The disclosure relate generally to a storage system, and more particularly to systems and methods for memory protection for computational storage devices, notably, for dynamic memory protections for program executions in a multi-tenant environment using computational storage devices.
The present background section is intended to provide context only, and the disclosure of any concept in this section does not constitute an admission that said concept is prior art.
With advances in technology, the size and amount of data is increasing rapidly as data is collected by devices such as mobile devices, Internet of things devices, aerial (remote sensing) devices, software logs, cameras, microphones, radio-frequency identification (RFID) readers, wireless sensor networks, and the like. To process and use information represented by the collected data, storage devices, processing elements, and servers are often used in datacenters to filter, compute, store, and perform related operations on the data. A need remains for systems and methods that improve computational functions in storage devices.
The above information disclosed in this Background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art.
In various embodiments, described herein include systems, methods, and apparatuses for memory protection for computation storage devices. In various aspects, the disclosed systems describe a system for managing memory, the system including: a controller, one or more computational resources, and one or more memory resources. Further, the system can be configured to receive a command specifying an amount of computational resources and an amount of memory resources associated with a program. The system can process the command by the controller, where the processing can include dynamically assigning a portion of the one or more computational resources and assigning a portion of the one or more memory resources based on the command for use by the program. In other aspects, the command can specify that the portion of the one or more memory resources is restricted from access. In one aspect, the system determines that the program attempts to access a region of the one or more memory resources different from the assigned portion of the one or more memory resources and the system stops execution of the program. In some aspects, the one or more memory resources can include one or more local memory namespaces. In other aspects, the system can further include one or more storage resources including one or more storage namespaces. In one aspects, the program is a first program in a multi-tenant environment comprising at least a second program. In other aspects, the command can be based on a protocol, the protocol including non-volatile memory express (NVMe). In an aspect, the one or more computational resources can include a computational resource comprising at least one of a central processing unit (CPU), a graphical processing unit (GPU), a field-programmable gate array (FPGA), a tensor processing unit (TPU), or an application-specific integrated circuit (ASIC). In some aspects, the computational storage device can include a non-volatile memory express (NVMe) enabled storage device.
A corresponding method, device, and computer-readable medium is described.
As noted, the disclosed mechanisms can be applied to a computational storage device (e.g., a storage device having a processing functionality) and related systems. In other aspects, the disclosed systems can be used in connection with any suitable storage device such a non-volatile memory express (NVMe), an NVMe-over fabric (NVMe-oF), and/or non-NVMe solid state drives (SSDs). Further, the disclosed systems and methods can be standardized and applied to a range of storage devices and related systems while being agnostic to vendor.
The above-mentioned aspects and other aspects of the present techniques will be better understood when the present application is read in view of the following figures in which like numbers indicate similar or identical elements. Further, the drawings provided herein are for purpose of illustrating certain embodiments only; other embodiments, which may not be explicitly illustrated, are not excluded from the scope of this disclosure.
These and other features and advantages of the present disclosure will be appreciated and understood with reference to the specification, claims, and appended drawings wherein:
While the present techniques are susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described. The drawings may not be to scale. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the present techniques to the particular form disclosed, but to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present techniques as defined by the appended claims.
The details of one or more embodiments of the subject matter described herein are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages of the subject matter will become apparent from the description, the drawings, and the claims.
Various embodiments of the present disclosure now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments are shown. Indeed, the disclosure may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. The term “or” is used herein in both the alternative and conjunctive sense, unless otherwise indicated. The terms “illustrative” and “example” are used to be examples with no indication of quality level. Like numbers refer to like elements throughout. Arrows in each of the figures depict bi-directional data flow and/or bi-directional data flow capabilities. The terms “path,” “pathway” and “route” are used interchangeably herein.
Embodiments of the present disclosure may be implemented in various ways, including as computer program products that comprise articles of manufacture. A computer program product may include a non-transitory computer-readable storage medium storing applications, programs, program components, scripts, source code, program code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like (also referred to herein as executable instructions, instructions for execution, computer program products, program code, and/or similar terms used herein interchangeably). Such non-transitory computer-readable storage media include all computer-readable media (including volatile and non-volatile media).
In one embodiment, a non-volatile computer-readable storage medium may include a floppy disk, flexible disk, hard disk, solid-state storage (SSS) (for example a solid-state drive (SSD)), solid state card (SSC), solid state module (SSM), enterprise flash drive, magnetic tape, or any other non-transitory magnetic medium, and/or the like. A non-volatile computer-readable storage medium may also include a punch card, paper tape, optical mark sheet (or any other physical medium with patterns of holes or other optically recognizable indicia), compact disc read only memory (CD-ROM), compact disc-rewritable (CD-RW), digital versatile disc (DVD), Blu-ray disc (BD), any other non-transitory optical medium, and/or the like. Such a non-volatile computer-readable storage medium may also include read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), flash memory (for example Serial, NAND, NOR, and/or the like), multimedia memory cards (MMC), secure digital (SD) memory cards, SmartMedia cards, CompactFlash (CF) cards, Memory Sticks, and/or the like. Further, a non-volatile computer-readable storage medium may also include conductive-bridging random access memory (CBRAM), phase-change random access memory (PRAM), ferroelectric random-access memory (FeRAM), non-volatile random-access memory (NVRAM), magnetoresistive random-access memory (MRAM), resistive random-access memory (RRAM), Silicon-Oxide-Nitride-Oxide-Silicon memory (SONOS), floating junction gate random access memory (FJG RAM), Millipede memory, racetrack memory, and/or the like.
