-
1.
公开(公告)号:US20240004659A1
公开(公告)日:2024-01-04
申请号:US17853087
申请日:2022-06-29
Applicant: Intel Corporation
Inventor: Michael LeMay , Dan Baum , Joseph Cihula , Joao Batista Correa Gomes Moreira , Anjo Lucas Vahldiek-Oberwagner , Scott Constable , Andreas Kleen , Konrad Lai , Henrique de Medeiros Kawakami , David M. Durham
IPC: G06F9/30
CPC classification number: G06F9/3016
Abstract: Techniques for an instruction for a Runtime Call operation are described. An example apparatus comprises decoder circuitry to decode a single instruction, the single instruction to include a field for an identifier of an opcode, the opcode to indicate execution circuitry is to execute a no operation when a runtime call destination equals a predetermined value; and execute an indirect call with the runtime call destination as a destination address when the runtime call destination does not equal the predetermined value. Other examples are described and claimed.
-
公开(公告)号:US10102380B2
公开(公告)日:2018-10-16
申请号:US13802272
申请日:2013-03-13
Applicant: INTEL CORPORATION
Inventor: Francis X. McKeen , Carlos V. Rozas , Uday R. Savagaonkar , Simon P. Johnson , Vincent Scarlata , Michael A. Goldsmith , Ernie Brickell , Jiang Tao Li , Howard C. Herbert , Prashant Dewan , Stephen J. Tolopka , Gilbert Neiger , David Durham , Gary Graunke , Bernard Lint , Don A. Van Dyke , Joseph Cihula , Stalinselvaraj Jeyasingh , Stephen R. Van Doren , Dion Rodgers , John Garney , Asher Altman
Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
-
3.
公开(公告)号:US20240354108A1
公开(公告)日:2024-10-24
申请号:US18478882
申请日:2023-09-29
Applicant: Intel Corporation
Inventor: Michael LeMay , David M. Durham , Joseph Cihula , Joseph Nuzman , Dan Baum , Jonathan Combs
IPC: G06F9/30
CPC classification number: G06F9/3016
Abstract: Techniques for implementing instructions and modified instruction encodings for checking tags and for interspersing islands of tags in line with bucketed data for locality by a processor are described. In an example, an apparatus includes decoder circuitry and execution circuitry. The decoder circuitry is to decode an instruction into a decoded instruction. The instruction has an opcode to indicate that the execution circuitry is to use metadata and instruction encodings to selectively perform a memory safety check. The execution circuitry is to execute the decoded instruction according to the opcode.
-
公开(公告)号:US10885202B2
公开(公告)日:2021-01-05
申请号:US16123593
申请日:2018-09-06
Applicant: Intel Corporation
Inventor: Francis X. McKeen , Carlos V. Rozas , Uday R. Savagaonkar , Simon P. Johnson , Vincent Scarlata , Michael A. Goldsmith , Ernie Brickell , Jiang Tao Li , Howard C. Herbert , Prashant Dewan , Stephen J. Tolopka , Gilbert Neiger , David Durham , Gary Graunke , Bernard Lint , Don A. Van Dyke , Joseph Cihula , Stalinselvaraj Jeyasingh , Stephen R. Van Doren , Dion Rodgers , John Garney , Asher Altman
Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
-
-
-