Pointers in a memory managed system

    公开(公告)号:US10558564B2

    公开(公告)日:2020-02-11

    申请号:US15719297

    申请日:2017-09-28

    Abstract: Examples disclosed herein relate to pointers in a memory managed system. A garbage collection thread in a garbage collection system indicates via a first indication, that the garbage collection system has entered a marking phase, the garbage collection system managing a heap of memory. The garbage collection thread attempts to modify a conversion status variable, associated with a mutator thread belonging to a set of mutator threads associated with the garbage collection system, from a first conversion status value, indicating that the mutator thread is performing a weak pointer conversion operation, to a second conversion status value indicating that a handshake is required between the garbage collection thread and the mutator thread. The garbage collection thread determines that the conversion status variable does not contain the second conversion status value. The garbage collection thread determines that a set of pointers is empty. The garbage collection thread attempts to indicate, via a third indication, that the marking phase has ended, wherein indicating using the third indication comprises determining that no mutator thread belonging to the set of mutator threads has provided a second indication indicating that the indicating mutator thread intends to add a pointer to the set of pointers. The garbage collection thread determines that the marking phase has ended when the attempt is successful. The garbage collection thread indicates, via a fourth indication, that the garbage collection system is still in the marking phase when the attempt is successful.

    Memory access control
    2.
    发明授权

    公开(公告)号:US10101936B2

    公开(公告)日:2018-10-16

    申请号:US15325068

    申请日:2014-07-28

    Abstract: Techniques disclosed herein relate to a method performed on a computing device in response to a request to identify a segment of memory. The method includes determining a desired sensitivity value for the request and determining a desired trust value for the request. The method also includes producing a memory segment identification result based on the desired sensitivity value and based on the desired trust value.

    Location-locked data
    3.
    发明授权

    公开(公告)号:US10298399B2

    公开(公告)日:2019-05-21

    申请号:US15500026

    申请日:2014-07-28

    Abstract: An example method is provided in according with one implementation of the present disclosure. The method includes receiving location-locked data (LLD), receiving at least location information related to a permitted region, and deterministically generating at least one location-specific encryption key (LSK) based at least on the location information related to the permitted region. The method further includes encrypting the LLD such that the encrypted LLD can be decrypted using one of the at least on LSK.

    Object descriptors
    4.
    发明授权

    公开(公告)号:US10042752B2

    公开(公告)日:2018-08-07

    申请号:US15167563

    申请日:2016-05-27

    Abstract: In one example in accordance with the present disclosure, a method may include identifying, by a first operating system process in a computer system accessing a shared memory heap, a first object at a first memory address in the shared memory heap. The first object may have been previously allocated in the shared memory heap by a second operating system process. The method may also include identifying an object descriptor associated with the first object at a second memory address in the shared memory heap. The object descriptor occupies a number of bits of memory independent of the type. The method may also include determining a size of the first object based on the object descriptor, enumerating, based on the object descriptor, fields associated with the first object and performing an action based on each field of the enumerated fields.

    Managing objects stored in memory

    公开(公告)号:US09846645B1

    公开(公告)日:2017-12-19

    申请号:US15167677

    申请日:2016-05-27

    Abstract: In one example in accordance with the present disclosure, a method for managing objects stored in memory may include identifying a first object in a heap. The heap may be accessed by a plurality of mutator threads executing within a first plurality of operating system processes. The method may also include determining that the first object is a reachable object and determining that a first range of memory locations in the heap does not contain any reachable object. The method may also include receiving an allocation request from a second mutator thread from the plurality of mutator threads and allocating a first free chunk of memory including at least a part of the first range of memory locations to the second mutator thread.

    MEMORY ACCESS CONTROL
    6.
    发明申请

    公开(公告)号:US20170185344A1

    公开(公告)日:2017-06-29

    申请号:US15325068

    申请日:2014-07-28

    Abstract: Techniques disclosed herein relate to a method performed on a computing device in response to a request to identify a segment of memory. The method includes determining a desired sensitivity value for the request and determining a desired trust value for the request. The method also includes producing a memory segment identification result based on the desired sensitivity value and based on the desired trust value.

    MANAGING OBJECTS STORED IN MEMORY

    公开(公告)号:US20170344473A1

    公开(公告)日:2017-11-30

    申请号:US15167677

    申请日:2016-05-27

    Abstract: In one example in accordance with the present disclosure, a method for managing objects stored in memory may include identifying a first object in a heap. The heap may be accessed by a plurality of mutator threads executing within a first plurality of operating system processes. The method may also include determining that the first object is a reachable object and determining that a first range of memory locations in the heap does not contain any reachable object. The method may also include receiving an allocation request from a second mutator thread from the plurality of mutator threads and allocating a first free chunk of memory including at least a part of the first range of memory locations to the second mutator thread.

    MANAGING OBJECTS STORED IN MEMORY
    8.
    发明申请

    公开(公告)号:US20190129845A1

    公开(公告)日:2019-05-02

    申请号:US15802082

    申请日:2017-11-02

    Abstract: A method for managing objects stored in memory is presented. The method may include receiving, by a memory allocator in a garbage collected system, a first free memory chunk. The method may include creating a node to associate with the first free memory chunk and ensuring that a first memory region containing the node will be considered to be free memory during a sweeping phase of the garbage collected system.

    DETERMINING CACHE VALUE CURRENCY USING PERSISTENT MARKERS

    公开(公告)号:US20190121750A1

    公开(公告)日:2019-04-25

    申请号:US15789431

    申请日:2017-10-20

    Abstract: Determining cache value currency using persistent markers is disclosed herein. In one example, a cache entry is retrieved from a local cache memory device. The cache entry includes a key, a value to be used by the computing device, and a marker flag to determine whether the cache entry is current. The local cache memory device also includes a marker location that indicates a location of a marker in a shared persistent fabric-attached memory (FAM). Using a marker location, the marker is retrieved from the shared persistent FAM. From the marker and the marker flag, it is determined whether the cache entry is current. The shared FAM pool is connected to the local cache memory devices of multiple computing devices.

    POINTERS IN A MEMORY MANAGED SYSTEM
    10.
    发明申请

    公开(公告)号:US20190095323A1

    公开(公告)日:2019-03-28

    申请号:US15719297

    申请日:2017-09-28

    CPC classification number: G06F12/0253 G06F12/0269 G06F2212/1044

    Abstract: Examples disclosed herein relate to pointers in a memory managed system. A garbage collection thread in a garbage collection system indicates via a first indication, that the garbage collection system has entered a marking phase, the garbage collection system managing a heap of memory. The garbage collection thread attempts to modify a conversion status variable, associated with a mutator thread belonging to a set of mutator threads associated with the garbage collection system, from a first conversion status value, indicating that the mutator thread is performing a weak pointer conversion operation, to a second conversion status value indicating that a handshake is required between the garbage collection thread and the mutator thread. The garbage collection thread determines that the conversion status variable does not contain the second conversion status value. The garbage collection thread determines that a set of pointers is empty. The garbage collection thread attempts to indicate, via a third indication, that the marking phase has ended, wherein indicating using the third indication comprises determining that no mutator thread belonging to the set of mutator threads has provided a second indication indicating that the indicating mutator thread intends to add a pointer to the set of pointers. The garbage collection thread determines that the marking phase has ended when the attempt is successful. The garbage collection thread indicates, via a fourth indication, that the garbage collection system is still in the marking phase when the attempt is successful.

Patent Agency Ranking