This application claims priority to U.S. patent application Ser. No. 11/295,355 filed Dec. 5, 2005, which is incorporated herein by reference in its entirety.
Computing devices have made significant contributions toward the advancement of modern society and are utilized in a number of applications to achieve advantageous results. Numerous devices, such as personal computers, servers, hand-held devices, distributed computer systems, calculators, audio devices, video equipment, and telephone systems, have facilitated increased productivity and reduced costs in analyzing and communicating data in most areas of business, science, education and entertainment.
Computing device-readable media (e.g., memory) are usually an important component of a number of computing devices. Computing device-readable media typically store information utilized by a system in performance of a number of different tasks. Other components of a system typically request access to memory in order to retrieve (e.g., “read”) information from and store (e.g., “write”) information in the memory. Different types of memories (e.g., mass storage, main memory, removable memory and the like) and/or memory “spaces” (e.g., virtual, physical) can be utilized to support information storage.
Different types of computing device-readable media can potentially offer different features, such as storage capacity and access speed. Traditionally, memories that have relatively large storage capacity have relatively slow access speeds. Systems that have relatively fast access speeds, in contrast, typically have relatively small storage capacities. For example, primary memories (e.g., main memory) are relatively fast compared to secondary memories (e.g., mass storage memory) but typically store less information. In view of the tradeoffs, a number of systems transfer chunks of information between relatively fast small memories and relatively slow bulk memories to attempt to optimize speed and capacity.
Another technique for optimizing performance in computing devices is to utilize virtual and physical address spaces. Virtual address space allows applications to utilize as much memory as needed without regard to the memory utilization of other applications. The application retrieves and stores instructions and data utilizing virtual addresses, and the memory system retrieves and stores instruction and data in physically memory using physical addresses to optimize performance. Accordingly, translation between the virtual memory space addressing and physical memory space addressing is performed by the computing system. As a result, applications and data may be moved within memory and between different types of memory. However, applications use the same virtual address regardless of the true physical address.
Embodiments of the present invention are directed toward memory access techniques that include overriding attributes in the page table data structure and translation lookaside buffer (TLB). In one embodiment, a method of accessing memory includes receiving a memory access request. In response to receiving the memory access request a given context specifier is accessed to generate a virtual address. The virtual address is then translated to a physical address utilizing one or more attributes contained in the context specifier that override one or more attributes contained in the TLB or page table data structure.
In another embodiment, a method of accessing memory includes receiving a memory access request. A given context specifier is accessed to generate a virtual address. The virtual address is then translated to a physical address utilizing a TLB or page table data structure. The memory is then accessed at the physical address. Translating the virtual address to the physical address and accessing the memory at the physical address are controlled by one or more attributes contained in the context specifier that override one or more attributes contained in the TLB or page table data structure.
In yet another embodiment, a memory access system includes a memory management unit having a segmentation unit and a paging unit. The segmentation unit is adapted to receive a memory access request and access a given context specifier. The segmentation unit is also adapted to generate a virtual address. The page unit is adapted to translate the virtual address to a physical address utilizing one or more attributes contained in the context specifier that override one or more attributes contained in the translation lookaside buffer or page table data structure.
Embodiments of the present invention are illustrated by way of example and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Reference will now be made in detail to the embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with these embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it is understood that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Referring to
The computing device-readable media 115, 120, 125 may be characterized as primary memory and secondary memory. Generally, the secondary memory, such as a magnetic and/or optical storage, provides for non-volatile storage of computer-readable instructions and data for use by the computing device 100. For instance, the disk drive 120 may store the operating system (OS) 155 and applications and data 160. The primary memory, such as the system memory 115 and/or graphics memory 125, provides for volatile storage of computer-readable instructions and data for use by the computing device 100. For instance, the system memory 115 may temporarily store a portion of the operating system 155′ and a portion of one or more applications and associated data 160′ that are currently used by the CPU 110, GPU 150 and the like.
The computing device-readable media 115, 120, 125, I/O devices 130, 135, 140, 145, and GPU 150 may be communicatively coupled to the processor 110 by a chip set 165 and one or more busses. The chipset 165 acts as a simple input/output hub for communicating data and instructions between the processor 110 and the computing device-readable media 115, 120, 125, I/O devices 130, 135, 140, 145, and GPU 150. In one implementation, the chipset 165 includes a northbridge 170 and southbridge 175. The northbridge 170 provides for communication with the processor 110 and interaction with the system memory 115. The southbridge 175 provides for input/output functions.
The graphic processing unit 150 may include a memory management unit (MMU) 180 for managing the transfer of data and instructions. However, in other embodiments the MMU 180 may be an independent circuit, a part of the chip set 165, a part of the primary or secondary memory, and/or other element in the computing device.
