摘要:
A first virtual machine (VM) in a processing system may emulate a first server blade, and a second VM in the processing system may emulate a second server blade. The emulated server blades may be referred to as virtual server blades. A virtual machine monitor (VMM) in the processing system may provide a communication channel to at least one of the virtual server blades. Other embodiments are described and claimed.
摘要:
A method for managing a memory system includes comparing one or more conditions of a memory with historical memory data that predicts a future state of the memory. According to one embodiment, updating the historical memory data includes accumulating operation data on the memory during its operation, generating updated historical memory data with the operation data, and updating the historical memory data with the updated historical memory data. Other embodiments are described and claimed.
摘要:
A method and system to switch between a Service virtual machine (VM) and a Guest VM in a virtual machine monitor (VMM) of a computer system. The VMM is loaded on the computer system to support a Service VM and a Guest VM. The Service OS is booted in the Service VM during the pre-boot phase. The Guest OS is booted in the Guest VM of the computer system. During OS runtime of the Guest OS, a VM switch is performed from the Guest VM to the Service VM without rebooting the computer system. The Service OS includes diagnostic tools to analyze the Guest OS. In one embodiment, the VM switch is performed by firmware of the computer system. In another embodiment, the VMM operates in accordance with an Extensible Firmware Interface (EFI) framework standard.
摘要:
A method for restarting a processor-based system is disclosed. The basic input/output system (BIOS) firmware for performing the restart may or may not reside on the processor-based system. Where the local BIOS firmware is corrupt or not present, remote BIOS firmware is loaded into the processor cache by a specialized network interface card. The network interface card includes direct cache access (DCA) functionality, enabling it to store packets retrieved from the network directly into the processor cache, for faster processing. Remote downloading of the BIOS firmware from the network solves on-platform flash corruption within the processor-based system without costly board rework. Other benefits include mitigating the misappropriation of BIOS and chipset intellectual property, improved restart performance of the processor-based system, as well as improvement in chipset validation. Other embodiments are described and claimed.
摘要:
A method for managing information from an operating system based environment includes determining whether the information is to be communicated to a chassis management module. The information is transmitted to a service processor upon determining that the information is to be communicated with the chassis management module.
摘要:
A method and apparatus to implement a virtual management controller to coordinate processing blade management in a blade server environment. A management mode of operation of a processing blade of a blade server is activated. During the management mode of operation, a chassis management module is interacted with to manage operation of the processing blade. Thereafter, the management mode of operation of the processing blade is deactivated.
摘要:
A method and system to emulate a trusted platform module to execute trusted operations. A virtual machine monitor is executed to support a virtual machine session. An operating system is loaded into the virtual machine session. The trusted platform module is emulated to hold a key associated with the virtual session and to execute trusted operations.
摘要:
A system and method to quickly and efficiently transfer data over a network to a processing system during a pre-boot runtime of the processing system. During a pre-boot runtime of the processing system, a plurality of data packets is received via a network. Each of the plurality of data packets contains one of a corresponding plurality of data segments. The plurality of data packets are parsed using a network protocol stack to extract the plurality of data segments during the pre-boot runtime. A portion of the network protocol stack is executed in a hardware entity of the processing system. The plurality of data segments is transferred into system memory of the processing system during the pre-boot runtime.
摘要:
When transitioning from sleep mode to active mode, a processing system loads first stage resume content and second stage resume content into a volatile memory of the processing system. The first stage resume content may contain contextual data for a first program that was in use before the processing system transitioned to sleep mode. The second stage resume content may contain contextual data for another program that was in use before the processing system transitioned to sleep mode. The processing system may provide a user interface for the first program before all of the second stage resume content has been loaded into the volatile memory. Other embodiments are described and claimed.
摘要:
Firmware-based conversion methods for storing converted firmware variables in a firmware storage device, such as flash memory. Under one method, “eager” compression of firmware is performed. In response to a storage request, a determination is made to whether a compressor is available. If it is, the firmware variable is stored in a compressed form in the storage device; if not, the firmware variable is stored in an uncompressed form. In response to a read request for a stored firmware variable, a determination is made to whether the variable is stored in a compressed or uncompressed form. If it is compressed, a decompressor is employed to return the variable to its uncompressed form prior to providing it to the requestor; already uncompressed variables are provided directly to the requester. An application program interface is provided to enable operating system runtime access to the firmware variables. Similar conversions may be employed separately or in parallel, including encryption.