In one embodiment, a volatile computer-readable storage medium may include random access memory (RAM), dynamic random access memory (DRAM), static random access memory (SRAM), fast page mode dynamic random access memory (FPM DRAM), extended data-out dynamic random access memory (EDO DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), double data rate type two synchronous dynamic random access memory (DDR2 SDRAM), double data rate type three synchronous dynamic random access memory (DDR3 SDRAM), Rambus dynamic random access memory (RDRAM), Twin Transistor RAM (TTRAM), Thyristor RAM (T-RAM), Zero-capacitor (Z-RAM), Rambus in-line memory component (RIMM), dual in-line memory component (DIMM), single in-line memory component (SIMM), video random access memory (VRAM), cache memory (including various levels), flash memory, register memory, and/or the like. It will be appreciated that where embodiments are described to use a computer-readable storage medium, other types of computer-readable storage media may be substituted for or used in addition to the computer-readable storage media described above.
As should be appreciated, various embodiments of the present disclosure may also be implemented as methods, apparatus, systems, computing devices, computing entities, and/or the like. As such, embodiments of the present disclosure may take the form of an apparatus, system, computing device, computing entity, and/or the like executing instructions stored on a computer-readable storage medium to perform certain steps or operations. Thus, embodiments of the present disclosure may also take the form of an entirely hardware embodiment, an entirely computer program product embodiment, and/or an embodiment that comprises combination of computer program products and hardware performing certain steps or operations.
Embodiments of the present disclosure are described below with reference to block diagrams and flowchart illustrations. Thus, it should be understood that each block of the block diagrams and flowchart illustrations may be implemented in the form of a computer program product, an entirely hardware embodiment, a combination of hardware and computer program products, and/or apparatus, systems, computing devices, computing entities, and/or the like carrying out instructions, operations, steps, and similar words used interchangeably (for example the executable instructions, instructions for execution, program code, and/or the like) on a computer-readable storage medium for execution. For example, retrieval, loading, and execution of code may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time. In some example embodiments, retrieval, loading, and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together. Thus, such embodiments can produce specifically-configured machines performing the steps or operations specified in the block diagrams and flowchart illustrations. Accordingly, the block diagrams and flowchart illustrations support various combinations of embodiments for performing the specified instructions, operations, or steps.
In various respects, computational storage can significantly impact the way in which storage devices (such as non-volatile memory express (NVMe) enabled storage devices) function and operate. With the addition of compute made available by the CS devices, various compute operations may be offloaded from hosts to the storage device where the data resides. Since compute is performed on a given data, some models fetch the data either from the storage medium or network resource into host's memory and then let the CPU run a compute operation on the data (e.g., finding the count of all zip codes that have trending virus infection). This method becomes limiting since data has to cross the fabric, be it direct attached PCIe bus or the network fabric which adds latencies.
Additionally, if multiple such devices are engaged, the total throughput will be lower per device than when a single device is engaged since the bus may not be able to avail the total performance provided by NVMe devices. Computational storage enables running compute near storage, thereby saving on the transfer latencies. Also, only the results of the operations need to be copied as opposed to source data which may be very large in certain use-cases. There are multiple benefits with computational storage (CS) that may be derived based on the use-case. CS devices derive their compute through embedded CPU, dedicated ASIC, FPGA, GPU, and so forth. Some compute may be done more efficiently with a CS device while others may be better off with the host CPU.
CS-enabled devices run programs that contain specific algorithms within the device. These programs may be prebuilt at the time of manufacture or may be downloaded at a later time by the host user. These programs will be executed by the host user against data and the results based on the program may be serviced.
In some aspects, storage devices with processing capabilities can provide near data processing via computational storage (CS) operations including CS command processing within the device. In some respects, the CS command processing may be done at least partially by a host CPU, the CS storage device, or another compute device since configuration and applicability can vary. In some aspects, a compute program can run a compute operation for data provided as input and the compute program can provide, as output, results of the compute operation. In some aspects, such programs may be included in the host CPU as a software program, or can be included in the CS device (e.g., in a processing element) as a software program or as a hardware program.
In some aspects, programs/functions may be built differently for in-device execution targeting the compute type (e.g., an FPGA bitfile for FPGA-based compute, an eBPF program for embedded CPUs, a C/C++ language based program, and the like). Further, program execution and data processing can depend on the algorithm(s) the CS device runs and the amount of data the CS device can consume. In some respects, a host application may be setup to use these device programs to offload, into the CS device, the compute and memory resources usually taken by the host.
Further, the amount of CS device memory required and consumed by the executing program for a given task may not always be known in advance and may be due to the dynamic nature of the data being processed (e.g., incoming object data of varied sizes). In some respects, pre-allocating device memory in advance of data processing may not be viable as device memory may be a limited resource that may get exhausted. The CS device may provide device memory protections for the executing program to access those particular memory regions. Further, memory protections may be required when programs execute in a multi-tenant environment so that data is secure between programs.
Some mechanisms for memory protection defined may deal with pre-allocated memory and not dynamic memory usage. This may limit the ability to provide data protection across executing programs for a CS device in a multi-tenant environment. Embodiments of the disclosure support dynamic device memory usage-based protections for executing programs for computational storage. The mechanism can include dynamic memory protections based on memory usage used in conjunction with an executing program in a CS capable device.
In some respects, embodiments of the disclosure can include systems and methods that specify memory regions for use in a command (e.g., in an NVMe execute program command). In another aspect, the disclosed systems can include one or more memory regions associated with the execute command. Further, the disclosed systems can specify memory regions for protection in a multi-tenant environment. In some aspects, the disclosed systems can include a mechanism whereby the provided memory regions may be applied by the device to restrict executing program access only to specified device memory regions. In some respects, such a memory protection can restrict the use of the specified memory regions by unauthorized entities including peer-to-peer (P2P) devices, load/store devices, another host, and/or a program running on a separate device or a different container/virtual machine.
