摘要:
An embodiment of the present invention enables the virtualizing of virtual memory in a virtual machine environment within a virtual machine monitor (VMM). Memory required for direct memory access (DMA) for device drivers, for example, is pinned by the VMM and prevented from being swapped out. The VMM may dynamically allocated memory resources to various virtual machines running in the platform. Other embodiments may be described and claimed.
摘要:
Methods and apparatus to provide an execution mode transition are disclosed. One example method includes receiving in an operating system runtime environment a firmware code update to be implemented in a multiprocessor system, storing the firmware code update, and issuing an interprocessor interrupt to each processor of the multiprocessor system. The method further includes storing state information for each processor of the multiprocessor system, transitioning from an operating system runtime environment to a pre-operating system environment, and implementing the firmware code update in the pre-operating system environment. The state information is then read and restored to each processor to transition from the pre-operating system environment to an operating system runtime environment.
摘要:
A method, system and article of manufacture to virus scan input/output (I/O) traffic of a computer system. A virus scanner is initialized during a pre-boot phase of a computer system. Data read from an input/output (I/O) device of the computer system is scrubbed by the virus scanner using a virus signature database before the data is loaded. A platform policy is enacted if a virus is detected in the data.
摘要:
A method and related apparatuses involve extensible framework interface (EFI) byte code images packaged within extensible markup language (XML) documents. In one embodiment, a processing system obtains an XML document, extracts an EFI byte code (EBC) image from the XML document, and then executes the EBC image. For instance, such a process may be used to obtain configuration code such as an EFI driver from a remote system. Processes are disclosed for retrieving and loading configuration code in pre-boot and runtime environments. Additional embodiments relate to XML files containing EBC images, processing systems that use EBC images from XML documents as configuration code, and processing system that provide XML documents with EBC images to other processing systems. Other embodiments are described and claimed.
摘要:
A method and related apparatuses provide a virtual runtime interface for modifying basic input/output system (BIOS) settings. A processing system may provide the virtual runtime interface after the processing system has booted an operating system (OS). User input that specifies a modified BIOS setting may be received through the virtual runtime interface. To provide the virtual runtime interface, the system may transition from an OS context to a system management mode (SMM) context, and may determine whether the amount of time spent in the SMM context approaches an SMM time limit. If the amount of time spent in the SMM context approaches the SMM time limit, the system may automatically transition from the SMM context back to the OS context. Other embodiments are described and claimed.
摘要:
A method to qualify access to a block storage device via augmentation of the device's controller and firmware flow. The method employs one or more block exclusion vectors (BEVs) that include attributes specifying allowed access operations for corresponding block address ranges. Logic in accordance with the BEVs is programmed into the controller for the block storage device, such as a disk drive controller for a disk drive. In response to an access request, a block address range corresponding to the storage block(s) requested to be accessed is determined. Based on the BEV entries, a determination is made to whether the determined logical block address range is covered by a corresponding BEV entry. If so, the attributes of the BEV are used to determine whether the access operation is allowed. The method may be used to secure access to firmware stored on a disk drive, thus enabling a system configuration that does not require a conventional firmware storage device.
摘要:
Methods and apparatus for securely configuring a machine in a pre-operating system environment are disclosed. A server determines if configuration updates are available to be transmitted to various clients that are enabled to receive configuration updates in a pre-operating system environment. The server broadcasts a message indicating the availability of a configuration update and requests an attestation from each of the responding clients. The attestation may be a conventional attestation if the client is a managed client or the attestation may be a pseudo-anonymous attestation if the client is an independent client. The server verifies the authenticity of the attestation by querying a Trusted Third Party and transmits the configuration update after the client's identity has been verified. The client receives the configuration update, applies the update, and then continues its booting process.
摘要:
A method to Suspend-and-Resume across various operational environment contexts is disclosed. An environmental context is saved in a disk partition corresponding to the saved environment. The system is suspended. Upon resume, a selected environmental context is selected for boot or resume. This method of switching contexts may also be used for trusted execution, manageability, and other purposes.
摘要:
A method and system to utilize platform-based optimization routines by a computer system. An application executing on the computer system initializes a user library bound to the application. The user library requests that an optimized library be copied into the user space of the computer system. The optimized library includes functions optimized for the hardware configuration of the computer system and is advertised by the firmware of the computer system. The entry points of the optimized functions are exported to the application, the optimized functions corresponding to non-optimized functions of the application. In one embodiment, the optimized library is validated before being copied into user space.
摘要:
Methods and apparatus to associate boot objects with trust credentials are disclosed. In one example a method of booting a processor system includes accepting a selection of a desired operating system to be booted, accepting a user credential associated with a user who has selected the desired operating system to be booted, and determining if the user credential corresponds to the desired operating system to be booted. Additionally, the example disclosed method includes enabling booting of the desired operating system if the user credential corresponds to the desired operating system.