会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Processor associated blocking symbol controls for serializing the
accessing of data resources in a computer system
    • US5895492A
    • 1999-04-20
    • US864585
    • 1997-05-28
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • G06F9/46G06F12/00
    • G06F9/526
    • Provides a processor CLE (CPU lock element) for each processor in a protected storage in a multi-processor computer system. Each CLE contains a blocking symbol field (called herein a PLT, program lock token, field), a lock field H, and a wait field W which is used to chain plural CLEs currently having the same blocking symbol. When the lock field H is set to a lock held state, it indicates the associated processor has exclusive rights to access a data resource unit associated with the blocking symbol in the CLE entry. When the wait field in a lock entry contains a pointer to another lock entry and the H field in the lock entry indicates a not held state, the associated processor is waiting for the resource and cannot further execute its PLO instance until it later gets set to the lock state, which is done by the processor of the prior CLE in the chain when it completes execution of its PLO instance. Each PLO instruction also has operand fields, and a function code (FC). The FC controls the manner of processing done by the PLO instance on its operands. Blocking symbols are specified by software to enable the software to utilize hardware enforced serialization of multi-processor accesses simultaneously requested for accessing the same data resource in the computer system. The plural processors may simultaneously, and at any time, initiate PLO instances for the same or different blocking symbols. When different processors simultaneously execute PLO instances having different blocking symbols, the processors may execute in parallel without conflict. But if the different processors simultaneously execute PLO instances having the same blocking symbol, the processors cannot execute in parallel without potential conflict, and the processors must serialize the execution of their PLO instances for accessing the same resource. In the latter case, their CLEs are chained through pointers in wait fields of the CLEs.
    • 2. 发明授权
    • Blocking symbol control in a computer system to serialize accessing a
data resource by simultaneous processor requests
    • 阻止计算机系统中的符号控制,以通过同时处理器请求序列化访问数据资源
    • US5893157A
    • 1999-04-06
    • US864402
    • 1997-05-28
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • G06F15/16G06F9/46G06F12/00G06F15/177
    • G06F9/52
    • PLO (perform locked operation) instructions containing blocking symbols are executed on each of multiple processors in a computer system to control coherence in data structures which may be changed by any of multiple processors in a computer system. The blocking symbol is extracted from a PLO instruction instance when invoked by its executing processor. Then the processor hashes the blocking symbol using hardware-microcode (H-M) to generate the location of a lock field in protected storage. The PLO instruction's blocking symbol is associated with a computer resource unit by software providing the PLO instruction, and the blocking symbol then associates the resource with a protected lock through the hashing operation on the blocking symbol. A processor must obtain the lock for a blocking symbol before the executing PLO instruction instance is allowed to make access and change the resource unit associated with the blocking symbol. The blocking symbol controls the PLO operations by serializing simultaneously PLO instruction access requests being made by multiple processors to the same resource unit using the same blocking symbol to allow only one PLO instruction instance to have exclusive access to the resource at a time.
    • 在计算机系统中的多个处理器中的每一个上执行包含阻塞符号的PLO(执行锁定操作)指令,以控制可由计算机系统中的多个处理器中的任何一个处理器改变的数据结构中的一致性。 当由其执行的处理器调用时,从PLO指令实例中提取阻塞符号。 然后,处理器使用硬件微码(H-M)对阻塞符号进行散列,以产生受保护存储中锁定字段的位置。 PLO指令的阻塞符号通过提供PLO指令的软件与计算机资源单元相关联,然后阻塞符号通过对阻塞符号的哈希操作将资源与受保护的锁相关联。 在允许执行的PLO指令实例进行访问并更改与阻塞符号相关联的资源单元之前,处理器必须获得锁定符号的锁定。 阻塞符号通过使用相同的阻塞符号将多个处理器进行的PLO指令访问请求同时序列化到相同的资源单元来控制PLO操作,以允许一次只有一个PLO指令实例对资源进行独占访问。
    • 3. 发明授权
    • Method utilizing a set of blocking-symbol resource-manipulation
instructions for protecting the integrity of data in noncontiguous data
objects of resources in a shared memory of a multiple processor
computer system
    • 利用一组阻塞符号资源操作指令来保护多处理器计算机系统的共享存储器中资源的非连续数据对象中的数据完整性的方法
    • US6128710A
    • 2000-10-03
    • US92442
    • 1998-06-05
    • Steven Jay GreenspanKenneth Ernest PlambeckCasper Anthony Scalzi
    • Steven Jay GreenspanKenneth Ernest PlambeckCasper Anthony Scalzi
    • G06F9/46G06F9/30
    • G06F9/526G06F9/52
    • Six instructions for the manipulation of discontinuous memory locations in a computer memory are described. They are: Compare and Load (CL), Compare and Swap (CS), Double Compare and Swap (DCS), Compare and Swap and Store (CSST), Compare and Swap and Double Store (CSDST), and Compare and Swap and Triple Store (CSTST). In each instruction a processor associates a programming-specified blocking symbol with a lock not accessible to software. The lock is used by any of these instructions only during its single instance of instruction execution, and the lock is made available (unlocked) at the end of each instance to then enable another blocking-symbol instruction instance to use the lock, thereby serializing concurrent multiple processor requests for accessing the same resource. Programming associates resources in a system with the unique blocking symbols. Each instance of these instructions executes an operand earlier prepared from a data value taken from the resource.. The data value is checked for change during the instance of execution when equality indicates no change since its preparation. These blocking-symbol instructions significantly increase the computer's speed of changing noncontiguous locations in a resource, compared to the time needed by software-protocol locks which must operate over a plurality of instances to make corresponding changes in a resource.
