13 Treffer

Intel® Intrinsics Guide

Autor: admin Zuletzt aktualisiert am 30.07.2013 - 09:19

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Autor: RB (Intel) Zuletzt aktualisiert am 12.12.2014 - 11:18

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

Autor: Milind Girkar (Intel) Zuletzt aktualisiert am 23.07.2013 - 10:09

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

Autor: Ady Tal (Intel) Zuletzt aktualisiert am 17.09.2013 - 06:30
Blog post
Blog post

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Autor: Brian Vajda (Intel) Zuletzt aktualisiert am 23.07.2013 - 16:46

Using Intel® SDE's chip-check feature

Intel® SDE includes a software validation mechanism to restrict executed instructions to a part

Autor: Mark Charney (Intel) Zuletzt aktualisiert am 11.10.2013 - 09:53

Pointer Checker in ICC: requires dynamic linking of runtime libraries

The -check-pointers switch, which enables the Pointer Checker feature, cannot be used with the -static flag on Linux* (/MT on Windows*) which forces all Intel libraries to be linked staticall

Autor: Kittur Ganesh (Intel) Zuletzt aktualisiert am 11.07.2014 - 12:47

Intel® Memory Protection Extensions Enabling Guide

Abstract: This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model.

Autor: Sundaram Ramakesavan (Intel) Zuletzt aktualisiert am 16.04.2015 - 13:12
Einzelheiten zur Compiler-Optimierung finden Sie in unserem Optimierungshinweis.