In some respects, the disclosed systems can include a method to include the memory regions and programs parameter data in the host data pointer buffer. In other aspects, the disclosed systems can include a mechanism that does not require administrative privileges (privileged user) to specify memory regions. In other aspects, the disclosed systems include a computational namespace that supports executing programs with dynamic memory protection enabled. Further, the disclosed systems can permit device to pause and stop further execution of the program if it accesses memory regions outside the protection specified in a command (e.g., in the execute command).
In various aspects, the disclosed systems can include a program that runs on the host that facilitates building the dynamic memory ranges for program access using one or more APIs. The APIs can be used for interfacing with the execution of the program that facilitates dynamic memory range-based protection for the programs. The systems and methods are compatible with and can co-exist with existing storage protocols (e.g., NVMe, CS standards). Further, the disclosed systems can be executed on storage devices (e.g., solid state drives, SSDs), and those storage devices having computational capabilities.
Overall, the disclosed systems provide the ability to specify dynamic memory protections for executing a program in a CS-capable storage device including an NVMe-compatible device which can enable dynamic memory usage protections to the device. Further, the disclosed systems enable memory protections in a multi-tenant environment thereby extending supported compute and algorithm types.
Processor 110 may be coupled to memory 115. Memory 115 may be any variety of memory, such as flash memory, Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Persistent Random Access Memory, Ferroelectric Random Access Memory (FRAM), or Non-Volatile Random Access Memory (NVRAM), such as Magnetoresistive Random Access Memory (MRAM) etc. Memory 115 may also be any desired combination of different memory types, and may be managed by memory controller 125. Memory 115 may be used to store data that may be termed “short-term”: that is, data not expected to be stored for extended periods of time. Examples of short-term data may include temporary files, data being used locally by applications (which may have been copied from other storage locations), and the like.
Processor 110 and memory 115 may also support an operating system under which various applications may be running. These applications may issue requests (which may also be termed commands) to read data from or write data to either memory 115 or storage device 120. Storage device 120 may be accessed using device driver 130.
Storage device 120 may be associated with computational storage unit 135. As discussed below with reference to
In addition, the connection between storage device 120 and paired computational storage unit 135 might enable the two devices to communicate, but might not enable one (or both) devices to work with a different partner: that is, storage device 120 might not be able to communicate with another computational storage unit, and/or computational storage unit 135 might not be able to communicate with another storage device. For example, storage device 120 and paired computational storage unit 135 might be connected serially (in either order) to a fabric such as a bus, enabling computational storage unit 135 to access information from storage device 120 in a manner another computational storage unit might not be able to achieve.
Processor 110 and storage device 120 may be connected to a fabric. The fabric may be any fabric along which information may be passed. The fabric may include fabrics that may be internal to machine 105, and which may use interfaces such as Peripheral Component Interconnect Express (PCIe), Serial AT Attachment (SATA), Small Computer Systems Interface (SCSI), among others. The fabric may also include fabrics that may be external to machine 105, and which may use interfaces such as Ethernet, InfiniBand, or Fibre Channel, among others. In addition, the fabric may support one or more protocols, such as Non-Volatile Memory (NVM) Express (NVMe), NVMe over Fabrics (NVMe-oF), or Simple Service Discovery Protocol (SSDP), among others. Thus, the fabric may be thought of as encompassing both internal and external networking connections, over which commands may be sent, either directly or indirectly, to storage device 120 (and more particularly, the computational storage unit associated with storage device 120).
While
While
The host may be implemented with any type of apparatus that may be configured as a host including, for example, a server such as a compute server, a storage server, storage node, a network server, and/or the like, a computer such as a workstation, a personal computer, a tablet, a smartphone, and/or the like, or any combination thereof. The device may be implemented with any type of apparatus that may be configured as a device including, for example, an accelerator device, a storage device, a network device, a memory expansion and/or buffer device, a graphics processing unit (GPU), a neural processing unit (NPU), a tensor processing unit (TPU), and/or the like, or any combination thereof.
Any communication between devices (e.g., host, CS device, and/or any intermediary device) can occur over an interface that may be implemented with any type of wired and/or wireless communication medium, interface, protocol, and/or the like including PCIe, NVMe, Ethernet, NVMe-oF, Compute Express Link (CXL), and/or a coherent protocol such as CXL.mem, CXL.cache, CXL.IO and/or the like, Gen-Z, Open Coherent Accelerator Processor Interface (OpenCAPI), Cache Coherent Interconnect for Accelerators (CCIX), Advanced extensible Interface (AXI) and/or the like, or any combination thereof, Transmission Control Protocol/Internet Protocol (TCP/IP), FibreChannel, InfiniBand, Serial AT Attachment (SATA), Small Computer Systems Interface (SCSI), Serial Attached SCSI (SAS), iWARP, any generation of wireless network including 2G, 3G, 4G, 5G, and/or the like, any generation of Wi-Fi, Bluetooth, near-field communication (NFC), and/or the like, or any combination thereof. In some embodiments, the communication interfaces may include a communication fabric including one or more links, buses, switches, hubs, nodes, routers, translators, repeaters, and/or the like. In some embodiments, the system illustrated herein may include one or more additional apparatus having one or more additional communication interfaces.