The MMU 180 translates virtual addresses to physical addresses for each of a plurality of contexts. In one implementation, the MMU 180 translates the virtual address to a physical address using an address translation data structure. In another implementation, a context specifier may override the virtual-to-physical page mapping and/or attributes in the address translation data structure. In particular, the virtual address may be translated directly to a physical address using an adjustment specified in the context specifier. In such an implementation, one or more attributes of the context specifier may override the same attributes stored in a page table data structure or cached locally in a translation lookaside buffer (TLB). In yet another implementation, the page table data structure may be utilized to translate the virtual address to a given physical address and the attributes contained in the context specifier that override the same attributes contained in the page table data structure or TLB.
Referring now to
The computing device-readable media 225 may store a plurality of context specifiers 230, a portion of an address translation data structure such as one or more page table data structures 235, and data and instructions 240. The MMU 205 includes a segmentation unit 245, a paging unit 250, and a cache 255. The cache 255 may store virtual-to-physical page mappings for recently accessed pages in a translation lookaside buffer (TLB).
The segmentation unit 245 is adapted to receive a memory access request for any client (e.g., Client—3) and generate a virtual address from the memory access request. The segmentation unit 245 and/or paging unit 250 then translates the virtual address to a physical address.
In one implementation, the virtual address is generated and translated to a physical address utilizing a given context specifier and a given mapping stored in a page table data structure 235 or cached 255 in the TLB. In another implementation, the virtual address is generated and translated to a physical address utilizing the given context specifier, thereby bypassing the page table data structure 235 and TLB 255. In addition or alternatively, the value of attributes specified in the given context specifier may or may not override attributes specified in the applicable page table entry of the page table data structure 235 or TLB 255 depending upon one or more conditions.
Referring now to
The PTE override indicator may also be used to specify whether the value of one or more attributes in the context specifier should override the corresponding attributes in the appropriate PTE or whether the value of the attributes specified in the appropriate PTE should be utilized when translating from the virtual address to the physical address and/or accessing the computing device-readable media at the physical address.
Referring now to
Referring now to
If the PTE override attribute of the context specifier 610 is set to a first state the virtual page number 630 may be combined with the adjustment 625 of the context specifier 610 to generate the physical page number 640 as depicted in
If the PTE override attribute is set to a second state, the virtual address 615 is translated using either a TLB 645 or a page table data structure 650. In particular, if a TLB 645 includes a valid virtual-to-physical page mapping for the virtual page number 630 (e.g., TLB hit) the appropriate physical page number 640 is output from the TLB 645. When the virtual page number 630 is mapped to a given physical page number 640 using the TLB 645, the attributes used in the address translation process and/or used in accessing the memory may be the attributes 630 contained in the TLB 645 or attributes contained in the context specifier 610.
If the TLB 645 does not include a valid mapping (e.g., TLB miss), the virtual address 615 is translated using the page table data structure 650. More specifically, the virtual page number 630 includes a page directory index 655 and a page table index 660. The page directory index 655 in the virtual address 615 is used to index a given page directory 665. The page directory entry (PDE) indexed by the page directory index 655 includes an address of a given page table 670. The page table index 660 in the virtual address 615 is used to index the given page table 670 located at the address specified in the PDE. The page table entry (PTE) indexed by the page table index 660 includes the physical page number 640. The resulting mapping 675 may then be cached in the TLB 645 for translating virtual addresses to physical addresses in subsequent memory access requests.
When the virtual page number 630 is translated to a given physical page number 640 using the page table data structure 650, the attributes 620 used in the address translation process and/or used in accessing the memory may be attributes specified in the given PDE and/or PTE, or attributes contained in the context specifier 610.
Referring now to
At 730, the state of the PTE override indicator in the given context specifier is checked. If the PTE override indicator is set to a first state the virtual address is translated to a physical address utilizing a page table data structure or TLB. More specifically, the virtual page number is translated to a physical page number using a given PTE contained in either the TLB or page table data structure, at 740. In addition, the translation of the virtual page number to the physical page number includes utilizing the value of one or more other attributes specified in the PTE.
If the PTE override indicator is set to a second state the virtual address is translated to a physical address utilizing the given context specifier. More specifically, a physical page number is generated utilizing the virtual page number and the adjustment specified in the given context specifier, at 750. In addition, the generation of the virtual page number directly to the physical page number includes utilizing the value of one or more attributes specified in the given context specifier. Accordingly the translation process bypasses use of the TLB and page table data structure.
At 760, the computing device-readable media at the physical address is accessed. For example, data received from a client may be stored in the computing device-readable media at the location within the physical page number specified by a byte index of the virtual address in response to a write request. In response to a read request, data stored at the byte index within the physical page number of the computing device-readable media can be retrieved for the client.
