Abstract:
A method, apparatus and system enable bi-directional communications between a virtual machine monitor ("VMM") and an Advanced Configuration & Power Interface ("ACPI") compliant guest operating system. In one embodiment, a virtual machine ("VM") may be designated as the owner of the host platform ("Policy VM"). The Policy VM may communicate with the VMM to control all configuration and power management decisions on the platform.
Abstract:
This disclosure is directed to isolated guest creation in a virtualized computing system. A memory in a computing device may be divided into isolated execution environments, allowing some software (e.g., guests) to be isolated in a high privilege execution environment. A virtual machine manager (VMM) of a low privilege execution environment may issue commands to a VMM of the high privilege execution environment to, for example, cause a guest loaded in the low privileged execution environment to be placed into the high privilege execution environment, to interact with the guest in the high privilege execution environment, to cause the guest to be removed from the high privilege execution environment, etc. The guest may include attributes configured to control guest behavior such as, for example, when to perform activities, how to respond to stop commands received from the VMM of the high privilege execution environment, etc.
Abstract:
A method, apparatus, method, machine-readable medium, and system are disclosed. In one embodiment the method includes is a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
Abstract:
Briefly, in accordance with an embodiment of the invention, an apparatus and method to store initialization and configuration information is provided. The method may include storing basic input/output system (BIOS) software in a polymer memory. The method may further include copying a first portion of the BIOS software from the polymer memory to a random access memory (RAM) buffer of a memory controller, wherein the RAM buffer has a storage capacity of at least about two kilobytes (KB).
Abstract:
Methods and systems may provide for receiving at a secure element of a system, during a boot process of the system, a first pairing authentication value from a pairing agent. In addition, a pairing key may be received from the pairing agent, wherein the first pairing authentication value and the pairing key may be used to establish a trusted channel between the secure element and an input output (IO) device coupled to the system. In one example, the first pairing authentication value is accepted only if the first pairing authentication value is received prior to a predetermined stage of the boot process.
Abstract:
A method, apparatus, method, machine-readable medium, and system are disclosed. In one embodiment the method includes is a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
Abstract:
Briefly, in accordance with an embodiment of the invention, an apparatus and method to store initialization and configuration information is provided. The method may include storing basic input/output system (BIOS) software in a polymer memory. The method may further include copying a first portion of the BIOS software from the polymer memory to a random access memory (RAM) buffer of a memory controller, wherein the RAM buffer has a storage capacity of at least about two kilobytes (KB).