In an embodiment in which the device is implemented as a storage device, the storage device may include any type of nonvolatile storage media based, for example, on solid state media (e.g., a solid state drive (SSD)), magnetic media (e.g., a hard disk drive (HDD)), optical media, and/or the like, or any combination thereof. For example, in some embodiments, a storage device may be implemented as an SSD based on not-AND (NAND) flash memory, persistent memory such as cross-gridded nonvolatile memory, memory with bulk resistance change, phase change memory (PCM), and/or the like, or any combination thereof. Any such storage device may be implemented in any form factor such as 3.5 inch, 2.5 inch, 1.8 inch, M.2, Enterprise and Data Center SSD Form Factor (EDSFF), NF1, and/or the like, using any connector configuration such as SATA, SCSI, SAS, U.2, M.2, and/or the like. Any such storage device may be implemented entirely or partially with, and/or used in connection with, a server chassis, server rack, dataroom, datacenter, edge datacenter, mobile edge datacenter, and/or any combinations thereof.
Any of the functionality described herein, including any of the host functionality, device functionally, and/or the like, may be implemented with hardware, software, firmware, or any combination thereof including, for example, hardware and/or software combinational logic, sequential logic, timers, counters, registers, state machines, volatile memories such as dynamic random access memory (DRAM) and/or static random access memory (SRAM), nonvolatile memory including flash memory, persistent memory such as cross-gridded nonvolatile memory, memory with bulk resistance change, phase change memory (PCM), and/or the like and/or any combination thereof, complex programmable logic devices (CPLDs), field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs) CPUs including complex instruction set computer (CISC) processors such as x86 processors and/or reduced instruction set computer (RISC) processors such as RISC-V and/or ARM processors), graphics processing units (GPUs), neural processing units (NPUs), tensor processing units (TPUs) and/or the like, executing instructions stored in any type of memory. In some embodiments, one or more components may be implemented as a system-on-chip (SOC).
Computational device 310-1 may be paired with storage device 305. Computational device 310-1 may include any number (one or more) processors 330, which may offer one or more services 335-1 and 335-2. To be clearer, each processor 330 may offer any number (one or more) services 335-1 and 335-2 (although embodiments of the disclosure may include computational device 310-1 including exactly two services 335-1 and 335-2). Each processor 330 may be a single core processor or a multi-core processor. Computational device 310-1 may be reachable across queue pairs 340, which may be used for both management of computational device 310-1 and/or to control I/O of computational device 310-1
Processor(s) 330 may be thought of as near-storage processing: that is, processing that is closer to storage device 305 than processor 110 of
While
Services 335-1 and 335-2 may offer a number of different functions (e.g., CSFs) that may be executed on data stored in storage device 305. For example, services 335-1 and 335-2 may offer pre-defined functions, such as encryption, decryption, compression, and/or decompression of data, erasure coding, and/or applying regular expressions. Or, services 335-1 and 335-2 may offer more general functions, such as data searching and/or SQL functions. Services 335-1 and 335-2 may also support running application-specific code. That is, the application using services 335-1 and 335-2 may provide custom code to be executed using data on storage device 305. Services 335-1 and 335-2 may also any combination of such functions. Table 1 lists some examples of services that may be offered by processor(s) 330.
Processor(s) 330 (and, indeed, computational device 310-1) may be implemented in any desired manner. Example implementations may include a local processor, such as Central Processing Unit (CPU) or some other processor, a Graphics Processing Unit (GPU), a General Purpose GPU (GPGPU), a Data Processing Unit (DPU), a Tensor Processing Unit (TPU), or a Neural Processing Unit (NPU), among other possibilities. Processor(s) 330 may also be implemented using a Field Programmable Gate Array (FPGA) or an Application-Specific Integrated Circuit (ASIC), among other possibilities. If computational device 310-1 includes more than one processor 330, each processor may be implemented as described above. For example, computational device 310-1 might have one each of CPU, TPU, and FPGA, or computational device 310-1 might have two FPGAs, or computational device 310-1 might have two CPUs and one ASIC, etc.
Depending on the desired interpretation, either computational device 310-1 or processor(s) 330 may be thought of as a computational storage unit.
Whereas
In yet another variation shown in
In addition, processor(s) 330 may have proxied storage access 350 to storage 320-1. Thus, instead of routing access requests through controller 315, processor(s) 330 may be able to directly access the data from storage 320-1.
In
Finally,
Because computational device 310-4 may include more than one storage element 320-1 through 320-4, computational device 310-4 may include array controller 355. Array controller 355 may manage how data is stored on and retrieved from storage elements 320-1 through 320-4. For example, if storage elements 320-1 through 320-4 are implemented as some level of a Redundant Array of Independent Disks (RAID), array controller 355 may be a RAID controller. If storage elements 320-1 through 320-4 are implemented using some form of Erasure Coding, then array controller 355 may be an Erasure Coding controller.
The compute namespace 406 can include a representation of an abstraction of one or more compute engines (CEs such as CE0, CE1, and CE2 shown in diagram 400) that run programs (e.g., program 0 in diagram 400). The compute namespace can include additional resources such as the actual compute modules specified as compute engines (CE) and programs. Compute engine resources may consist of one or more processing elements such as CPUs, ASICs, FPGAs, GPUS, TPUs, and/or the like. For example, a compute namespace 406 may include a CPU core which can be additionally paired with an FPGA. The utilization of each of these resources does not need to be exclusive. A CPU core may be reused/mapped to another compute namespace too and similarly for the ASIC and so forth. The namespace abstraction can allow for the selective exposure of hardware specifics of the compute resources (i.e., the host does not get exposed to a CPU or FPGA directly and instead interfaces with a virtualized compute namespace).
Computational programs can run on CEs and can process data that is made available through device local memory or streamed directly to the CEs. These programs can, in some aspects, permit computational storage for NVMe devices. Different usage models can be used to manage and use the CS feature made available in the device. The compute resource can be presented as a namespace, where it may be mapped directly into a virtual environment of a virtual machine if needed.