Generally, the computing device-readable media is accessed using a raw address instead of the physical address. The raw address may typically be specified in terms of column, bank, row and partition numbers. Referring now to
The translation of the virtual address to the physical address and the interpretation of the physical address to determine the raw address is performed in accordance with the attributes specified in the given context specifier, the attributes specified in the given PTE, or one or more attributes specified in the given PTE and one or more attributes specified in the given context specifier that override corresponding attributes in the given PTE. For example, a page kind attribute in the given context specifier and given PTE provide information on the organization of graphics data for use in interpreting the physical address to determine the raw address. Such formatting may include the number of bits used to store a particular type of data, the tile format and organization of data within a tile, whether data swizzling is performed, anti-aliasing attributes, fixed-point or floating-point data representation, access privileges and/or the like. For example, an attribute may be used to specify a packing mode used to store either z data or color data to optimize performance of raster operations (ROPs). In another example, an attribute may specify whether data is compressible or uncompressible.
Referring now to
More specifically, the virtual address may be translated to a physical address using a given PTE and the attributes specified in the given PTE, at 930. The attributes specified in the given PTE may also be utilized to service other aspects of the memory access request. For example, one or more attributes in the PTE may be utilized to interpret the raw address from the physical address, such as whether the data is compressed, packing, pixel processing and/or the like.
In another instance, the virtual address may be translated to a physical address using one or more attributes in the given PTE and one or more attributes in the given context specifier that override corresponding attributes in the given PTE, at 940. For example, a given attribute in the context specifier may be encoded such that one of the values indicates that the corresponding attribute value in the page table entry (PTE) is to be used. However, another attribute in the context specifier may be encoded with a particular attribute value and therefore the attribute in the context specifier overrides the attribute in the PTE. Thus, the attribute values in the PTE may be individually overridden by the corresponding attribute in the context specifier. In addition, a combination of one or more attributes specified in the given PTE and attributes specified in the given context specifier that override corresponding attributes in the given PTE may be utilized to service other aspects of the memory access request.
In yet another instance, the virtual address may be translated to a physical address using the given PTE and the attributes in the given context specifier, at 950. For example, a bit in a PTE override indicator may specify that the attributes in the context specifier override all corresponding attributes in the PTE. In such instance, the attributes specified in the given context specifier are also utilized to service other aspects of the memory access request. Accordingly the translation process bypasses use of the TLB and page table data structure.
At 960, the computing device-readable media at the physical address is accessed. For example, data received from a client may be stored in the computing device-readable media at the location within the physical page number specified by a byte index of the virtual address in response to a write request. In response to a read request, data stored at the byte index within the physical page number of the computing device-readable media can be retrieved for the client.
Again, the raw address (e.g., row, column, band and partition) for accessing the computing device-readable media may be interpreted from the physical address using one or more of the attributes in the context specifier, the PTE, or both. The attributes used to interpret the raw address from the physical address may for example specify the compression type for graphics data, the mode for storing graphics data in tiles across partitions, a packing mode for packing graphics data in tiles, a data swizzling mode used to swizzle tile data, a sample format for performing anti-aliasing, a mapping to a block-linear memory format, and the like. For example, the page kind attribute selects one of many available address mapping techniques for each page to improve locality of small-size accesses and therefore improve performance.
Referring now to
At 1040, the state of the PTE override indicator is checked. If the first bit of the PTE override flag is set to a given state the virtual address is translated to a physical address utilizing the given context specifier. More specifically, a physical page number is generated utilizing the virtual page number and the adjustment, at 1050. In addition, the translation of the virtual page number directly to the physical page number includes utilizing the value of the attributes specified in the context specifier. Accordingly the translation process bypasses use of the TLB and page table data structure.
If the first bit of the PTE override indicator is set to another state the virtual address is translated to a physical address utilizing a page table data structure or TLB. In addition, a second bit of the PTE override indicator may specify whether or not the value of the attributes contained in the context specifier override the corresponding attributes contained in the appropriate PDE and/or PTE of the TLB or page table data structure. More specifically, a TLB or page table data structure may be accessed, at 1060, using the virtual address to determine a given PTE. At 1070, the virtual address is translated to a physical address using the given PTE contained in either the TLB or page table data structure and attributes associated with the PTE, if the second bit of the PTE override indicator is set to a first state. If the second bit of the PTE override indicator is set to a second state, the virtual address is translated to a physical address using the given PTE contained in either the TLB or page table data structure and attributes associated with the given context specifier, at 1080. In one implementation, all of the attributes associated with the given context specifier override all of the attributes associated with the PTE. In another implementation, an encoded value of each particular attribute in the context specifier may indicate that the corresponding attribute value in the PTE is to be used instead. Thus, the attribute values in the PTE may be individually overridden by the corresponding attribute in the context specifier.
