-
公开(公告)号:DE112020000805T5
公开(公告)日:2021-12-16
申请号:DE112020000805
申请日:2020-01-27
Applicant: IBM
Inventor: LICHTENAU CEDRIC , COPELAND REID , LEBER PETRA , MÜLLER SILVIA , BRADBURY JONATHAN , GUO XIN
IPC: G06F7/00
Abstract: Kontrolle für „Ziffernvalidierungsüberprüfung“ zur Ausführung einer Anweisung. Ein Prozess erhält eine Anweisung zum Ausführen von einer bzw. mehreren Operationen unter Verwendung von einem bzw. mehreren Eingabewerten. Die Anweisung umfasst einen Indikator „Keine Validierung“ zum Kontrollieren, ob die Kontrolle für „Ziffernvalidierungsüberprüfung“ für eine Ausführung der Anweisung aktiviert ist. Der Prozess führt die Anweisung auf Grundlage des Indikators „Keine Validierung“ einschließlich einer Bestimmung, ob die Kontrolle für „Ziffernvahdierungsüberprüfung“ für eine Ausführung der Anweisung aktiviert ist, und einer Ausführung der Verarbeitung auf Grundlage der Bestimmung aus. Auf Grundlage des Indikators „Keine Validierung“, der auf einen definierten Wert gesetzt ist, wird die Kontrolle für „Ziffernvahdierungsüberprüfung“ aktiviert, und die Verarbeitung umfasst ein Erzwingen eines Indikators „Ziffernüberprüfungsfehler“, der durch die Ausführung ausgegeben wird, um in Bezug auf den mindestens einen Eingabewert „Kein Ziffernüberprüfungsfehler“ anzugeben.
-
公开(公告)号:DE112020000289T5
公开(公告)日:2021-10-14
申请号:DE112020000289
申请日:2020-03-06
Applicant: IBM
Inventor: BACHER UTZ , BUENDGEN REINHARD , BRADBURY JONATHAN , HELLER LISA , BUSABA FADI
IPC: G06F9/455
Abstract: Gemäß einer oder mehreren Ausführungsformen der vorliegenden Erfindung umfasst ein durch einen Computer umgesetztes Verfahren ein Empfangen einer Abfrage für eine Speichermenge im Arbeitsspeicher eines Computersystems, die einer sicheren Schnittstellensteuerung des Computersystems überlassen werden soll. Die sichere Schnittstellensteuerung kann die zu überlassende Speichermenge auf Grundlage einer Mehrzahl von sicheren Entitäten bestimmen, die durch die sichere Schnittstellensteuerung als eine Mehrzahl von vorbestimmten Werten unterstützt werden. Die sichere Schnittstellensteuerung kann eine Antwort auf die Abfrage, die für die Speichermenge indikativ ist, als Antwort auf die Abfrage zurückgeben. Eine Überlassung von zu sicherndem Speicher zur Verwendung durch die sichere Schnittstellensteuerung kann auf Grundlage der Antwort auf die Abfrage empfangen werden.
-
公开(公告)号:SG11202105431VA
公开(公告)日:2021-06-29
申请号:SG11202105431V
申请日:2020-03-02
Applicant: IBM
Inventor: BUSABA FADI , HELLER LISA , BRADBURY JONATHAN
Abstract: According to one or more embodiments of the present invention, a computer implemented method includes receiving a secure access request for a secure page of memory at a secure interface control of a computer system. The secure interface control can check a disable virtual address compare state associated with the secure page. The secure interface control can disable a virtual address check in accessing the secure page to support mapping of a plurality of virtual addresses to a same absolute address to the secure page based on the disable virtual address compare state being set and/or to support secure pages that are accessed using an absolute address and do not have an associated virtual address.
-
公开(公告)号:SG11202105096TA
公开(公告)日:2021-06-29
申请号:SG11202105096T
申请日:2020-02-11
Applicant: IBM
Inventor: LICHTENAU CEDRIC , BRADBURY JONATHAN , SCHWARZ ERIC , FIGULI RAZVAN PETER , PAYER STEFAN
IPC: G06F16/903
Abstract: An instruction is provided for performing a vector string search. The instruction to be processed is obtained, with the instruction being defined to be a string search instruction to locate occurrence of a substring within a string. The instruction is processed, with the processing including searching the string specified in one operand of the instruction using the substring specified in another operand of the instruction. Based on the searching locating a first full match of the substring within the string, a full match condition indication is returned with position of the first full match in the string, and based on the searching locating only a partial match of the substring at a termination of the string, a partial match condition indication is returned, with the position of the partial match in the string.
