication request, the supplicant system's processor is switched to a hidden execution mode and executes the port authentication instructions to authenticate a network port hosted by an authenticator system to which the supplicant system is linked. One authentication process employs an authentication server that authenticates the supplicant via one of various authentication schemes, including an access challenge. Port authentication may also be performed via an out-of-band base management controller that operates independently from an operating system running on the supplicant.
摘要:
A method and apparatus is described herein for supporting heterogeneous local memories. A resource affinity table includes an entry for each local memory mapped into an address space. Each entry associating the corresponding local memory with a logical distance, such as a domain number. During runtime thread scheduling, memory operations, and other tasks are potentially assigned to the local memory devices based on the logical distance associated with each memory in the resource affinity table. As a consequence, heterogeneous memory types or homogeneous memories with different access times may be efficiently combined in a system to achieve large amount of memory at a smaller cost without sacrificing performance by allowing an operating system to make intelligent scheduling choices based on logical distances/access times of the aforementioned memories.
摘要:
Methods and devices that facilitate transmission and/or reception of data packets in a platform through a first and a second input/output (I/O) device are described herein. The platform may be a partitioned platform that includes a main and a service partition, wherein the first I/O device may be an in-band I/O device associated with a main partition of the platform and the second I/O device is an out-of-band I/O device associated with a service partition of the platform. The data packets to be transmitted may be data packets that originate from the main partition while the data packets to be received may be destined for the main partition.
摘要:
Power consumption may be reduced by imbalancing the loads handled by interchangeable components. Interchangeable components, such as memory devices, processors, servers, or other entities, may be imbalanced to reduce power consumption as circumstances allow. As a result, interchangeable components that are used to implement effectively the same function may be powered down or hot-removed and their duties transferred to other components. As a result, the deactivated component may be powered down to a reduced power consumption state, thereby reducing the overall power consumption of the system.
摘要:
A first partition of a processing system may use polling to communicate with a device. In addition, the first partition may provide an interface that allows a second partition of the processing system to communicate with the device without requiring the second partition to use polling. For example, the first partition may present the device to the second partition as an interrupt-driven device. In one embodiment, the first partition creates an interface that presents a universal serial bus (USB) peripheral device to the second partition as a legacy peripheral device. The second partition my therefore use the device without conducting polling, and may consume less energy than a partition that conducts polling. Other embodiments are described and claimed.
摘要:
A method and apparatus is described herein for performing a remote memory integrity function on a remote computing system. A memory integrity module in a first system performs a memory integrity function, such as a memory test, memory update, memory dump, inventory, or other integrity function, on a second networked system using RDMAs to interface with a client memory integrity module in the second networked system.