In some aspects, as noted, the disclosed embodiments can include systems and methods for protecting device memory in a multi-tenant environment. The memory namespace 408 can include device memory that can be referred to as subsystem local memory (SLM) for NVMe. Further, such SLM can represent a scarce resource (i.e., only a certain amount of memory may be installed and made available to the host). Such scarcity of memory can be due to various factors including device form factor, power consumption, cost, and market applicability. For example, the device 402 may be populated only with 8 GB of DRAM while the host system may be capable of 1 TB of DRAM. The device memory (e.g., the SLM) can be used by programs that run on the device as part of computational storage and provide performance, power and cost savings as compared with the case of the programs running entirely on the host. In some respects, there may be more than one program running on the device 402 and there may be more than one host user running device programs.
In some aspects, host users may run programs in a standalone manner or may run in a virtual machine or container. Each of these tenants can use their own memory space allocated from the larger memory namespace 408 (e.g., the SLM). Data security and data privacy is maintained only when memory allocated for one user is not accessible by another through the running program on the device. To achieve this, some NVMe-based devices can use a mechanism where, regions of memory are pre-registered with the device for that application's usage. The registration can include the memory regions that will be accessed in the program run. There could be multiple registrations done in advance before the runs. When the device program runs, the registration id is provided along with the program's other parameters that contain the actual SLM regions to be accessed.
Such a pre-registration mechanism may work for some but not all applications since not all applications can determine the amount of memory they will consume for a specific program run. While for some specific use-cases the application can determine the SLM amount in advance, for other use-cases the application may only know the memory usage when the IO request is received. Object storage and processing applications may be consuming different-sized streams of data that may come in different sizes (e.g., ranges may be from about 1 MB to 1000 MB as of the time of this writing). Since SLM can represent a scarce resource, pre-allocating may not be a viable option. The device memory requirement must be done on the fly and protection needs to be applied (e.g., a dynamic memory protection scheme as disclosed herein).
Thus, the pre-registration mechanism may lack usability in such cases for at least the following reasons: Memory usage for the program run must be well known in advance. The memory regions must be registered ahead of time with the device. The registration command is a privileged command that is issued to the NVMe admin queue. Even if there is a way to send an admin command before execute, the latency incurred for the command will be a tax for each program execution.
For these reasons, some definitions are limiting and may not be applied for applications that dynamically use device memory. This disclosure describes embodiments where a field in commands is received by the CS device that specifies if dynamic memory ranges are present in the command.
In some embodiments, a memory range identifier such as a Memory Range Set ID (RSID) can include a field for the preregistered memory regions and can be set to zero claiming no preregistered range sets are in use.
The actual memory regions are then populated in the memory addressed by the data pointer (DPTR) field (e.g., similar to the definition provided by the NVMe specification). This field specifies the host buffer that contains the programs parameters. The length of the buffer is defined by a data length (DLEN) field.
Each memory region has a definition that includes the following details: memory namespace ID, starting offset of the regions within the memory namespace and the total length of the memory region in use. There may be many memory regions that a program may use which can be captured dynamically in this command as specified above.
Thus, the mechanism enables supporting dynamic memory protections (e.g., updatable, program state-specific memory protection) for computational programs while accessing device memory in a multi-tenant environment. Current protocols and mechanism can be prohibitive at least because they may require privileged user and knowledge in advance of memory usage. Most program usages such as data analytics, big data and object based compute using memory dynamically as when required. With this dynamic memory usage protection scheme, host applications are able to safely run programs with the said protection in device in a multi-tenant environment. Providing this protection enables a computational storage capable devices to do many more tasks and support different usages.
In another embodiment, the processing element 905 may serve to determine various parameters associated data transmitted over the network associated with the disclosed systems. As another example. the processing element 905 may serve perform various acceleration operations such as at least portions of an offload functionality, data pre- or post-processing, combinations thereof, and/or the like.
In one embodiment, a transmitting component (not shown) may serve to transmit the signal from one device to another device on the network. For example, the transmitting component may serve to prepare a transmitter (e.g., transmitter 1004 of
In general, the terms computing entity, computer, entity, device, system, and/or similar words used herein interchangeably may refer to, for example, one or more computers, computing entities, desktop computers, mobile phones, tablets, phablets, notebooks, laptops, distributed systems, gaming consoles (for example Xbox, Play Station, Wii), watches, glasses, iBeacons, proximity beacons, key fobs, radio frequency identification (RFID) tags, ear pieces, scanners, televisions, dongles, cameras, wristbands, wearable items/devices, kiosks, input terminals, servers or server networks, blades, gateways, switches, processing devices, processing entities, set-top boxes, relays, routers, network access points, base stations, the like, and/or any combination of devices or entities adapted to perform the functions, operations, and/or processes described herein. Such functions, operations, and/or processes may include, for example, transmitting, receiving, operating on, processing, displaying, storing, determining, creating/generating, monitoring, evaluating, comparing, and/or similar terms used herein interchangeably. In one embodiment, these functions, operations, and/or processes can be performed on data, content, information, and/or similar terms used herein interchangeably.
As indicated, in one embodiment, the management computing entity 800 may also include one or more communications interfaces 920 for communicating with various computing entities, such as by communicating data, content, information, and/or similar terms used herein interchangeably that can be transmitted, received, operated on, processed, displayed, stored, and/or the like. For instance, the management computing entity 800 may communicate with user devices 810 and/or a variety of other computing entities.