At 1090, the computing device-readable media at the physical address is accessed. For example, data received from a client may be stored in the computing device-readable media at the location within the physical page number specified by a byte index of the virtual address in response to a write request. In response to a read request, data stored at the byte index within the physical page number of the computing device-readable media can be retrieved for the client. Again, the raw address (e.g., row, column, band and partition) for accessing the computing device-readable media may be interpreted from the physical address using one or more of the attributes in the context specifier, the PTE, or both depending upon the state of the PTE override indicator or the corresponding encoded attribute value in the context specifier. The attributes used to interpret the raw address from the physical address may for example specify the compression type for graphics data, the mode for storing graphics data in tiles across partitions, a packing mode for packing graphics data in tiles, a data swizzling mode used to swizzle tile data, a sample format for performing anti-aliasing, a mapping to a block-linear memory format, and the like. The packing mode may for example specify a packing mode for storing Z data and stencil data together, for packing Z data, for packing color data, and the like.
Accordingly, embodiments of the present invention advantageously eliminate memory accesses, associated with determining a TLB hit or walking the page table data structure, by translating virtual addresses directly to physical addresses using context specifiers. Embodiments also allow the given context specifier, which is typically one per surface or data type, to override the underlying page attributes of the TLB or page table data structure as a whole or on an individual basis. Embodiments also allow pages to be shared across clients and/or data types with the context specifier being used to override the page table data structure or TLB to allow different attribute values.
For example, the context specifier override mechanism allows the MMU hardware to avoid fetching or caching page table entries for each page when mapping attributes, such as the page kind information, are specified by the context specifier structure itself. It is the responsibility of kernel/privileged software to take advantage of this capability when possible. The benefits of avoiding the fetch of every page table entry are: (1) reduced latency to fetch the desired data since the system does not need to wait for the page table entry to return from memory if it wasn't already cached; and (2) reduced storage for TLB entries. Thus, the page table fetches can be eliminated in the case of a surface for which the mapping is specified by the context specifier. This includes virtual-to-physical page mapping, and the page attributes including page kind. As such, the virtual-to-physical page mapping can be specified completely by the context specifier structure when it is a single contiguous mapping.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
3815101 | Boss et al. | Jun 1974 | A |
3950729 | Fletcher et al. | Apr 1976 | A |
4654790 | Woffinden | Mar 1987 | A |
4797814 | Brenza | Jan 1989 | A |
4812981 | Chan et al. | Mar 1989 | A |
5123094 | MacDougall | Jun 1992 | A |
5179669 | Peters | Jan 1993 | A |
5245702 | McIntyre et al. | Sep 1993 | A |
5278962 | Masuda et al. | Jan 1994 | A |
5414824 | Grochowski | May 1995 | A |
5446854 | Khalidi et al. | Aug 1995 | A |
5526504 | Hsu et al. | Jun 1996 | A |
5649102 | Yamauchi et al. | Jul 1997 | A |
5649184 | Hayashi et al. | Jul 1997 | A |
5696925 | Koh | Dec 1997 | A |
5949785 | Beasley | Sep 1999 | A |
