摘要:
A system and method are provided to preserve the confidentiality and/or integrity of a sensitive communication from its source to its destination whether locally on the platform, between platforms, or even the same program over time.
摘要:
A method and system for virtualizing images. Multiple images are shadowed (i.e., copied) into portions of the physical address space of system memory. A mapping mechanism is effected to map all of the images into a common virtual address space, wherein images in the virtual address space are overlapped, thus enabling the images to be logically stored in a portion of virtual memory having a size less than the aggregated size of the images. In some embodiments, the images comprise option ROM images, which are shadowed into system memory during the pre-boot of a computer system. Due to legacy requirements, the option ROM images must be logically located in a limited portion of virtual memory (i.e., the common virtual address space). The embodiments enable a large number of option ROM images to be shadowed at the same time. In one embodiment, system hardware is programmed by firmware to effect a dynamic mapping between virtual pages at which an image is logically located to physical pages where the image is physically located.
摘要:
Provided are techniques for cache management. An incoming request to access a first data block is received. A probability of how likely a second data block may be accessed based on the access of the first data block is determined. Whether the probability exceeds a read ahead threshold is determined. The second data block is prefetched in response to determining that the probability exceeds the read ahead threshold.
摘要:
A server platform (SP) having a local node (LN) and a peer node (PN) that responsive to a platform error (PE) at a local node, which is not resolvable at the processor abstraction layer (PAL), determines if there is a PN with an available network interface card (NIC), and if so, the media access control (MAC) address of the LN is sent to the PN so that the PN can handle operations for the LN and the MAC address of the LN is disabled. Error recovery is next performed at either a system abstraction layer (SAL) or by the operating system (OS), and if the PE is resolvable by the SAL or the OS, the LN is enabled with the MAC address of the LN and the LN resumes normal operation. However, if the error is not resolved, then the LN re-boots and resumes normal operation at a later point.
摘要:
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.
摘要:
An apparatus includes a memory that is accessible by an operating system; and a basic input/output system (BIOS) handler. The BIOS handler, in response to detected malicious software activity, stores data in the memory to report the activity to the operating system.
摘要:
A method to qualify access to a block storage device via augmentation of the device's controller and firmware flow. The method employs one or more block exclusion vectors (BEVs) that include attributes specifying allowed access operations for corresponding block address ranges. Logic in accordance with the BEVs is programmed into the controller for the block storage device, such as a disk drive controller for a disk drive. In response to an access request, a block address range corresponding to the storage block(s) requested to be accessed is determined. Based on the BEV entries, a determination is made to whether the determined logical block address range is covered by a corresponding BEV entry. If so, the attributes of the BEV are used to determine whether the access operation is allowed.
摘要:
A method to qualify access to a block storage device via augmentation of the device's controller and firmware flow. The method employs one or more block exclusion vectors (BEVs) that include attributes specifying allowed access operations for corresponding block address ranges. Logic in accordance with the BEVs is programmed into the controller for the block storage device, such as a disk drive controller for a disk drive. In response to an access request, a block address range corresponding to the storage block(s) requested to be accessed is determined. Based on the BEV entries, a determination is made to whether the determined logical block address range is covered by a corresponding BEV entry. If so, the attributes of the BEV are used to determine whether the access operation is allowed. The method may be used to secure access to firmware stored on a disk drive, thus enabling a system configuration that does not require a conventional firmware storage device.
摘要:
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.
摘要:
In one embodiment, the present invention includes a method for converting a write request from a file system transaction to a transaction record, forwarding the transaction record to a non-volatile storage for storage, where the transaction record has a different protocol than the file system transaction, and later forwarding it to the target storage. Other embodiments are described and claimed.