As shown in
In one embodiment, the management computing entity 900 may further include or be in communication with non-volatile media (also referred to as non-volatile storage, memory, memory storage, memory circuitry and/or similar terms used herein interchangeably). In one embodiment, the non-volatile storage or memory may include one or more non-volatile storage or memory media 910, including but not limited to hard disks, ROM, PROM, EPROM, EEPROM, flash memory, MMCs, SD memory cards, Memory Sticks, CBRAM, PRAM, FeRAM, NVRAM, MRAM, RRAM, SONOS, FJG RAM, Millipede memory, racetrack memory, and/or the like. As will be recognized, the non-volatile storage or memory media may store databases, database instances, database management systems, data, applications, programs, program components, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like. The term database, database instance, database management system, and/or similar terms used herein interchangeably may refer to a collection of records or data that is stored in a computer-readable storage medium using one or more database models, such as a hierarchical database model, network model, relational model, entity-relationship model, object model, document model, semantic model, graph model, and/or the like.
In one embodiment, the management computing entity 900 may further include or be in communication with volatile media (also referred to as volatile storage, memory, memory storage, memory circuitry and/or similar terms used herein interchangeably). In one embodiment, the volatile storage or memory may also include one or more volatile storage or memory media 915, including but not limited to RAM, DRAM, SRAM, FPM DRAM, EDO DRAM, SDRAM, DDR SDRAM, DDR2 SDRAM, DDR3 SDRAM, RDRAM, TTRAM, T-RAM, Z-RAM, RIMM, DIMM, SIMM, VRAM, cache memory, register memory, and/or the like. As will be recognized, the volatile storage or memory media may be used to store at least portions of the databases, database instances, database management systems, data, applications, programs, program components, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like being executed by, for example, the processing element 905. Thus, the databases, database instances, database management systems, data, applications, programs, program components, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like may be used to control certain aspects of the operation of the management computing entity 900 with the assistance of the processing element 905 and operating system.
As indicated, in one embodiment, the management computing entity 900 may also include one or more communications interfaces 920 for communicating with various computing entities, such as by communicating data, content, information, and/or similar terms used herein interchangeably that can be transmitted, received, operated on, processed, displayed, stored, and/or the like. Such communication may be executed using a wired data transmission protocol, such as peripheral component interconnect express (PCIe), fiber distributed data interface (FDDI), digital subscriber line (DSL), Ethernet, asynchronous transfer mode (ATM), frame relay, data over cable service interface specification (DOCSIS), or any other wired transmission protocol. Similarly, the management computing entity 600 may be configured to communicate via wireless external communication networks using any of a variety of protocols, such as general packet radio service (GPRS), Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access 2000 (CDMA2000), CDMA2000 1× (1×RTT), Wideband Code Division Multiple Access (WCDMA), Time Division-Synchronous Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), Evolved Universal Terrestrial Radio Access Network (E-UTRAN), Evolution-Data Optimized (EVDO), High Speed Packet Access (HSPA), High-Speed Downlink Packet Access (HSDPA), IEEE 802.11 (Wi-Fi), Wi-Fi Direct, 802.16 (WiMAX), ultra-wideband (UWB), infrared (IR) protocols, near field communication (NFC) protocols, ZigBee, Bluetooth protocols, 5G protocol, wireless universal serial bus (USB) protocols, and/or any other wireless protocol.
Although not shown, the management computing entity 900 may include or be in communication with one or more input elements, such as a keyboard input, a mouse input, a touch screen/display input, motion input, movement input, audio input, pointing device input, joystick input, keypad input, and/or the like. The management computing entity 900 may also include or be in communication with one or more output elements (not shown), such as audio output, video output, screen/display output, motion output, movement output, and/or the like.
As will be appreciated, one or more of the management computing entity's 900 components may be located remotely from other management computing entity 900 components, such as in a distributed system. Furthermore, one or more of the components may be combined and additional components performing functions described herein may be included in the management computing entity 900. Thus, the management computing entity 900 can be adapted to accommodate a variety of needs and circumstances. As will be recognized, these architectures and descriptions are provided for example purposes only and are not limiting to the various embodiments.
A user may be an individual, a family, a company, an organization, an entity, a department within an organization, a representative of an organization and/or person, and/or the like. In one example, users may be employees, residents, customers, and/or the like. For instance, a user may operate a user device 910 that includes one or more components that are functionally similar to those of the management computing entity 900.
In various aspects, the processing component, the transmitting component, and/or the receiving component (not shown) may be configured to operate on one or more may include aspects of the functionality of the management computing entity 900, as shown and described in connection with
The signals provided to and received from the transmitter 1004 and the receiver 1006, respectively, may include signaling information in accordance with air interface standards of applicable wireless systems. In this regard, the user device 1010 may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types. More particularly, the user device 1010 may operate in accordance with any of a number of wireless communication standards and protocols, such as those described above with regard to the management computing entity 600 of
Via these communication standards and protocols, the user device 1010 can communicate with various other entities using concepts such as Unstructured Supplementary Service Data (USSD), Short Message Service (SMS), Multimedia Messaging Service (MMS), Dual-Tone Multi-Frequency Signaling (DTMF), and/or Subscriber Identity Component Dialer (SIM dialer). The user device 1010 can also download changes, add-ons, and updates, for instance, to its firmware, software (for example including executable instructions, applications, program components), and operating system.
