ANALYSIS OF SHORT TERM CPU SPIKES IN AN OPERATING SYSTEM KERNEL
    2.
    发明申请
    ANALYSIS OF SHORT TERM CPU SPIKES IN AN OPERATING SYSTEM KERNEL 审中-公开
    操作系统KERNEL中短周期CPU的分析

    公开(公告)号:US20130124837A1

    公开(公告)日:2013-05-16

    申请号:US13731913

    申请日:2012-12-31

    Inventor: Vijay PAUL

    Abstract: A profiler may analyze processes being run by a processor. The profiler may include logic to periodically sample a value of an instruction pointer that indicates an instruction in the first process that is currently being executed by the processor and logic to update profile data based on the sampled value. The profiler may additionally include logic to determine, in response to a context switch that includes the operating system switching the active process from the first process to another of the plurality of processes, whether the first process executes for greater than a first length of time; logic to stop operation of the profiler when the first process executes for greater than the first length of time; and logic to clear the profile data when the first process fails to execute for greater than the first length of time.

    Abstract translation: 分析器可以分析由处理器运行的进程。 分析器可以包括用于周期性地对指示指针的值进行采样的逻辑,所述指令指示器的值指示处理器当前正在执行的第一进程中的指令以及基于采样值来更新简档数据的逻辑。 分析器可以另外包括用于响应于包括将活动进程从第一进程切换到多个进程中的另一进程的上下文切换来确定第一进程是否执行大于第一时间长度的逻辑; 当第一进程执行大于第一时间长度时停止分析器的操作的逻辑; 以及当第一进程不能执行大于第一时间长度时清除简档数据的逻辑。

    HITLESS UPGRADE OF A NETWORK DEVICE
    3.
    发明公开

    公开(公告)号:US20230297358A1

    公开(公告)日:2023-09-21

    申请号:US17655686

    申请日:2022-03-21

    CPC classification number: G06F8/65

    Abstract: A network device obtains a data package associated with an ISSU procedure and determines, based on the data package, that a control plane of the network device is to be rebooted to facilitate performance of the ISSU procedure. The network device causes, based on determining that the control plane is to be rebooted, a plurality of applications of the network device to stop executing on the network device and a control plane state of the network device to be frozen. The network device then causes the ISSU procedure to be performed. The network causes, based on causing the ISSU procedure to be performed, the control plane state of the network device to be restored and the plurality of applications to resume executing on the network device.

    DETECTING MEMORY CORRUPTION
    4.
    发明申请
    DETECTING MEMORY CORRUPTION 有权
    检测内存损坏

    公开(公告)号:US20140122826A1

    公开(公告)日:2014-05-01

    申请号:US14138977

    申请日:2013-12-23

    CPC classification number: G06F12/10 G06F11/073 G06F11/0763

    Abstract: A device identifies, based on a program code instruction, an attempted write access operation to a fenced memory slab, where the fenced memory slab includes an alternating sequence of data buffers and guard buffers. The device assigns read-only protection to the fenced slab and invokes, based on the attempted write access operation, a page fault operation. When a faulting address of the attempted write operation is not an address for one of the multiple data buffers, the device performs a panic routine. When the faulting address of the attempted write operation is an address for one of the multiple data buffers, the device removes the read-only protection for the fenced slab and performs a single step processing routine for the program code instruction.

    Abstract translation: 设备基于程序代码指令识别对有围栏的存储器板的尝试的写入访问操作,其中有围栏的存储器板包括数据缓冲器和保护缓冲器的交替序列。 设备为防护板分配只读保护,并根据尝试的写访问操作调用页故障操作。 当尝试的写入操作的故障地址不是多个数据缓冲器之一的地址时,设备执行紧急程序。 当尝试的写入操作的故障地址是多个数据缓冲器中的一个的地址时,该设备移除防护板的只读保护,并对程序代码指令执行单步处理程序。

Patent Agency Ranking