-
公开(公告)号:US11907135B2
公开(公告)日:2024-02-20
申请号:US18164938
申请日:2023-02-06
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yevgeniy Bak , Mehmet Iyigun , Jonathan E. Lange
IPC: G06F12/10 , G06F12/1009 , G06F9/455
CPC classification number: G06F12/1009 , G06F9/45558 , G06F2009/45583 , G06F2212/1024 , G06F2212/657
Abstract: To increase the speed with which a Second Layer Address Table (SLAT) is traversed, memory having the same access permissions is contiguously arranged such that one or more hierarchical levels of the SLAT need not be referenced, thereby resulting in more efficient SLAT traversal. “Slabs” of memory are established whose memory range is sufficiently large that reference to a hierarchically lower level table can be skipped and a hierarchically higher level table's entries can directly identify relevant memory addresses. Such slabs are aligned to avoid smaller intermediate memory ranges. The loading of code or data into memory is performed based on a next available memory location within a slab having equivalent access permissions, or, if such a slab is not available, or if an existing slab does not have a sufficient quantity of available memory remaining, a new slab with the proper access permissions is established.
-
公开(公告)号:US11775475B2
公开(公告)日:2023-10-03
申请号:US16293456
申请日:2019-03-05
Applicant: Microsoft Technology Licensing, LLC
Inventor: Amber Tianqi Guo , Benjamin M. Schultz , Frederick Justus Smith, IV , Axel Rietschin , Hari R. Pulapaka , Mehmet Iyigun , Jonathan De Marco
IPC: G06F16/11 , G06F16/13 , G06F16/188 , G06F16/901
CPC classification number: G06F16/128 , G06F16/13 , G06F16/188 , G06F16/9017
Abstract: Techniques of deferred container deployment are disclosed herein. In one embodiment, a method includes receiving, at a computing device, a container image corresponding to the container. The container image includes a first set of files identified by symbolic links individually directed to a file in the host filesystem on the computing device and a second set of files identified by hard links. The method also includes in response to receiving the container image, at the computing device, storing the received container image in a folder of the host filesystem on the computing device without resolving the symbolic links of the first set of the files until runtime of the requested container.
-
公开(公告)号:US11580019B2
公开(公告)日:2023-02-14
申请号:US16851263
申请日:2020-04-17
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yevgeniy M. Bak , Kevin Michael Broas , David Alan Hepkin , Landy Wang , Mehmet Iyigun , Brandon Alec Allsop , Arun U. Kishan
IPC: G06F12/06 , G06F12/02 , G06F9/4401 , G06F9/54
Abstract: Techniques for computer memory management are disclosed herein. In one embodiment, a method includes in response to receiving a request for allocation of memory, determining whether the request is for allocation from a first memory region or a second memory region of the physical memory. The first memory region has first memory subregions of a first size and the second memory region having second memory subregions of a second size larger than the first size of the first memory region. The method further includes in response to determining that the request for allocation of memory is for allocation from the first or second memory region, allocating a portion of the first or second multiple memory subregions of the first or second memory region, respectively, in response to the request.
-
公开(公告)号:US11061433B2
公开(公告)日:2021-07-13
申请号:US17023787
申请日:2020-09-17
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jason Lin , Mehmet Iyigun , Daniel F. Cuomo, Jr. , Keith Loren Mange , Sarath Madakasira , Travis Luke
IPC: G06F1/12 , H04N21/8547 , G06F1/14
Abstract: Exposing a leap second to a plurality of applications includes identifying that a positive leap second should be added to the end of a chosen date. Based on the occurrence of the positive leap second, a first conversion component is exposed to a first application. The first conversion component presents, over a period of two seconds of actual time, a last second of the chosen date as if it is one second of system time. Based on the occurrence of the positive leap second, and based on a second application opting in to leap seconds, a second conversion component is exposed to the second application. The second conversion component presents an extra 61st second of system time at the end of a last minute of the chosen date.
-
公开(公告)号:US20210042141A1
公开(公告)日:2021-02-11
申请号:US16597657
申请日:2019-10-09
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jonathan De Marco , Benjamin M. Schultz , Frederick Justus Smith, IV , Hari R. Pulapaka , Mehmet Iyigun , Amber Tianqi Guo
Abstract: Computing systems, devices, and methods of dynamic image composition for container deployment are disclosed herein. One example technique includes receiving a request for accessing a file from a container process. In response to receiving the request, the technique includes querying a mapping table corresponding to the container process to locate an entry corresponding to a file identifier of the requested file. The entry also includes data identifying a file location on the storage device from which the requested file is accessible. The technique further includes retrieving a copy of the requested file according to the file location identified by the data in the located entry in the mapping table and providing the retrieved copy of the requested file to the container process, thereby allowing the container process to access the requested file.