According to one embodiment, the user device 1010 may include location determining aspects, devices, components, functionalities, and/or similar words used herein interchangeably. The location determining aspects may be used to inform the models used by the management computing entity and one or more of the models and/or machine learning techniques described herein. For example, the user device 1010 may include outdoor positioning aspects, such as a location component adapted to acquire, for example, latitude, longitude, altitude, geocode, course, direction, heading, speed, universal time (UTC), date, and/or various other information/data. In one embodiment, the location component can acquire data, sometimes known as ephemeris data, by identifying the number of satellites in view and the relative positions of those satellites. The satellites may be a variety of different satellites, including Low Earth Orbit (LEO) satellite systems, Department of Defense (DOD) satellite systems, the European Union Galileo positioning systems, the Chinese Compass navigation systems, Indian Regional Navigational satellite systems, and/or the like. Alternatively, the location information can be determined by triangulating the user device's 1010 position in connection with a variety of other systems, including cellular towers, Wi-Fi access points, and/or the like. Similarly, the user device 1010 may include indoor positioning aspects, such as a location component adapted to acquire, for example, latitude, longitude, altitude, geocode, course, direction, heading, speed, time, date, and/or various other information/data. Some of the indoor systems may use various position or location technologies including RFID tags, indoor beacons or transmitters, Wi-Fi access points, cellular towers, nearby computing devices (for example smartphones, laptops) and/or the like. For instance, such technologies may include the iBeacons, Gimbal proximity beacons, Bluetooth Low Energy (BLE) transmitters, NFC transmitters, and/or the like. These indoor positioning aspects can be used in a variety of settings to determine the location of someone or something to within inches or centimeters.
The user device 1010 may also comprise a user interface (that can include a display 1016 coupled to a processing element 1008) and/or a user input interface (coupled to a processing element 1008). For example, the user interface may be a user application, browser, user interface, and/or similar words used herein interchangeably executing on and/or accessible via the user device 1010 to interact with and/or cause display of information from the management computing entity, as described herein. The user input interface can comprise any of a number of devices or interfaces allowing the user device 1010 to receive data, such as a keypad 1018 (hard or soft), a touch display, voice/speech or motion interfaces, or other input devices. In embodiments including a keypad 1018, the keypad 1018 can include (or cause display of) the conventional numeric (0-9) and related keys (#, *), and other keys used for operating the user device 1010 and may include a full set of alphabetic keys or set of keys that may be activated to provide a full set of alphanumeric keys. In addition to providing input, the user input interface can be used, for example, to activate or deactivate certain functions, such as screen savers and/or sleep modes.
The user device 1010 can also include volatile storage or memory 1022 and/or non-volatile storage or memory 1024, which can be embedded and/or may be removable. For example, the non-volatile memory may be ROM, PROM, EPROM, EEPROM, flash memory, MMCs, SD memory cards, Memory Sticks, CBRAM, PRAM, FeRAM, NVRAM, MRAM, RRAM, SONOS, FJG RAM, Millipede memory, racetrack memory, and/or the like. The volatile memory may be RAM, DRAM, SRAM, FPM DRAM, EDO DRAM, SDRAM, DDR SDRAM, DDR2 SDRAM, DDR3 SDRAM, RDRAM, TTRAM, T-RAM, Z-RAM, RIMM, DIMM, SIMM, VRAM, cache memory, register memory, and/or the like. The volatile and non-volatile storage or memory can store databases, database instances, database management systems, data, applications, programs, program components, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like to implement the functions of the user device 1010. As indicated, this may include a user application that is resident on the entity or accessible through a browser or other user interface for communicating with the management computing entity and/or various other computing entities.
In another embodiment, the user device 1010 may include one or more components or functionality that are the same or similar to those of the management computing entity, as described in greater detail above. As will be recognized, these architectures and descriptions are provided for example purposes only and are not limiting to the various embodiments.
Certain embodiments may be implemented in one or a combination of hardware, firmware, and software. Other embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read and executed by at least one processor to perform the operations described herein. A computer-readable storage device may include any non-transitory memory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage device may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. The terms “computing device”, “user device”, “communication station”, “station”, “handheld device”, “mobile device”, “wireless device” and “user equipment” (UE) as used herein refers to a wireless communication device such as a cellular telephone, smartphone, tablet, netbook, wireless terminal, laptop computer, a femtocell, High Data Rate (HDR) subscriber station, access point, printer, point of sale device, access terminal, or other personal communication system (PCS) device. The device may be either mobile or stationary.
As used within this document, the term “communicate” is intended to include transmitting, or receiving, or both transmitting and receiving. This may be particularly useful in claims when describing the organization of data that is being transmitted by one device and received by another, but only the functionality of one of those devices is required to infringe the claim. Similarly, the bidirectional exchange of data between two devices (both devices transmit and receive during the exchange) may be described as ‘communicating’, when only the functionality of one of those devices is being claimed. The term “communicating” as used herein with respect to a wireless communication signal includes transmitting the wireless communication signal and/or receiving the wireless communication signal. For example, a wireless communication unit, which is capable of communicating a wireless communication signal, may include a wireless transmitter to transmit the wireless communication signal to at least one other wireless communication unit, and/or a wireless communication receiver to receive the wireless communication signal from at least one other wireless communication unit.
Some embodiments may be used in conjunction with various devices and systems, for example, a Personal Computer (PC), a desktop computer, a mobile computer, a laptop computer, a notebook computer, a tablet computer, a server computer, a handheld computer, a handheld device, a Personal Digital Assistant (PDA) device, a handheld PDA device, an on-board device, an off-board device, a hybrid device, a vehicular device, a non-vehicular device, a mobile or portable device, a consumer device, a non-mobile or non-portable device, a wireless communication station, a wireless communication device, a wireless Access Point (AP), a wired or wireless router, a wired or wireless modem, a video device, an audio device, an audio-video (A/V) device, a wired or wireless network, a wireless area network, a Wireless Video Area Network (WVAN), a Local Area Network (LAN), a Wireless LAN (WLAN), a Personal Area Network (PAN), a Wireless PAN (WPAN), and the like.