-
公开(公告)号:AU2020221962A1
公开(公告)日:2021-06-03
申请号:AU2020221962
申请日:2020-02-11
Applicant: IBM
Inventor: LICHTENAU CEDRIC , BRADBURY JONATHAN , SCHWARZ ERIC MARK , FIGULI RAZVAN PETER , PAYER STEFAN
IPC: G06F16/903
Abstract: An instruction is provided for performing a vector string search. The instruction to be processed is obtained, with the instruction being defined to be a string search instruction to locate occurrence of a substring within a string. The instruction is processed, with the processing including searching the string specified in one operand of the instruction using the substring specified in another operand of the instruction. Based on the searching locating a first full match of the substring within the string, a full match condition indication is returned with position of the first full match in the string, and based on the searching locating only a partial match of the substring at a termination of the string, a partial match condition indication is returned, with the position of the partial match in the string.
-
公开(公告)号:AU2020213829A1
公开(公告)日:2021-05-20
申请号:AU2020213829
申请日:2020-01-14
Applicant: IBM
Inventor: DRIEVER PETER , RAISCH CHRISTOPH , KRAEMER MARCO , LEHNERT FRANK , KLEIN MATTHIAS , BRADBURY JONATHAN , JACOBI CHRISTIAN , BELMAR BRENTON
Abstract: A data processing system (210) and a method for handling an input/output store instruction (30), comprising a system nest (18) communicatively coupled to at least one input/output bus (22) by an input/output bus controller (20). The data processing system (210) further comprises at least a data processing unit (216) comprising a core (12), a system firmware (10) and an asynchronous core-nest interface (14). The data processing unit (216) is communicatively coupled to the system nest (18) via an aggregation buffer (16). The system nest (18) is configured to asynchronously load from and/or store data to at least one external device (214) which is communicatively coupled to the input/output bus (22). The data processing unit (216) is configured to complete the input/output store instruction (30) before an execution of the input/output store instruction (30) in the system nest (18) is completed. The asynchronous core-nest interface (14) comprises an input/output status array (44) with multiple input/output status buffers (24).
-
公开(公告)号:LT3532921T
公开(公告)日:2021-04-12
申请号:LT17791010
申请日:2017-10-17
Applicant: IBM
Inventor: BRADBURY JONATHAN , SCHWARZ ERIC , MUELLER SILVIA , GSCHWIND MICHAEL , OLSSON BRETT
-
公开(公告)号:AU2017341251B2
公开(公告)日:2020-10-01
申请号:AU2017341251
申请日:2017-10-02
Applicant: IBM
Inventor: GREINER DAN , SLEGEL TIMOTHY , ZOELLIN CHRISTIAN , JACOBI CHRISTIAN , PAPROTSKI VOLODYMYR , VISEGRADY TAMAS , BUENDGEN REINHARD THEODOR , BRADBURY JONATHAN , PURANIK ADITYA NITIN
Abstract: An instruction to perform ciphering and authentication is executed. The executing includes ciphering one set of data provided by the instruction to obtain ciphered data and placing the ciphered data in a designated location. It further includes authenticating an additional set of data provided by the instruction, in which the authenticating generates at least a part of a message authentication tag. The at least a part of the message authentication tag is stored in a selected location.
-
公开(公告)号:CA3132781A1
公开(公告)日:2020-09-17
申请号:CA3132781
申请日:2020-03-02
Applicant: IBM
Inventor: BRADBURY JONATHAN , HELLER LISA CRANTON , BACHER UTZ , BUSABA FADI
Abstract: An computer-implemented method according to examples includes receiving, by a secure interface control of a computing system, a request by a requestor to access a page in a memory of the computing system. The method further includes, responsive to determining that the requestor is a non-secure requestor and responsive to a secure- storage bit being set, prohibiting access to the page without performing an authorization check. The method further includes, responsive to determining that the requestor is a secure requestor, performing the authorization check.
-
公开(公告)号:AU2017333837A1
公开(公告)日:2019-04-04
申请号:AU2017333837
申请日:2017-09-22
Applicant: IBM
Inventor: COPELAND REID , MUELLER SILVIA MELITTA , BRADBURY JONATHAN , SLEGEL TIMOTHY
IPC: G06F9/30
Abstract: An instruction to perform a sign operation of a plurality of sign operations configured for the instruction. The instruction is executed, and the executing includes selecting at least a portion of an input operand as a result to be placed in a select location. The selecting is based on a control of the instruction, in which the control indicates a user-defined size of the input operand to be selected as the result. A sign of the result is determined based on a plurality of criteria, including a value of the result, obtained based on the control of the instruction, having a first particular relationship or a second particular relationship with respect to a selected value. The result and the sign are stored in the select location to provide a signed output to be used in processing within the computing environment.
-
-
-
-
-
-
-
-
-