5963984 | Garibay, Jr. et al. | Oct 1999 | A |
5999189 | Kajiya et al. | Dec 1999 | A |
6012132 | Yamada et al. | Jan 2000 | A |
6298390 | Matena et al. | Oct 2001 | B1 |
6362826 | Doyle et al. | Mar 2002 | B1 |
6457115 | McGrath | Sep 2002 | B1 |
6470428 | Milway et al. | Oct 2002 | B1 |
6499090 | Hill et al. | Dec 2002 | B1 |
6549997 | Kalyanasundharam | Apr 2003 | B2 |
6636223 | Morein | Oct 2003 | B1 |
6658538 | Arimilli et al. | Dec 2003 | B2 |
6742104 | Chauvel et al. | May 2004 | B2 |
6813699 | Belgard | Nov 2004 | B1 |
6823433 | Barnes et al. | Nov 2004 | B1 |
6839813 | Chauvel et al. | Jan 2005 | B2 |
6859208 | White | Feb 2005 | B1 |
6877077 | McGee et al. | Apr 2005 | B2 |
6883079 | Priborsky | Apr 2005 | B1 |
7007075 | Coffey | Feb 2006 | B1 |
7082508 | Khan et al. | Jul 2006 | B2 |
7107441 | Zimmer et al. | Sep 2006 | B2 |
7120715 | Chauvel et al. | Oct 2006 | B2 |
7159095 | Dale et al. | Jan 2007 | B2 |
7194597 | Willis et al. | Mar 2007 | B2 |
7234038 | Durrant | Jun 2007 | B1 |
7275246 | Yates, Jr. et al. | Sep 2007 | B1 |
7401358 | Christie et al. | Jul 2008 | B1 |
7447869 | Kruger et al. | Nov 2008 | B2 |
7519781 | Wilt | Apr 2009 | B1 |
7545382 | Montrym et al. | Jun 2009 | B1 |
20020004823 | Anderson et al. | Jan 2002 | A1 |
20020013889 | Schuster et al. | Jan 2002 | A1 |
20020169938 | Scott et al. | Nov 2002 | A1 |
20020172199 | Scott et al. | Nov 2002 | A1 |
20030014609 | Kissell | Jan 2003 | A1 |
20030167420 | Parsons | Sep 2003 | A1 |
20030196066 | Mathews | Oct 2003 | A1 |
20030236771 | Becker | Dec 2003 | A1 |
20040025161 | Chauvel et al. | Feb 2004 | A1 |
20040054833 | Seal et al. | Mar 2004 | A1 |
20040078778 | Leymann et al. | Apr 2004 | A1 |
20040153350 | Kim et al. | Aug 2004 | A1 |
20040193831 | Moyer | Sep 2004 | A1 |
20040215918 | Jacobs et al. | Oct 2004 | A1 |
20040268071 | Khan et al. | Dec 2004 | A1 |
20050050013 | Ferlitsch | Mar 2005 | A1 |
20050097280 | Hofstee et al. | May 2005 | A1 |
20050268067 | Lee et al. | Dec 2005 | A1 |
20060004984 | Morris et al. | Jan 2006 | A1 |
20060069879 | Inoue et al. | Mar 2006 | A1 |
20060069899 | Schoinas et al. | Mar 2006 | A1 |
20060187945 | Andersen | Aug 2006 | A1 |
20060195683 | Kissell | Aug 2006 | A1 |
20060230223 | Kruger et al. | Oct 2006 | A1 |
20060259732 | Traut et al. | Nov 2006 | A1 |
20060259825 | Cruickshank et al. | Nov 2006 | A1 |
20060282645 | Tsien | Dec 2006 | A1 |
20060288174 | Nace et al. | Dec 2006 | A1 |
20070067505 | Kaniyur et al. | Mar 2007 | A1 |
20070073996 | Kruger et al. | Mar 2007 | A1 |
20070106874 | Pan et al. | May 2007 | A1 |
20070126756 | Glasco et al. | Jun 2007 | A1 |
20070157001 | Ritzau | Jul 2007 | A1 |
20070168634 | Morishita et al. | Jul 2007 | A1 |
20070168643 | Hummel et al. | Jul 2007 | A1 |
20080263284 | da Silva et al. | Oct 2008 | A1 |
Number | Date | Country |
---|---|---|
02288927 | Nov 1990 | JP |
03054660 | Mar 1991 | JP |
04182858 | Jun 1992 | JP |
Entry |
---|
Harper et al., (Rapid recovery from transient Faults in the fault tolerant processor with fault-tolerant shared memory) 1990, IEEE, p. 350-359. |
Ooi, (Fault Tolerant Architecture in a cache memory control LSI), 1992, IEEE, 507-514 . |
Oracle, (Oracle 8i Parallel server), 1999, Oracle, Release 2 (8.1.6) 1-216. |
Shalan. (Dynamic Memory Management for embedded real-time multiprocessor system on a chip), 2000, ACM. 180-186. |
Shalan. (Dynamic Memory Management for embedded real-time multiprocessor system on a chip), 2003, Georgia Inst. Of Tech. 1-118. |
Wikipedia (Page Fault Definition), Wikipedia, Mar. 9, 2009, p. 1-4. |
PC Mag (Definition of: Page Fault) PC Mag, Mar. 27, 2009, p. 1-2. |
Osronline, (The Basics: So what is a page fault?) May 2003, p. 1-2. |
Final Office Action; Mail Date Nov. 20, 2009; U.S. Appl. No. 11/591,685. |
