Abstract:
PROBLEM TO BE SOLVED: To manage a machine state in virtual machine operations.SOLUTION: Methods and systems are provided to control a transition between a virtual machine (VM) and a virtual machine monitor (VMM). A processor uses state action indicators to load and/or store associated elements of a machine state before completing the transition. The state action indicators may be stored in a virtual machine control structure (VMCS), predetermined, and/or calculated dynamically. In some embodiments, the values loaded can be directly acquired from the VMCS, predetermined and/or calculated dynamically. In some embodiments, the values stored may be acquired directly from the machine state, predetermined and/or calculated dynamically.
Abstract:
PROBLEM TO BE SOLVED: To allow lower and upper bounds of an object pointed to by a pointer to be automatically checked during execution of a program in programming languages such as C and C++ programs. SOLUTION: A processor 200 has default registers 202 and bound registers 204 which represent hardware register extensions of the default registers. The bound registers 204 maintain the association of metadata with its corresponding data. By providing the association between the default registers 202 and the bound registers 204, the calling convention of these registers 202 remains the same. The metadata being held at the bound registers 204 may be used to specify a range of memory addresses which can be accessed (loaded/stored) using the processor 200. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, an apparatus and a system which achieve effective virtualization of resources in an information processing system. SOLUTION: The system is composed of an evaluation logic which determines whether or not an access is permitted based on its access type responding to an attempt of a guest who accesses a device using a memory address that is converted to the device, and an exit logic which transfers control of the apparatus from the guest to a host if the evaluation logic determined that the access is not permitted. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a processor which reduces overhead in gathering and scattering multiple data elements.SOLUTION: Efficient data transfer operations can be achieved by: decoding by a processor device 140, 160, a single instruction specifying a transfer operation for a plurality of data elements between a first storage location and a second storage location; issuing the single instruction for execution by an operation execution unit in the processor; detecting occurrence of an exception during execution of the single instruction; and, in response to the exception, delivering pending traps or interrupts to an exception handler prior to delivering the exception.
Abstract:
PROBLEM TO BE SOLVED: To disclose a system and a method for allowing execution of a system management mode (SMM) code during secure operations in a microprocessor system.SOLUTION: In one embodiment, a system management interruption (SMI) can be first directed to a handler in a secured virtual machine monitor (SVMM). Then, the SMI can be redirected to a SMM code located in a virtual machine (VM) which is under the security control of the SVMM. This redirection can be achieved by enabling reading from and writing onto the system management (SM) base register in the processor.
Abstract:
PROBLEM TO BE SOLVED: To reduce the overhead associated with switching the context of an address space. SOLUTION: This method includes: a step of switching the context between the first address space and the second address space by the processor of a system; a step of determining whether the second address space exists in a list of address spaces stored in a scratch pad memory of the processor; a step of allocating a new entry of the second address space that is different from the current entry of the first address space after switching the context to the second address space if the second address space does not exist in the list of address spaces; and a step of maintaining the current entry of the first address space to a conversion buffer of the processor after switching the context to the second address space if the second address space exists in the list of address space. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To perform better management and control of VM (virtual machine) operations. SOLUTION: Methods and systems are provided to control transitions between a virtual machine (VM) and a Virtual Machine Monitor (VMM). A processor uses state action indicators to load and/or store associated elements of a machine state before completing the transition. The state action indicators may be stored in a Virtual Machine Control Structure (VMCS), predetermined, and/or calculated dynamically. In some embodiments, the values loaded can be directly acquired from the VMCS, predetermined and/or calculated dynamically. In some embodiments, the values stored may be acquired directly from the machine state, predetermined and/or calculated dynamically. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To enable integrity of secure applications and their data to be achieved within a computer system.SOLUTION: In a microprocessor 100, each processor core 105, 110 includes logic 119 for implementing secure enclave techniques, to perform efficient resource allocation among a plurality of cores or processors, establishing one or more secure enclaves in which an application and data may be stored and executed.
Abstract:
PROBLEM TO BE SOLVED: To further effectively maintain pipeline resources by switching contexts.SOLUTION: According to a first embodiment of this invention, switching is made between guest software and a virtual machine monitor, whether storage in a protected location causes the switching is determined, and at least one entry of processor resources corresponding to the protected location is selectively flushed while maintaining another entry of processor resources corresponding to the guest software.