会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Memory management system in a computer system with shared memory mappings
    • 具有共享内存映射的计算机系统中的内存管理系统
    • US08166253B2
    • 2012-04-24
    • US13209261
    • 2011-08-12
    • Anil RaoCarl A. WaldspurgerXiaoxin Chen
    • Anil RaoCarl A. WaldspurgerXiaoxin Chen
    • G06F12/00G06F13/00G06F13/28
    • G06F12/121G06F12/109G06F2212/656
    • A memory management sub-system includes code executable by a processor fir performing selecting a plurality of contexts, and selecting a sample of the separately allocable portions of an address space for each of the contexts. For each of the selected allocable portions, a corresponding portion of the host memory to which the selected allocable portion is mapped is determined, and a count corresponding to a number of separately allocable portions of any context that are commonly mapped to the corresponding portion of the host memory. For each context, a metric is computed that is a function of the counts for that context. Host memory is allocated among the contexts at least in part based on their respective metrics.
    • 存储器管理子系统包括可由执行选择多个上下文的处理器执行的代码,以及为每个上下文选择地址空间的可单独分配的部分的样本。 对于每个所选择的可分配部分,确定所选择的可分配部分映射到的主机存储器的相应部分,并且对应于通常映射到所述可分配部分的相应部分的任何上下文的可分配部分的数量的计数 主机内存 对于每个上下文,计算度量是该上下文计数的函数。 主机内存至少部分地基于它们各自的度量被分配在上下文之中。
    • 8. 发明授权
    • Virtualization system for computers that use address space indentifiers
    • 使用地址空间标识符的计算机的虚拟化系统
    • US07409487B1
    • 2008-08-05
    • US10609877
    • 2003-06-30
    • Xiaoxin ChenAlberto J. MunozSahil Rihan
    • Xiaoxin ChenAlberto J. MunozSahil Rihan
    • G06F12/00G06F9/26G06F21/00
    • G06F12/1036G06F12/109G06F2009/45583
    • A virtual computer system including multiple virtual machines (VMs) is implemented in a physical computer system that uses address space identifiers (ASIDs). Each VM includes a virtual translation look-aside buffer (TLB), in which guest software, executing on the VM, may insert address translations, with each translation including an ASID. For each ASID used by guest software, a virtual machine monitor (VMM), or other software unit, assigns a unique shadow ASID for use in corresponding address translations in a hardware TLB. If a unique shadow ASID is not available for a newly used guest ASID, the VMM reassigns a shadow ASID from a prior guest ASID to the new guest ASID, purging any entries in the hardware TLB corresponding to the prior guest ASID. Assigning unique shadow ASIDs limits the need for TLB purges upon switching between the multiple VMs, reducing the number of TLB miss faults, and consequently improving overall processing efficiency.
    • 在使用地址空间标识符(ASID)的物理计算机系统中实现包括多个虚拟机(VM)的虚拟计算机系统。 每个虚拟机包括虚拟翻译后备缓冲器(TLB),其中在VM上执行的客户机软件可以插入地址转换,每个转换包括ASID。 对于访客软件使用的每个ASID,虚拟机监视器(VMM)或其他软件单元分配一个唯一的影子ASID,用于硬件TLB中相应的地址转换。 如果唯一的影子ASID不适用于新使用的客户机ASID,则VMM将从先前客户机ASID的影子ASID重新分配给新的客户机ASID,清除与先前客户机ASID相对应的硬件TLB中的任何条目。 分配唯一的影子ASID限制了在多个VM之间切换时对TLB清除的需求,减少了TLB未命中故障的数量,从而提高了整体处理效率。
    • 9. 发明授权
    • Virtualization system for computers having multiple protection mechanisms
    • 具有多重保护机制的计算机的虚拟化系统
    • US07278030B1
    • 2007-10-02
    • US10378126
    • 2003-03-03
    • Xiaoxin ChenAlberto J. MunozJeffrey W. Sheldon
    • Xiaoxin ChenAlberto J. MunozJeffrey W. Sheldon
    • G06F11/30G06F12/14
    • G06F12/1466G06F9/45537
    • In a virtual computer system, the invention virtualizes a primary protection mechanism, which restricts memory accesses based on the type of access attempted and a current hardware privilege level, using a secondary protection mechanism, which is independent of the hardware privilege level. The invention may be used to virtualize the protection mechanisms of the Intel IA-64 architecture. In this embodiment, virtual access rights settings in a virtual TLB are translated into shadow access rights settings in a hardware TLB, while virtual protection key settings in a virtual PKR cache are translated into shadow protection key settings in a hardware PKR cache, based in part on the virtual access rights settings. The shadow protection key settings are dependent on the guest privilege level, but the shadow access rights settings are not.
    • 在虚拟计算机系统中,本发明使用独立于硬件特权级别的次级保护机制来虚拟化主保护机制,其基于尝试的访问类型和当前硬件特权级别来限制存储器访问。 本发明可以用于虚拟化Intel IA-64架构的保护机制。 在该实施例中,虚拟TLB中的虚拟访问权限设置被转换为硬件TLB中的影子访问权限设置,而虚拟PKR高速缓存中的虚拟保护密钥设置被部分地转换为硬件PKR高速缓存中的影子保护密钥设置 对虚拟访问权限设置。 影子保护键设置取决于访客权限级别,但影子访问权限设置不是。
    • 10. 发明授权
    • Isolating data within a computer system using private shadow mappings
    • 使用私有阴影映射隔离计算机系统内的数据
    • US09274974B1
    • 2016-03-01
    • US11584178
    • 2006-10-20
    • Xiaoxin ChenCarl A. WaldspurgerPratap Subrahmanyam
    • Xiaoxin ChenCarl A. WaldspurgerPratap Subrahmanyam
    • G06F12/10
    • G06F9/45558G06F12/109G06F12/1491G06F2009/45583G06F2212/1052G06F2212/151G06F2212/657
    • Virtualization software establishes multiple execution environments within a virtual machine, wherein software modules executing in one environment cannot access private memory of another environment. A separate set of shadow memory address mappings is maintained for each execution environment. For example, a separate shadow page table may be maintained for each execution environment. The virtualization software ensures that the shadow address mappings for one execution environment do not map to the physical memory pages that contain the private code or data of another execution environment. When execution switches from one execution environment to another, the virtualization software activates the shadow address mappings for the new execution environment. A similar approach, using separate mappings, may also be used to prevent software modules in one execution environment from accessing the private disk space or other secondary storage of another execution environment.
    • 虚拟化软件在虚拟机内建立多个执行环境,其中在一个环境中执行的软件模块不能访问另一环境的专用内存。 为每个执行环境维护一组单独的影子内存地址映射。 例如,可以为每个执行环境维护单独的影子页表。 虚拟化软件确保一个执行环境的影子地址映射不映射到包含其他执行环境的私有代码或数据的物理内存页面。 当执行从一个执行环境切换到另一个执行环境时,虚拟化软件会激活新执行环境的影子地址映射。 使用单独映射的类似方法也可用于防止一个执行环境中的软件模块访问另一个执行环境的专用磁盘空间或其他辅助存储。