-
公开(公告)号:US10809759B2
公开(公告)日:2020-10-20
申请号:US16121511
申请日:2018-09-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jason Lin , Mehmet Iyigun , Daniel F. Cuomo, Jr. , Keith Loren Mange , Sarath Madakasira , Travis Luke
IPC: G06F1/12 , H04N21/8547
Abstract: Exposing a leap second to a plurality of applications includes identifying a system setting enabling leap second support and that a positive leap second should be added to the end of a chosen date. Based on the system setting enabling leap second support and based on the occurrence of the positive leap second, a first conversion component is exposed to a first application. The first conversion component presents, over a period of two seconds of actual time, a last second of the chosen date as if it is one second of system time. Based on the system setting enabling leap second support, based on the occurrence of the positive leap second, and based on a second application opting in to leap seconds, a second conversion component is exposed to the second application. The second conversion component presents an extra 61st second of system time at the end of a last minute of the chosen date.
-
77.
公开(公告)号:US10761876B2
公开(公告)日:2020-09-01
申请号:US16423137
申请日:2019-05-27
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yevgeniy Bak , Mehmet Iyigun , Arun U. Kishan
IPC: G06F3/06 , G06F9/455 , G06F12/1045 , G06F12/109
Abstract: To increase the speed with which the hierarchical levels of a Second Layer Address Table (SLAT) are traversed as part of a memory access where the guest physical memory of a virtual machine environment is backed by virtual memory assigned to one or more processes executing on a host computing device, one or more hierarchical levels of tables within the SLAT can be skipped or otherwise not referenced. While the SLAT can be populated with memory correlations at hierarchically higher-levels of tables, the page table of the host computing device, supporting the host computing device's provision of virtual memory, can maintain a corresponding contiguous set of memory correlations at the hierarchically lowest table level, thereby enabling the host computing device to page out, or otherwise manipulate, smaller chunks of memory. If such manipulation occurs, the SLAT can be repopulated with memory correlations at the hierarchically lowest table level.
-
公开(公告)号:US10606653B2
公开(公告)日:2020-03-31
申请号:US15431746
申请日:2017-02-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Arun Upadhyaya Kishan , Neill Michael Clift , Mehmet Iyigun , Yevgeniy Bak , Syed Aunn Hasan Raza
Abstract: A priority-based scheduling and execution of threads may enable the completion of higher-priority tasks above lower-priority tasks. Occasionally, a high-priority thread may request a resource that has already been reserved by a low-priority thread, and the higher-priority thread may be blocked until the low-priority thread relinquishes the reservation. Such prioritization may be acceptable if the low-priority thread is able to execute comparatively unimpeded, but in some scenarios, the low-priority thread may execute at a lower priority than a medium-priority thread that also has a lower priority than the high-priority thread. In this scenario, the medium-priority thread is effectively but incorrectly prioritized above the high-priority thread. Instead, upon detecting this scenario, the device may temporarily elevate the priority of the lower-priority thread over the priority of the medium-priority thread until the lower-priority thread relinquishes the resource, thereby reducing the waiting period of the high-priority thread for the requested resource.
-
公开(公告)号:US10592689B2
公开(公告)日:2020-03-17
申请号:US15299107
申请日:2016-10-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Kyle Thomas Brady , John C. Gordon , Benjamin M. Schultz , Ali Hajy , Morakinyo Korede Olugbade , Hari R. Pulapaka , Paul Bozzay , Frederick J. Smith , Mehmet Iyigun
Abstract: Different containers are used for different usage sessions, a container referring to a virtualization layer for a computing device and used for isolation as well as hardware resource partitioning. A usage session refers to the time span beginning when one or more users begin to use the computing device, and ending when the one or more users cease using the computing device. During a particular usage session that uses a container, all interaction with the computing device is maintained in the container. The container is deleted when the usage session ends, leaving no data from the usage session behind after the usage session ends. Additionally, some usage sessions need not be run in containers, so data generated during such usage sessions is maintained after usage session ends. The host operating system automatically determines which usage sessions to run in containers and which usage sessions to run separate from any containers.
-
公开(公告)号:US10417009B2
公开(公告)日:2019-09-17
申请号:US16111187
申请日:2018-08-23
Applicant: Microsoft Technology Licensing, LLC
Inventor: Mehmet Iyigun , Yevgeniy Bak , Emily N. Wilson , Kirsten V. Stark , Sushu Zhang , Patrick L. Stemen , Brian E. King , Vasilios Karagounis , Neel Jain
IPC: G06F9/44 , G06F9/4401
Abstract: Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.
-
-
-
-
-
-
-
-
-