    • 描述了用于操纵计算机存储器中不连续存储器位置的六个指令。 它们是:比较和加载(CL),比较和交换(CS),双重比较和交换(DCS),比较和交换和存储(CSST),比较和交换和双存储(CSDST),以及比较和交换和三重 商店(CSTST)。 在每个指令中,处理器将编程指定的阻塞符号与软件无法访问的锁相关联。 只有在执行指令的单个实例期间,这些指令才被使用,并且锁定在每个实例结束时可用(未锁定),然后允许另一个阻塞符号指令实例使用该锁定,从而序列化并发 多个处理器请求访问相同的资源。 编程将系统中的资源与唯一的阻塞符号相关联。 这些指令的每个实例都执行从资源获取的数据值更早准备的操作数。在执行的实例中检查数据值以进行更改,当相等性表示自其准备以来没有更改。 与必须在多个实例上操作以进行资源的相应更改的软件协议锁相比,这些阻塞符号指令显着地增加了计算机改变资源中不连续位置的速度。
    • 4. 发明授权
    • Method of executing perform locked operation instructions for supporting
recovery of data consistency if lost due to processor failure, and a
method of recovering the data consistency after processor failure
    • US5895494A
    • 1999-04-20
    • US924890
    • 1997-09-05
    • Casper Anthony ScalziKenneth Ernest Plambeck
    • Casper Anthony ScalziKenneth Ernest Plambeck
    • G06F11/22G06F12/00
    • G06F11/2289
    • Provides a processor method of executing instances of a Perform Locked Operation (PLO) instruction for enabling a recovery of the consistency of a resource unit being changed by a PLO instance when processor failure occurs anywhere during execution of the PLO instance. The method uses a PLO save area for each processor in a computer system capable of executing PLO instructions. Each PLO save area has a resource-inconsistency (RI) indicator having an RI state and a non-RI state, and stores the function code (FC) of the PLO instance. The RI state indicates that the resource is in a non-usable potentially inconsistent state, and the non-RI state indicates the resource is in the consistent state and may be used. A processor executing a PLO instance writes into its PLO save area all resource addresses where a change is to be made in the resource unit, and also writes in its PLO save area all operand values which will be used to change the resource at the associated addresses. After the processor has successfully written all of these addresses and associated operand data values into its PLO save area, the processor sets its RI indicator to the RI state, and then stores into the resource unit the data values stored in its PLO save area at the resource addresses also stored in its PLO save area, according to the FC also stored therein. After completing all changes in the resource, the processor sets its RI indicator to the non-RI (resource consistent) state. If the processor should ever fail while executing a PLO instance, it signals its failing condition to the system. Then, a RCR method is executed by any operational processor (acting as a RCR processor) to recover the consistency of the resource unit. The RCR method uses the state of the RI indicator with the failed processor's PLO save area, the FC stored therewith, and the content of the failed processor's PLO save area to restore the consistency of the resource unit.
    • 6. 发明授权
    • Preprocessing of stored target routines for emulating incompatible
instructions on a target processor
    • 用于在目标处理器上模拟不兼容指令的存储目标程序的预处理
    • US6009261A
    • 1999-12-28
    • US991714
    • 1997-12-16
    • Casper Anthony ScalziEric Mark SchwarzWilliam John StarkeJames Robert UrquhartDouglas Wayne Westcott
    • Casper Anthony ScalziEric Mark SchwarzWilliam John StarkeJames Robert UrquhartDouglas Wayne Westcott
    • G06F9/455
    • G06F9/45504
    • Provides a program translation and execution method which stores target routines (for execution by a target processor) corresponding to incompatible instructions, interruptions and authorizations of an incompatible program written for execution on another computer system built to a computer architecture incompatible with the architecture of the target processor's computer system. The disclosed process allows the target processor to emulate incompatible acts expected in the operation of an incompatible program when the target processor itself is incapable of performing the emulated acts. Each of the instructions, interruptions and authorizations found in the incompatible programs has one or more corresponding target routines, any of which may need to be preprocessed before it can precisely emulate the execution results required by the incompatible architecture. Target routines (corresponding to the incompatible instruction instances in an incompatible program being emulated) are accessed, patched where necessary, and executed by a target processor to enable the target processor to precisely obtain the execution results of the emulated incompatible program. Before preprocessing, each target routine may not be able to provide identical execution results as required by the incompatible architecture, and the preprocessing may patch one or more of its target instructions to enable the target routine to perform the identical emulation execution of the corresponding incompatible instruction. The patching and other modifications to a target routine are done by one or more preprocessing instructions stored in the target routine.
    • 提供程序转换和执行方法,其存储对应于不兼容的指令,不兼容程序的中断和授权的对象程序(用于由目标处理器执行),该程序被编写用于在另一个计算机系统上执行以执行,该计算机系统与目标架构不兼容 处理器的计算机系统。 当目标处理器本身不能执行仿真动作时,所公开的过程允许目标处理器模拟在不兼容的程序的操作中期望的不兼容的动作。 在不兼容程序中发现的每个指令,中断和授权都有一个或多个相应的目标程序,其中任何一个可能需要进行预处理,才能精确地模拟不兼容架构所需的执行结果。 目标程序(对应于正在仿真的不兼容程序中的不兼容指令实例)被访问,必要时进行修补,并由目标处理器执行,以使目标处理器能够精确获取仿真不兼容程序的执行结果。 在预处理之前,每个目标程序可能无法提供与不兼容体系结构相同的执行结果,并且预处理可能会修补其目标指令中的一个或多个,以使目标程序执行相应不兼容指令的相同仿真执行 。 对目标程序的修补和其他修改由存储在目标程序中的一个或多个预处理指令完成。