INSTRUCTIONS AND LOGIC TO PROVIDE MEMORY FENCE AND STORE FUNCTIONALITY
    2.
    发明申请
    INSTRUCTIONS AND LOGIC TO PROVIDE MEMORY FENCE AND STORE FUNCTIONALITY 审中-公开
    说明和逻辑提供记忆功能和存储功能

    公开(公告)号:US20150095578A1

    公开(公告)日:2015-04-02

    申请号:US14040473

    申请日:2013-09-27

    IPC分类号: G06F12/08

    摘要: Instructions and logic provide memory fence and store functionality. Some embodiments include a processor having a cache to store cache coherent data in cache lines for one or more memory addresses of a primary storage. A decode stage of the processor decodes an instruction specifying a source data operand, one or more memory addresses as destination operands, and a memory fence type. Responsive to the decoded instruction, one or more execution units may enforce the memory fence type, then store data from the source data operand to the one or more memory addresses, and ensure that the stored data has been committed to primary storage. For some embodiments, the primary storage may comprise persistent memory. For some embodiments, cache lines corresponding to the memory addresses may be flushed, or marked for persistent write back to primary storage. Alternatively the cache may be bypassed, e.g. by performing a streaming vector store.

    摘要翻译: 说明和逻辑提供内存围栏和存储功能。 一些实施例包括具有高速缓存以在主存储器的一个或多个存储器地址的高速缓存行中存储高速缓存相干数据的处理器。 处理器的解码级将指定源数据操作数,一个或多个存储器地址作为目标操作数的指令和存储器栅栏类型进行解码。 响应于解码的指令,一个或多个执行单元可以强制执行存储器栅栏类型,然后将来自源数据操作数的数据存储到一个或多个存储器地址,并确保存储的数据已被提交到主存储器。 对于一些实施例,主存储器可以包括持久存储器。 对于一些实施例,可以刷新对应于存储器地址的高速缓存行,或者标记用于持续写入主存储器。 或者,可以绕过高速缓存。 通过执行流媒体矢量存储。

    TECHNIQUES FOR COMPILER SHELTERED NON-VOLATILE MEMORY STORES

    公开(公告)号:US20190042219A1

    公开(公告)日:2019-02-07

    申请号:US16006404

    申请日:2018-06-12

    IPC分类号: G06F8/41

    摘要: Various embodiments are generally directed to techniques for compiler sheltered nonvolatile memory (NVM) stores, such as based on demarcated atomic persistence regions in source code, for instance. Some embodiments are particularly related to a compiler that effectively shelters updates to NVM-based variables in a compiler implemented register, or register file, until the compiler has recorded undo values into a temporary but nonvolatile log range.

    REMOTE MEMORY OPERATIONS FOR COMPUTING SYSTEMS WITH SHARED MEMORY

    公开(公告)号:US20190324911A1

    公开(公告)日:2019-10-24

    申请号:US16457826

    申请日:2019-06-28

    摘要: Embodiments may include systems and methods for performing remote memory operations in a shared memory address space. An apparatus includes a first network controller coupled to a first processor core. The first network controller processes a remote memory operation request, which is generated by a first memory coherency agent based on a first memory operation for an application operating on the first processor core. The remote memory operation request is associated with a remote memory address that is local to a second processor core coupled to the first processor core. The first network controller forwards the remote memory operation request to a second network controller coupled to the second processor core. The second processor core and the second network controller are to carry out a second memory operation to extend the first memory operation as a remote memory operation. Other embodiments may be described and/or claimed.

    TECHNIQUES TO MITIGATE HIGH LATENCY INSTRUCTIONS IN HIGH FREQUENCY EXECUTION PATHS

    公开(公告)号:US20190034206A1

    公开(公告)日:2019-01-31

    申请号:US15825183

    申请日:2017-11-29

    IPC分类号: G06F9/38 G06F11/34 G06F9/30

    摘要: Embodiments may be directed to techniques to execute a binary based on source code comprising basic blocks of instructions, identify a path of execution of a plurality of the basic blocks of instructions having a higher execution frequency than an execution frequency threshold, and collect last branch records for the plurality of the basic blocks of instructions, the last branch records to indicate times of execution for the plurality of the basic blocks of instructions. Further, embodiments include determining latency values for each of the plurality of the basic blocks of instructions based on the times of execution, and performing a mitigation operation for each of the plurality of the basic blocks of instruction having latency values above a latency threshold.

    SOFTWARE DEFINED SILICON GUARDIANSHIP

    公开(公告)号:US20210117515A1

    公开(公告)日:2021-04-22

    申请号:US17133876

    申请日:2020-12-24

    IPC分类号: G06F21/10

    摘要: Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon guardianship are disclosed. An example method for semiconductor feature guardianship includes identifying, with a co-processor of a first semiconductor device, a feature based on a license received via a network from a remote enterprise system, the feature activated on a first semiconductor device based on the license, generating, with the co-processor of the first semiconductor device, a mesh network, the mesh network including a plurality of nodes associated with respective semiconductor devices including the first semiconductor device, the plurality of nodes including a primary node in communication with one or more secondary nodes, and migrating, with the co-processor of the first semiconductor device, the feature from a first secondary node to a second secondary node in response to a feature failure even on the first secondary node, the migration to maintain a feature entitlement associated with the license.

    CROSS DOMAIN AUTHENTICATION AND SECURITY SERVICES USING PROXIES FOR HTTP ACCESS
    9.
    发明申请
    CROSS DOMAIN AUTHENTICATION AND SECURITY SERVICES USING PROXIES FOR HTTP ACCESS 有权
    使用代码进行HTTP访问的跨域认证和安全服务

    公开(公告)号:US20070289006A1

    公开(公告)日:2007-12-13

    申请号:US11843287

    申请日:2007-08-22

    IPC分类号: H04L9/32 G06F15/16 G06F17/00

    摘要: Two identity spaces form a federation by agreeing to use a secret key to facilitate secure access of resources between them. When one identity space receives a request for a resource from a user in the other identity space, the first identity space checks to see if the resource is protected. If the resource is protected, the first identity space requests that a mediator in the second identity space authenticate the external user. The mediator verifies the external user's authenticity. Once the external user is authenticated, the mediator securely informs the first identity space, using the secret key, that the external user is authenticated to access the resource. The identity space then grants the user access to the resource if the user is allowed access as per the access control policy of the identity space.

    摘要翻译: 两个身份空间通过同意使用秘密密钥来促进他们之间资源的安全访问,形成联盟。 当一个身份空间从另一身份空间中的用户接收到对资源的​​请求时,第一身份空间将检查资源是否受保护。 如果资源受到保护,则第一身份空间请求第二个身份空间中的中介器验证外部用户。 调解员验证外部用户的真实性。 一旦对外部用户进行了身份验证,中介者使用秘密密钥安全地通知第一个身份空间,认证外部用户访问该资源。 如果根据身份空间的访问控制策略允许用户访问,身份空间则授予用户对资源的访问权限。