Non-Final OA Dated May 28, 2009, U.S. Appl. No. 11/523,830. |
Non-Final OA Dated Sep. 15, 2008; U.S. Appl. No. 11/523,830. |
Non-Final OA Dated Jan. 20, 2010; U.S. Appl. No. 11/586,756. |
Final OA Dated Jun. 4, 2009; U.S. Appl. No. 11/586,756. |
Non-Final OA Dated Nov. 18, 2008; U.S. Appl. No. 11/586,756. |
Non Final OA Dated Aug. 19, 2009; U.S. Appl. No. 11/591,857. |
Restriction Requirement Dated Apr. 27, 2009; U.S. Appl. No. 11/591,857. |
Restriction Requirement; Mail Date Apr. 28, 2009; U.S. Appl. No. 11/592,076. |
Non-Final OA Dated Oct. 29, 2008; U.S. Appl. No. 11/523,950. |
Notice of Allowance Dated Apr. 24, 2009; U.S. Appl. No. 11/523,950. |
Notice of Allowance Dated Sep. 3, 2009; U.S. Appl. No. 11/523,950. |
Notice of Allowance Dated Dec. 24, 2009; U.S. Appl. No. 11/523,950. |
Non-Final OA Dated Dec. 16, 2008; U.S. Appl. No. 11/586,826. |
Non-Final OA Dated Feb. 17, 2009; U.S. Appl. No. 11/592,819. |
Final OA Dated Nov. 9, 2009; U.S. Appl. No. 11/591,629. |
Non-Final OA Dated Feb. 20, 2009; U.S. Appl. No. 11/591,629. |
Final OA Dated Nov. 24, 2009; U.S. Appl. No. 11/592,780. |
Non-Final OA Dated Apr. 2, 2009; U.S. Appl. No. 11/592,780. |
Non-Final OA Dated Sep. 24, 2009; U.S. Appl. No. 11/588,177. |
Final OA Dated May 21, 2009; U.S. Appl. No. 11/588,177. |
Non-Final OA Dated Nov. 13, 2008; U.S. Appl. No. 11/588,177. |
Final OA Dated Dec. 8, 2009; U.S. Appl. No. 11/591,856. |
Non-Final OA Dated May 11, 2009; U.S. Appl. No. 11/591,856. |
Final Office Action, Dated Nov. 23, 2009; U.S. Appl. No. 11/592,106. |
Non Final Office Action, Dated Apr. 1, 2009; U.S. Appl. No. 11/592,106. |
Non Final Office Action; Mail Date Apr. 27, 2009; U.S. Appl. No. 11/591,685. |
Notice of Allowance; Mail Date Jan. 29, 2010; U.S. Appl. No. 11/592,076. |
Final Office Action; Mail Date Mar. 16, 2010; U.S. Appl. No. 11/523,830. |
Restriction Requirement; Mail Date Apr. 27, 2009; U.S. Appl. No. 11/591,857. |
Notice of Allowance; Mail Date Jun. 22, 2009; U.S. Appl. No. 11/586,826. |
Notice of Allowance; Mail Date Dec. 14, 2009; U.S. Appl. No. 11/586,826. |
Non Final Office Action; Mail Date Mar. 17, 2010; U.S. Appl. No. 11/592,819. |
Notice of Allowance; Mail Date Jan. 19, 2010; U.S. Appl. No. 11/592,819. |
PCMAG (Definition of: Page fault) PCMag, 1 Page; Mar. 2009. |
Non Final Office Action; Mail Date Aug. 19, 2009; U.S. Appl. No. 11/592,076. |
Wikipedia, (Page Fault definition) Wikipedia, pp. 1-4 ; Mar. 2009. |
Chaudhuri, “The impact of NACKs in shared memory scientific applications”, Feb. 2004, IEEE, IEEE Transactions on Parallel and distributed systems vol. 15, No. 2, p. 134-150. |
Laibinis, “Formal Development of Reactive Fault Tolerant Systems”, Sep. 9, 2005, Springer, Second International Workshop, Rise 2005, p. 234-249. |
Wikipedia, Memory Address, Oct. 29, 2010, pp. 1-4, www.wikipedia.com. |
Wikipedia, Physical Address, Apr. 17, 2010, pp. 1-2, www.wikipedia.com. |
Non Final Office Action, Mail Date May 11, 2010, U.S. Appl. No. 11/591,685. |
Final Office Action, Mail Date Oct. 27, 2010, U.S. Appl. No. 11/591,685. |
Restriction, Mail Dated Apr. 28, 2009, U.S. Appl. No. 11/592,076. |
Notice of Allowance, Mail Date Jan. 29, 2010, U.S. Appl. No. 11/592,076. |
Notice of Allowance, Mail Date May 4, 2010, U.S. Appl. No. 11/592,076. |
Notice of Allowance, Mail Date Aug. 13, 2010, U.S. Appl. No. 11/592,076. |
Notice of Allowance, Mail Date Nov. 26, 2010, U.S. Appl. No. 11/592,076. |
Restriction Dated Aug. 10, 2010; U.S. Appl. No. 12/650,068. |
Final Office Action Dated Mar. 16, 2010; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Jun. 28, 2010; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Sep. 2, 2010; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Jan. 20, 2011; U.S. Appl. No. 11/523,830. |
