COMMON HANDLER FOR MULTITUDE OF CRASH FAILURES

    公开(公告)号:US20250077334A1

    公开(公告)日:2025-03-06

    申请号:US18241059

    申请日:2023-08-31

    Abstract: Disclosed systems and methods for handling failures in an information handling system enable one or more crash handlers to communicate crash handler notifications to an EC of the information handling system. The EC is configured to perform crash operations including detecting a crash occurrence associated with either a crash handler notification from any of the one or more crash handlers or an SMM crash event. The EC may extract and store crash context information associated with the crash occurrence. The crash handler notifications may be communicated to the EC as MBOX commands via a peripheral interconnect, e.g., an enhanced serial peripheral interconnect (eSPI). Detecting a crash occurrence associated with the SMM event may include initiating an EC timer responsive to receiving an SMM entry message from an SMM handler and detecting the EC timer reaching a threshold value before the EC receives an SMM exit message.

    DYNAMIC AND SECURE ACCESS TO UEFI SERVICES BASED ON INDICATOR OF ATTACK DRIVER

    公开(公告)号:US20240143814A1

    公开(公告)日:2024-05-02

    申请号:US17975644

    申请日:2022-10-28

    CPC classification number: G06F21/6218 G06F21/44 G06F21/575 G06F2221/034

    Abstract: Disclosed subject matter enables a recovery and resume of secure platform services based on indicator of attack for the UEFI boot path and UEFI drivers for any access to storage or network medium. Disclosed methods may employ an unsupervised learning model, based on information referred to herein as Indicator of Attack (IOA) information, and create a unique resilient BIOS access for UEFI drivers, file system, media and network. Disclosed teachings enable secure services for access to UEFI drivers, file systems, media, and network using a dynamic resilient layer to handle IOA. Dynamic methods to create runtime metadata for file system logical blocks for OEM nested file system partition and pre boot OEM authentication are also disclosed. Disclosed teachings support a UEFI file system interface that implements a runtime remap method for OEM-provided drivers.

    Remediation Interface for Self Heal Field Faults

    公开(公告)号:US20240143435A1

    公开(公告)日:2024-05-02

    申请号:US17976602

    申请日:2022-10-28

    CPC classification number: G06F11/0793 G06F11/0721

    Abstract: A method for remediating an information handling system, wherein the method includes running a fault monitoring module during a runtime of the information handling system to detect field fault conditions, collect field fault data associated with field fault conditions, upload the field fault data to a remediation engine, and receive remediation objects from the remediation engine. The method further includes detecting a fault condition, receiving a remediation object corresponding to the fault condition wherein the remediating object includes one or more remediation templates, and providing notice of the fault condition to a remediation interface. The remediation interface is configured to boot the information handling system into a remediation mode and load and execute the remediation templates to resolve the field faults.

    SECURED COMMUNICATION PROTOCOL LAYER FOR AUTHENTICATED HARDWARE DATA ACCESS

    公开(公告)号:US20240020364A1

    公开(公告)日:2024-01-18

    申请号:US17864724

    申请日:2022-07-14

    CPC classification number: G06F21/31 G06F21/54 G06F21/572

    Abstract: A disclosed method installs an I/O trap protocol to provide an authentication callback function for handling I/O trap events. I/O trap events may include write operations accessing any of one or more identified I/O addresses. An I/O trap event may be registered with the authentication callback function for each of one or more identified I/O addresses. Original values of data may be stored in a memory resource. Any occurrences of an I/O trap event triggers the authentication callback function to perform I/O trap operations. The I/O trap operations may include determining whether the I/O trap event is associated with an approved driver and, if not, restoring data stored at the identified I/O address to an original value. Installing the I/O trap protocol may include installing the I/O trap protocol during a system management mode (SMM) phase of a UEFI boot sequence.

    VIRTUAL PSEUDO PCIE (VVP) DEVICE NODES FOR FAST RELIABLE OS AND VIRTUAL MEMORY (VM) BOOT

    公开(公告)号:US20250045063A1

    公开(公告)日:2025-02-06

    申请号:US18364492

    申请日:2023-08-03

    Abstract: In an information handling system that includes one or more PCIe devices, responsive to enumerating a PCIe device and adding the PCIe device to a configuration space of the platform, a mapping entry is added to a device handler mapping table to associate a device handler for the PCIe device with information for accessing the PCIe device. If the PCIe device fails to enumerate in a boot path, a virtual pseudo PCIe (VPP) node corresponding to the PCIe device may be created and enumerated to enable the boot to complete. Upon subsequently detecting and enumerating the actual, physical PCIe device, the VPP node and the PCIe device may be connected to enable the full functionality of the PCIe device without re-booting the platform.

    STORAGE FAILOVER PROTOCOL FOR SECURE AND SEAMLESS EXTENDED FIRMWARE LOAD

    公开(公告)号:US20230359525A1

    公开(公告)日:2023-11-09

    申请号:US17739687

    申请日:2022-05-09

    Abstract: An information handling system may include a processor and first non-transitory computer-readable media communicatively coupled to the processor and having stored thereon a basic input/output system (BIOS) core comprising BIOS core firmware sufficient to execute features of a BIOS of the information handling system to a particular portion of BIOS execution and an extension agent. The extension agent may be configured to identify and enumerate a firmware volume of a second non-transitory computer-readable media communicatively coupled to the processor and having stored thereon a BIOS extension comprising BIOS extension firmware for executing completion of BIOS execution from the particular portion of BIOS execution and in response to unavailability of the firmware volume of the second non-transitory computer-readable media, failover to and recover the BIOS extension from extended firmware information stored on a networked storage resource communicatively coupled to the information handling system.

Patent Agency Ranking