Some embodiments may be used in conjunction with one way and/or two-way radio communication systems, cellular radio-telephone communication systems, a mobile phone, a cellular telephone, a wireless telephone, a Personal Communication Systems (PCS) device, a PDA device which incorporates a wireless communication device, a mobile or portable Global Positioning System (GPS) device, a device which incorporates a GPS receiver or transceiver or chip, a device which incorporates an RFID element or chip, a Multiple Input Multiple Output (MIMO) transceiver or device, a Single Input Multiple Output (SIMO) transceiver or device, a Multiple Input Single Output (MISO) transceiver or device, a device having one or more internal antennas and/or external antennas, Digital Video Broadcast (DVB) devices or systems, multi-standard radio devices or systems, a wired or wireless handheld device, e.g., a Smartphone, a Wireless Application Protocol (WAP) device, or the like.
Some embodiments may be used in conjunction with one or more types of wireless communication signals and/or systems following one or more wireless communication protocols, for example, Radio Frequency (RF), Infrared (IR), Frequency-Division Multiplexing (FDM), Orthogonal FDM (OFDM), Time-Division Multiplexing (TDM), Time-Division Multiple Access (TDMA), Extended TDMA (E-TDMA), General Packet Radio Service (GPRS), extended GPRS, Code-Division Multiple Access (CDMA), Wideband CDMA (WCDMA), CDMA 2000, single-carrier CDMA, multi-carrier CDMA, Multi-Carrier Modulation (MDM), Discrete Multi-Tone (DMT), Bluetooth™, Global Positioning System (GPS), Wi-Fi, Wi-Max, ZigBee™, Ultra-Wideband (UWB), Global System for Mobile communication (GSM), 2G, 2.5G, 3G, 3.5G, 4G, Fifth Generation (5G) mobile networks, 3GPP, Long Term Evolution (LTE), LTE advanced, Enhanced Data rates for GSM Evolution (EDGE), or the like. Other embodiments may be used in various other devices, systems, and/or networks.
Although an example processing system has been described above, embodiments of the subject matter and the functional operations described herein can be implemented in other types of digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
Embodiments of the subject matter and the operations described herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described herein can be implemented as one or more computer programs, i.e., one or more components of computer program instructions, encoded on computer storage medium for execution by, or to control the operation of, information/data processing apparatus. Alternatively, or in addition, the program instructions can be encoded on an artificially-generated propagated signal, for example a machine-generated electrical, optical, or electromagnetic signal, which is generated to encode information/data for transmission to suitable receiver apparatus for execution by an information/data processing apparatus. A computer storage medium can be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination of one or more of them. Moreover, while a computer storage medium is not a propagated signal, a computer storage medium can be a source or destination of computer program instructions encoded in an artificially-generated propagated signal. The computer storage medium can also be, or be included in, one or more separate physical components or media (for example multiple CDs, disks, or other storage devices).
The operations described herein can be implemented as operations performed by an information/data processing apparatus on information/data stored on one or more computer-readable storage devices or received from other sources.
The term “data processing apparatus” encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiple ones, or combinations, of the foregoing. The apparatus can include special purpose logic circuitry, for example an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). The apparatus can also include, in addition to hardware, code that creates an execution environment for the computer program in question, for example code that constitutes processor firmware, a protocol stack, a database management system, an operating system, a cross-platform runtime environment, a virtual machine, or a combination of one or more of them. The apparatus and execution environment can realize various different computing model infrastructures, such as web services, distributed computing and grid computing infrastructures.
A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a component, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or information/data (for example one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (for example files that store one or more components, sub-programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
The processes and logic flows described herein can be performed by one or more programmable processors executing one or more computer programs to perform actions by operating on input information/data and generating output. Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and information/data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for performing actions in accordance with instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive information/data from or transfer information/data to, or both, one or more mass storage devices for storing data, for example magnetic, magneto-optical disks, or optical disks. However, a computer need not have such devices. Devices suitable for storing computer program instructions and information/data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, for example EPROM, EEPROM, and flash memory devices; magnetic disks, for example internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
To provide for interaction with a user, embodiments of the subject matter described herein can be implemented on a computer having a display device, for example a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information/data to the user and a keyboard and a pointing device, for example a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, for example visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
Embodiments of the subject matter described herein can be implemented in a computing system that includes a back-end component, for example as an information/data server, or that includes a middleware component, for example an application server, or that includes a front-end component, for example a client computer having a graphical user interface or a web browser through which a user can interact with an embodiment of the subject matter described herein, or any combination of one or more such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital information/data communication, for example a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), an inter-network (for example the Internet), and peer-to-peer networks (for example ad hoc peer-to-peer networks).
The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits information/data (for example an HTML page) to a client device (for example for purposes of displaying information/data to and receiving user input from a user interacting with the client device). Information/data generated at the client device (for example a result of the user interaction) can be received from the client device at the server.
While this specification contains many specific embodiment details, these should not be construed as limitations on the scope of any embodiment or of what may be claimed, but rather as descriptions of features specific to particular embodiments. Certain features that are described herein in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In certain embodiments, multitasking and parallel processing may be advantageous.
Many modifications and other embodiments of the disclosure set forth herein will come to mind to one skilled in the art to which these embodiments pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiments are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 63/429,125 entitled “A MECHANISM OF DYNAMIC MEMORY PROTECTIONS FOR PROGRAM EXECUTION IN A MULTI-TENANT ENVIRONMENT FOR COMPUTATIONAL STORAGE DEVICES,” filed Nov. 30, 2022 which is incorporated by reference herein for all purposes.
Number | Date | Country | |
---|---|---|---|
63429125 | Nov 2022 | US |