-
公开(公告)号:US10375111B2
公开(公告)日:2019-08-06
申请号:US15430301
申请日:2017-02-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Benjamin M. Schultz , Frederick Justus Smith , Daniel Vasquez Lopez , Abhinav Mishra , Ian James McCarty , John A. Starks , Joshua David Ebersol , Ankit Srivastava , Hari R. Pulapaka , Mehmet Iyigun , Stephen E. Bensley , Giridhar Viswanathan
Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.
-
公开(公告)号:US10248459B2
公开(公告)日:2019-04-02
申请号:US15199665
申请日:2016-06-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Gregory John Colombo , Logananth Seetharaman , Graham Wong , Mehmet Iyigun , Steven Michel Pronovost , Thomas Fahrig , Thobias Jones , Michael Charles Crandall , James Andrew Goossen
Abstract: Embodiments disclosed herein are related to systems, methods, and computer readable medium for allocating one or more system resources for the exclusive use of an application. The embodiments include receiving a request for an exclusive allocation of one or more system resources for a first application, the one or more system resources being useable by the first application and one or more second applications; determining an appropriate amount of the one or more system resources that are to be allocated exclusively to the first application; and partitioning the one or more system resources into a first portion that is allocated for the exclusive use of the first application and a second portion that is not allocated for the exclusive use of the first application, the second portion being available for the use of the one or more second applications.
-
公开(公告)号:US20180349143A1
公开(公告)日:2018-12-06
申请号:US15613110
申请日:2017-06-02
Applicant: Microsoft Technology Licensing, LLC
Inventor: Hee jun Park , Mehmet Iyigun
CPC classification number: G06F9/30174 , G06F8/52 , G06F9/30043 , G06F9/30083 , G06F9/3009 , G06F9/3836 , G06F9/4893 , G06F9/5094
Abstract: Embodiments relate to improving user experiences when executing binary code that has been translated from other binary code. Binary code (instructions) for a source instruction set architecture (ISA) cannot natively execute on a processor that implements a target ISA. The instructions in the source ISA are binary-translated to instructions in the target ISA and are executed on the processor. The overhead of performing binary translation and/or the overhead of executing binary-translated code are compensated for by increasing the speed at which the translated code is executed, relative to non-translated code. Translated code may be executed on hardware that has one or more power-performance parameters of the processor set to increase the performance of the processor with respect to the translated code. The increase in power-performance for translated code may be proportional to the degree of translation overhead.
-
公开(公告)号:US10140132B2
公开(公告)日:2018-11-27
申请号:US15214383
申请日:2016-07-19
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Mehmet Iyigun , Yevgeniy Bak , Emily N. Wilson , Kirsten V. Stark , Sushu Zhang , Patrick L. Stemen , Brian E. King , Vasilios Karagounis , Neel Jain
IPC: G06F1/32 , G06F9/4401
CPC classification number: G06F9/4418 , G06F9/4406 , G06F9/4411
Abstract: Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.
-
公开(公告)号:US20180314547A1
公开(公告)日:2018-11-01
申请号:US15497482
申请日:2017-04-26
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yevgeniy M. Bak , Mehmet Iyigun , Christopher Peter Kleynhans , Syed A. Raza
Abstract: The threads of a user mode process can access various different resources of a computing device, and such access can be serialized. To access a serialized resource, a thread acquires a lock for the resource. For each context switch in the computing device, a module of the operating system kernel checks for priority inversions, which is a situation in which a higher priority thread of the user mode process is waiting for (blocking on) a resource for which a lower priority thread has acquired a lock. In response to detecting such a priority inversion, the priority of the lower priority thread is boosted to allow the priority thread to execute and eventually release the lock that the higher priority thread is waiting for.
