-
公开(公告)号:US20210117535A1
公开(公告)日:2021-04-22
申请号:US17114246
申请日:2020-12-07
Applicant: INTEL CORPORATION
Inventor: Michael LEMAY , David M. DURHAM , Michael E. KOUNAVIS , Barry E. HUNTLEY , Vedvyas SHANBHOGUE , Jason W. BRANDT , Josh TRIPLETT , Gilbert NEIGER , Karanvir GREWAL , Baiju PATEL , Ye ZHUANG , Jr-Shian TSAI , Vadim SUKHOMLINOV , Ravi SAHITA , Mingwei ZHANG , James C. FARWELL , Amitabh DAS , Krishna BHUYAN
Abstract: Disclosed embodiments relate to encoded inline capabilities. In one example, a system includes a trusted execution environment (TEE) to partition an address space within a memory into a plurality of compartments each associated with code to execute a function, the TEE further to assign a message object in a heap to each compartment, receive a request from a first compartment to send a message block to a specified destination compartment, respond to the request by authenticating the request, generating a corresponding encoded capability, conveying the encoded capability to the destination compartment, and scheduling the destination compartment to respond to the request, and subsequently, respond to a check capability request from the destination compartment by checking the encoded capability and, when the check passes, providing a memory address to access the message block, and, otherwise, generating a fault, wherein each compartment is isolated from other compartments.
-
公开(公告)号:US20200226009A1
公开(公告)日:2020-07-16
申请号:US16836650
申请日:2020-03-31
Applicant: Intel Corporation
Inventor: Alexander BACHMUTSKY , Raghu KONDAPALLI , Francesc GUIM BERNAT , Vadim SUKHOMLINOV
Abstract: Examples described herein relate to requesting execution of a workload by a next function with data transport overhead tailored based on memory sharing capability with the next function. In some examples, data transport overhead is one or more of: sending a memory address pointer, virtual memory address pointer or sending data to the next function. In some examples, the memory sharing capability with the next function is based on one or more of: whether the next function shares an enclave with a sender function, the next function shares physical memory domain with a sender function, or the next function shares virtual memory domain with a sender function. In some examples, selection of the next function from among multiple instances of the next function based on one or more of: sharing of memory domain, throughput performance, latency, cost, load balancing, or service legal agreement (SLA) requirements.
-
公开(公告)号:US20210026651A1
公开(公告)日:2021-01-28
申请号:US16524004
申请日:2019-07-26
Applicant: Intel Corporation
Inventor: Alexander BACHMUTSKY , Kshitij A. DOSHI , Raghu KONDAPALLI , Vadim SUKHOMLINOV
IPC: G06F9/4401 , G06F9/48 , G06F3/06
Abstract: Examples are described that relate to waking up or invoking a function such as a processor-executed application or a hardware device. The application or a hardware device can specify which sources can cause wake-ups and which sources are not to cause wake-ups. A device or processor-executed software can monitor reads from or writes to a region of memory and cause the application or a hardware device to wake-up unless the wake-up is specified as inhibited. The updated region of memory can be precisely specified to allow a pinpoint retrieval of updated content instead of scanning a memory range for changes. In some cases, a write to a region of memory can include various parameters that are to be used by the woken-up application or a hardware device. Parameters can include a source of a wake-up, a timer to cap execution time, or any other information.
-
4.
公开(公告)号:US20190340089A1
公开(公告)日:2019-11-07
申请号:US16513478
申请日:2019-07-16
Applicant: Intel Corporation
Inventor: Kshitij A. DOSHI , Vadim SUKHOMLINOV , Francesc GUIM BERNAT
Abstract: Data is mirrored in persistent memory in nodes in a computer cluster for redundancy. The data can be recovered from the persistent memory in a failed node by another node in the computer cluster through a low power network interface in the failed node.
-
公开(公告)号:US20200004953A1
公开(公告)日:2020-01-02
申请号:US16024547
申请日:2018-06-29
Applicant: Intel Corporation
Inventor: Michael LEMAY , David M. DURHAM , Michael E. KOUNAVIS , Barry E. HUNTLEY , Vedvyas SHANBHOGUE , Jason W. BRANDT , Josh TRIPLETT , Gilbert NEIGER , Karanvir GREWAL , Baiju V. PATEL , Ye ZHUANG , Jr-Shian TSAI , Vadim SUKHOMLINOV , Ravi SAHITA , Mingwei ZHANG , James C. FARWELL , Amitabh DAS , Krishna BHUYAN
Abstract: Disclosed embodiments relate to encoded inline capabilities. In one example, a system includes a trusted execution environment (TEE) to partition an address space within a memory into a plurality of compartments each associated with code to execute a function, the TEE further to assign a message object in a heap to each compartment, receive a request from a first compartment to send a message block to a specified destination compartment, respond to the request by authenticating the request, generating a corresponding encoded capability, conveying the encoded capability to the destination compartment, and scheduling the destination compartment to respond to the request, and subsequently, respond to a check capability request from the destination compartment by checking the encoded capability and, when the check passes, providing a memory address to access the message block, and, otherwise, generating a fault, wherein each compartment is isolated from other compartments.
-
6.
公开(公告)号:US20180285563A1
公开(公告)日:2018-10-04
申请号:US15476827
申请日:2017-03-31
Applicant: Intel Corporation
Inventor: John BROWNE , Vadim SUKHOMLINOV , Timothy VERRALL , Eoin WALSH
Abstract: Examples include techniques for a service assurance using fingerprints associated with execution of virtualized applications. Examples include receiving information for computing events gathered while a virtual machine executes one or more applications to process a workload for a virtual network function over a period of time. A service performance risk may be reported based on a sample fingerprint generated using the gathered computing events.
-
公开(公告)号:US20190102262A1
公开(公告)日:2019-04-04
申请号:US15721625
申请日:2017-09-29
Applicant: Intel Corporation
Inventor: Vadim SUKHOMLINOV , Kshitij A. DOSHI , Tamir D. MUNAFO , Sanjeev N. TRIKA , Urvi PATEL , Rowel S. GARCIA
IPC: G06F11/14
Abstract: A storage controller performs continuous checkpointing. With continuous checkpointing, the information necessary for system rollback is continuously recorded without the need of a specific command. With the rollback information, the system can rollback or restore to any previous state up to a number of previous writes or up to an amount of data. The number of writes or the amount of data that can be restored are configurable.
-
公开(公告)号:US20190042339A1
公开(公告)日:2019-02-07
申请号:US16024614
申请日:2018-06-29
Applicant: Intel Corporation
Inventor: Kshitij A. DOSHI , Vadim SUKHOMLINOV
Abstract: Examples include techniques for invocation of a function or service. Examples include receiving a call instruction from an application hosted by a platform to invoke a virtual function provided by a different application. Information included in the call instruction are used to determine how to prepare for and enter an invocation of the call for the virtual function.
-
-
-
-
-
-
-