Final Office Action Dated Aug. 1, 2010; U.S. Appl. No. 11/586,756. |
Notice of Allowance Dated Dec. 27, 2010; U.S. Appl. No. 11/586,756. |
Restriction Dated Apr. 27, 2009; U.S. Appl. No. 11/591,857. |
Office Action Dated Dec. 7, 2010; U.S. Appl. No. 11/591,857. |
Final Office Action Dated Jun. 25, 2010; U.S. Appl. No. 11/592,106. |
Office Action Dated Dec. 16, 2010; U.S. Appl. No. 11/592,106. |
Office Action Dated Sep. 19, 2008; U.S. Appl. No. 11/523,926. |
Final Office Action Dated Apr. 10, 2009; U.S. Appl. No. 11/523,926. |
Office Action Dated Oct. 1, 2009; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Mar. 29, 2010; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Jul. 9, 2010; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Oct. 27, 2010; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Jul. 21, 2010; U.S. Appl. No. 11/523,950. |
Notice of Allowance Dated Nov. 3, 2010; U.S. Appl. No. 11/523,950. |
Notice of Allowance Dated Jun. 22, 2009; U.S. Appl. No. 11/586,950. |
Notice of Allowance Dated Dec. 14, 2009; U.S. Appl. No. 11/586,950. |
Notice of Allowance Dated Oct. 16, 2009; U.S. Appl. No. 11/592,819. |
Office Action Dated Mar. 17, 2010; U.S. Appl. No. 11/592,819. |
Notice of Allowance Dated Nov. 23, 2010; U.S. Appl. No. 11/592,819. |
Office Action Dated May 27, 2010; U.S. Appl. No. 11/591,629. |
Office Action Dated Nov. 3, 2010; U.S. Appl. No. 11/591,629. |
Office Action Dated Apr. 28, 2010; U.S. Appl. No. 11/592,780. |
Office Action Dated Oct. 13, 2010; U.S. Appl. No. 11/592,780. |
Final Office Action Dated Apr. 27, 2010; U.S. Appl. No. 11/255,177. |
Office Action Dated Apr. 27, 2010; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Nov. 12, 2010; U.S. Appl. No. 11/591,856. |
Notice of Allowance Mailed May 5, 2011; U.S. Appl. No. 11/523,830. |
Notice of Allowance Mailed May 12, 2011; U.S. Appl. No. 11/586,756. |
Notice of Allowance Mailed Mar. 18, 2011; U.S. Appl. No. 11/591,857. |
Final Office Action Mailed Jun. 8, 2011; U.S. Appl. No. 11/591,629. |
Notice of Allowance Mailed Mar. 9, 2011; U.S. Appl. No. 11/591,856. |
Non-Final Office Action; Mail Date: May 6, 2011; U.S. Appl. No. 11/591,685. |
Notice of Allowance; Mail Date: Mar. 17, 2011; U.S. Appl. No. 11/592,076. |
Notice of Allowance; Mail Date: Jun. 29, 2011; U.S. Appl. No. 11/592,076. |
Final Office Action; Mail Date: Feb. 1, 2011; U.S. Appl. No. 12/650,068. |
Non-Final Office Action; Mail Date: Aug. 9, 2011; U.S. Appl. No. 12/650,068. |
Notice of Allowance; Mail Date: Jul. 21, 2011; U.S. Appl. No. 11/523,830. |
Notice of Allowance; Mail Date: Aug. 25, 2011; U.S. Appl. No. 11/586,756. |
Final Office Action; Mail Date: May 4, 2011; U.S. Appl. No. 11/591,857. |
Notice of Allowance; Mail Date: Jul. 21, 2011; U.S. Appl. No. 11/591,857. |
Final Office Action; Mail Date: Jul. 5, 2011; U.S. Appl. No. 11/592,106. |
Notice of Allowance; Mail Date: Feb. 3, 2011; U.S. Appl. No. 11/523,926. |
Notice of Allowance; Mail Date: May 23, 2011; U.S. Appl. No. 11/523,926. |
Notice of Allowance; Mail Date: Aug. 23, 2011; U.S. Appl. No. 11/523,926. |
Notice of Allowance; Mail Date: Jun. 9, 2011; U.S. Appl. No. 11/523,950. |
Notice of Allowance; Mail Date: Aug. 30, 2011; U.S. Appl. No. 11/523,950. |
Notice of Allowance; Mail Date: Feb. 16, 2011; U.S. Appl. No. 11/586,826. |
Notice of Allowance; Mail Date: Jul. 26, 2011; U.S. Appl. No. 11/586,826. |
Notice of Allowance; Mail Date: Apr. 19, 2011; U.S. Appl. No. 11/592,819. |
Notice of Allowance; Mail Date: Sep. 7, 2011; U.S. Appl. No. 11/592,819. |
Final Office Action; Mail Date: Apr. 12, 2011; U.S. Appl. No. 11/592,780. |
Non-Final Office Action; Mail Date: Jun. 7, 2011; U.S. Appl. No. 11/588,177. |
Notice of Allowance; Mail Date: Jun. 17, 2011; U.S. Appl. No. 11/591,856. |
