US 11,989,576 B2
Execution of code in system memory
Richard Alden Bramley, Jr., Mansfield, MA (US); Dallas M. Barlow, Tomball, TX (US); and Jeffrey Kevin Jeansonne, Spring, TX (US)
Assigned to Hewlett-Packard Development Company, L.P., Spring, TX (US)
Filed by Hewlett-Packard Development Company, L.P., Spring, TX (US)
Filed on Aug. 24, 2021, as Appl. No. 17/411,045.
Prior Publication US 2023/0066447 A1, Mar. 2, 2023
Int. Cl. G06F 9/455 (2018.01)
CPC G06F 9/45558 (2013.01) [G06F 9/455 (2013.01); G06F 9/45533 (2013.01); G06F 2009/45579 (2013.01); G06F 2009/45583 (2013.01); G06F 2009/45587 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A computing device comprising:
memory including a system memory that is accessible during a system management mode of the computing device and inaccessible during a runtime mode of the computing device; and
a processor in electronic communication-with the memory, wherein the processor is to:
receive a system management interrupt;
in response to receiving the system management interrupt, enter the system management mode; and
during the system management mode,
identify trigger code that triggered the system management interrupt received by the processor; and
determine whether the trigger code is virtualization code for protecting the computing device from tampering,
wherein in response to determining that the trigger code is the virtualization code for protecting the computing device from tampering, the processor is to execute a security sensitive command using system code stored in the system memory, and
wherein in response to determining that the trigger code is not the virtualization code for protecting the computing device from tampering, the processor does not execute the security sensitive command.