-
公开(公告)号:US10101920B2
公开(公告)日:2018-10-16
申请号:US15199586
申请日:2016-06-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Mehmet Iyigun , Yevgeniy M Bak
Abstract: Embodiments disclosed herein are related to systems and methods for attributing disk Input/Output (IO) to one or more system entities. A disk IO attribution context is generated that defines disk IO utilization parameters for a system entity. A pointer is attached to the system entity that points to the disk IO attribution context. The pointer is exposed to system components of an underlying computer system. The pointer prompts the system components to report the disk IO utilization parameters when the system components have performed a disk IO operation for the system entity. The disk IO utilization parameters reported by the one or more system components are recorded in the disk IO attribution context.
-
公开(公告)号:US20180203626A1
公开(公告)日:2018-07-19
申请号:US15409267
申请日:2017-01-18
Applicant: Microsoft Technology Licensing, LLC
Inventor: Yevgeniy M. Bak , Mehmet Iyigun , Landy Wang
IPC: G06F3/06
CPC classification number: G06F9/5016
Abstract: Multiple partitions can be run on a computing device, each partition running multiple processes referred to as a workload. Each of the multiple partitions, is isolated from one another, preventing the processes in each partition from interfering with the operation of the processes in the other partitions. Using the techniques discussed herein, some memory pages of a partition (referred to as a sharing partition) can be shared with one or more other partitions. The pages that are shared are file backed (e.g., image or data files) or pagefile backed memory pages. The sharing partition can be, for example, a separate partition that is dedicated to sharing memory pages.
-
公开(公告)号:US20180139238A1
公开(公告)日:2018-05-17
申请号:US15430301
申请日:2017-02-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Benjamin M. Schultz , Frederick Justus Smith , Daniel Vasquez Lopez , Abhinav Mishra , Ian James McCarty , John A. Starks , Joshua David Ebersol , Ankit Srivastava , Hari R. Pulapaka , Mehmet Iyigun , Stephen E. Bensley , Giridhar Viswanathan
CPC classification number: H04L63/1491 , G06F9/45558 , G06F21/53 , G06F21/6254 , G06F2009/45587 , H04L63/0272 , H04L63/0421
Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.
-
公开(公告)号:US20180046536A1
公开(公告)日:2018-02-15
申请号:US15343970
申请日:2016-11-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Mehmet Iyigun , Kevin Michael Broas , Arun U. Kishan , Yevgeniy M. Bak , John Joseph Richardson
CPC classification number: G06F11/0793 , G06F9/45558 , G06F11/0712 , G06F11/0751 , G06F11/0772 , G06F11/079 , G06F2009/45583
Abstract: Processing faults in a virtual computing environment. A method includes receiving a request to perform a memory access for a virtual machine. The method further includes identifying that that the memory access is unable to be performed without taking a fault. The method further includes identifying that a virtual fault can be taken to service the fault. The virtual fault is taken by servicing the fault asynchronously with respect to the virtual machine. The method further includes identifying that a virtual fault should be taken by evaluating criteria to weigh taking a virtual fault for servicing the fault asynchronously versus servicing the fault synchronously. As a result of identifying that a virtual fault should be taken, the method farther includes notifying the virtual machine that a virtual fault should be taken for the memory access. The method further includes servicing the fault asynchronously with respect to the virtual machine.
-
公开(公告)号:US20170300311A1
公开(公告)日:2017-10-19
申请号:US15130512
申请日:2016-04-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Daniel Vasquez Lopez , Morakinyo Olugbade , Frederick J. Smith , Benjamin M. Schultz , Hari R. Pulapaka , Mehmet Iyigun
IPC: G06F9/445
Abstract: Techniques described herein can dynamically generate images. In one example, a method includes detecting a request to generate a container image based on a policy file and identifying a host image from a host operating system. The method can also include generating the container image based on the host image and the policy file, the policy file indicating a first set of files to be copied from the host image to the container image, a set of reparse points corresponding to a second set of files not to be copied from the host image to the container image, and a third set of files to be loaded into the container image from a remote source.
-
-
-
-
-
-
-
-
-