Final Office Action Mailed Nov. 16, 2011; U.S. Appl. No. 11/591,685. |
Notice of Allowance Mailed Oct. 14, 2011; U.S. Appl. No. 11/592,076. |
Non-Final Office Action Mailed Nov. 16, 2011; U.S. Appl. No. 12/650,068. |
Notice of Allowance Mailed Oct. 26, 2011; U.S. Appl. No. 11/523,830. |
Notice of Allowance Mailed Jan. 13, 2012; U.S. Appl. No. 11/586,756. |
Notice of Allowance Mailed Oct. 28, 2011; U.S. Appl. No. 11/591,857. |
Non-Final Office Action Mailed Dec. 2, 2011; U.S. Appl. No. 11/592,106. |
Notice of Allowance Mailed Oct. 28, 2011; U.S. Appl. No. 11/523,926. |
Notice of Allowance Mailed Nov. 14, 2011; U.S. Appl. No. 11/523,950. |
Notice of Allowance Mailed Dec. 27, 2011; U.S. Appl. No. 11/586,826. |
Notice of Allowance Mailed Dec. 9, 2011; U.S. Appl. No. 11/592,819. |
Non-Final Office Action Mailed Nov. 1, 2011; U.S. Appl. No. 11/592,780. |
Final Office Action Mailed Nov. 29, 2011; U.S. Appl. No. 11/588,177. |
Notice of Allowance Dated May 30, 2012; U.S. Appl. No. 11/591,685. |
Notice of Allowance Dated May 15, 2012; U.S. Appl. No. 11/586,756. |
Notice of Allowance Dated Feb. 22, 2012; U.S. Appl. No. 11/591,685. |
Notice of Allowance Dated May 10, 2012; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Jul. 6, 2012; U.S. Appl. No. 12/650,068. |
Notice of Allowance Dated May 25, 2012; U.S. Appl. No. 11/591,857. |
Final Office Action Dated May 10, 2012; U.S. Appl. No. 11/592,106. |
Notice of Allowance Dated Jun. 1, 2012; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Jul. 5, 2012; U.S. Appl. No. 11/586,826. |
Guelfi et al., (Rapid Integration of Software Engineering Techniques) 2005, Second International Workshop, 9 pages. |
Final Office Action Dated May 7, 2012; U.S. Appl. No. 11/592,780. |
Notice of Allowance Dated Apr. 12, 2012; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Jun. 7, 2012; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Jun. 7, 2012; U.S. Appl. No. 11/592,819. |
Notice of Allowance Dated Jan. 5, 2012; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Jan. 27, 2012; U.S. Appl. No. 11/592,076. |
Notice of Allowance Dated May 10, 2012; U.S. Appl. No. 11/592,076. |
Notice of Allowance Dated Sep. 26, 2011; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Feb. 2, 2012; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated May 1, 2012; U.S. Appl. No. 12/650,068. |
Notice of Allowance Dated Feb. 24, 2012; U.S. Appl. No. 11/523,926. |
Notice of Allowance Dated Feb. 10, 2012; U.S. Appl. No. 11/591,857. |
Notice of Allowance mailed Feb. 22, 2010; U.S. Appl. No. 11/591,685. |
Notice of Allowance mailed Jan. 27, 2012; U.S. Appl. No. 11/592,076. |
Notice of Allowance mailed Feb. 2, 2012; U.S. Appl. No. 11/523,830. |
Notice of Allowance mailed Feb. 10, 2012; U.S. Appl. No. 11/591,857. |
Notice of Allowance mailed Feb. 24, 2012; U.S. Appl. No. 11/523,926. |
Notice of Allowance mailed Sep. 26, 2011; U.S. Appl. No. 11/591,856. |
Notice of Allowance mailed Jan. 5, 2012; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Sep. 26, 2012; U.S. Appl. No. 11/591,685. |
Notice of Allowance Dated Sep. 17, 2012; U.S. Appl. No. 12/650,068. |
Notice of Allowance Dated Aug. 16, 2012; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Sep. 18, 2012; U.S. Appl. No. 11/591,857. |
Notice of Allowance Dated Sep. 12, 2012; U.S. Appl. No. 11/523,830. |
Notice of Allowance Dated Aug. 29, 2012; U.S. Appl. No. 11/592,819. |
Office Action Dated Sep. 14, 2012; U.S. Appl. No. 11/591,629. |
Notice of Allowance Dated Sep. 14, 2012; U.S. Appl. No. 11/588,177. |
Notice of Allowance Dated Sep. 17, 2012; U.S. Appl. No. 11/591,856. |
Notice of Allowance Dated Sep. 12, 2012; U.S. Appl. No. 11/523,926. |
Number | Date | Country | |
---|---|---|---|
20070126756 A1 | Jun 2007 | US |