Patents by Inventor Mark Lillibridge
Mark Lillibridge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11200345Abstract: Techniques for a firewall to determine access to a portion of memory are provided. In one aspect, an access request to access a portion of memory within a pool of shared memory may be received at a firewall. The firewall may determine whether the access request to access the portion of memory is allowed. The access request may be allowed to proceed based on the determination. The operation of the firewall may not utilize address translation.Type: GrantFiled: July 29, 2015Date of Patent: December 14, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Mark Lillibridge, Paolo Faraboschi, Chris I. Dalton
-
Patent number: 10776192Abstract: Techniques for memory store error checks are provided. In one aspect, a process running on a processor may execute an instruction to store a first value in memory. The processor may store a plurality of values, including the first value, from a plurality of processes to the memory. A check on a synchronous error notification path may be performed to determine whether an error in storing at least one of the plurality of values occurred.Type: GrantFiled: September 17, 2015Date of Patent: September 15, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Mark Lillibridge, John L. Byrne
-
Patent number: 10650169Abstract: There is provided an example memory system comprising a plurality of memory modules, each memory module comprising a persistent memory to store root key information and encrypted primary data; a volatile memory to store a working key for encrypting data, the encrypted primary data stored in the persistent memory being encrypted using the working key; and a control unit to provide load and store access to the primary data. The memory system further comprises a working key recovery mechanism to retrieve first root key information from a first module and second root key information from a second module; and compute the working key for a given module based on the retrieved first root key information and the retrieved second root key information.Type: GrantFiled: September 14, 2015Date of Patent: May 12, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Liqun Chen, Chris I. Dalton, Fraser Dickin, Mark Lillibridge, Simon Kai Ying Shiu
-
Patent number: 10482013Abstract: Systems and methods associated with page modification are disclosed. One example method may be embodied on a non-transitory computer-readable medium storing computer-executable instructions. The instructions, when executed by a computer, may cause the computer to fetch a page to a buffer pool in a memory. The page may be fetched from at least one of a log and a backup using single page recovery. The instructions may also cause the computer to store a modification of the page to the log. The modification may be stored to the log as a log entry. The instructions may also cause the computer to evict the page from memory when the page is replaced in the buffer pool. Page writes associated with the eviction may be elided.Type: GrantFiled: September 30, 2014Date of Patent: November 19, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Charles S. Johnson, Harumi Kuno, Goetz Graefe, Haris Volos, Mark Lillibridge, James Hyungsun Park, Wey Guy
-
Patent number: 10423464Abstract: In one example in accordance with the present disclosure, a method may include performing a transactional operation such that if one step of the transactional operation is performed, each other step of the transactional operation is performed. The transactional operation may include making a first copy, stored in a first persistent memory, of a next ticket number stored in a second persistent memory and updating the next ticket number in the second persistent memory. The method may also include determining when to serve a first thread based on the first copy of the next ticket number.Type: GrantFiled: October 25, 2016Date of Patent: September 24, 2019Assignee: Hewlett Packard Enterprise Patent Development LPInventors: Mark Lillibridge, Milind M. Chabbi, Haris Volos
-
Patent number: 10360206Abstract: Systems and methods associated with latch-free searching are disclosed. One example method includes receiving a key identifying data to be retrieved from a tree-based data structure. The method also includes performing a concurrent, latch-free search of the tree-based data structure until a leaf node is reached. The method also includes validating the leaf node. The method also includes retreading a portion of the search if the leaf node fails validation.Type: GrantFiled: January 16, 2014Date of Patent: July 23, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Joseph Tucek, Mark Lillibridge, Harumi Kuno, Goetz Graefe
-
Patent number: 10152247Abstract: A technique includes acquiring a plurality of write requests from at least one memory controller and logging information associated with the plurality of write requests in persistent storage. The technique includes applying the plurality of write requests atomically as a group to persistent storage.Type: GrantFiled: January 23, 2014Date of Patent: December 11, 2018Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Sheng Li, Jishen Zhao, Jichuan Chang, Parthasarathy Ranganathan, Alistair Veitch, Kevin T. Lim, Mark Lillibridge
-
Publication number: 20180276062Abstract: Techniques for memory store error checks are provided. In one aspect, a process running on a processor may execute an instruction to store a first value in memory. The processor may store a plurality of values, including the first value, from a plurality of processes to the memory. A check on a synchronous error notification path may be performed to determine whether an error in storing at least one of the plurality of values occurred.Type: ApplicationFiled: September 17, 2015Publication date: September 27, 2018Inventors: Mark Lillibridge, John L. Byme
-
Publication number: 20180204024Abstract: Techniques for a firewall to determine access to a portion of memory are provided. In one aspect, an access request to access a portion of memory within a pool of shared memory may be received at a firewall. The firewall may determine whether the access request to access the portion of memory is allowed. The access request may be allowed to proceed based on the determination. The operation of the firewall may not utilize address translation.Type: ApplicationFiled: July 29, 2015Publication date: July 19, 2018Inventors: Mark Lillibridge, Paolo Faraboschi, Chris I. Dalton
-
Publication number: 20180165479Abstract: There is provided an example memory system comprising a plurality of memory modules, each memory module comprising a persistent memory to store root key information and encrypted primary data; a volatile memory to store a working key for encrypting data, the encrypted primary data stored in the persistent memory being encrypted using the working key; and a control unit to provide load and store access to the primary data. The memory system further comprises a working key recovery mechanism to retrieve first root key information from a first module and second root key information from a second module; and compute the working key for a given module based on the retrieved first root key information and the retrieved second root key information.Type: ApplicationFiled: September 14, 2015Publication date: June 14, 2018Inventors: Liqun Chen, Chris I. Dalton, Fraser Dickin, Mark Lillibridge, Simon Kai Ying Shiu
-
Publication number: 20180121371Abstract: Examples described herein relate to a memory structure by a user-level process. In an example, a method includes mapping in a read mode, by a kernel, a memory structure and a lock associated with a portion of the memory structure into an address space of a user-level process based on the user-level process being untrusted. The user-level process reads the portion of the memory structure outside of the kernel and determines a state of the lock after the reading of the portion. A write to the portion during the reading of the portion is detected based on the state of the lock.Type: ApplicationFiled: November 1, 2016Publication date: May 3, 2018Inventors: Mark Lillibridge, Joseph Tucek
-
Publication number: 20180095783Abstract: In one example in accordance with the present disclosure, a method may include performing a transactional operation such that if one step of the transactional operation is performed, each other step of the transactional operation is performed. The transactional operation may include making a first copy, stored in a first persistent memory, of a next ticket number stored in a second persistent memory and updating the next ticket number in the second persistent memory. The method may also include determining when to serve a first thread based on the first copy of the next ticket number.Type: ApplicationFiled: October 25, 2016Publication date: April 5, 2018Inventors: Mark Lillibridge, Milind M. Chabbi, Haris Volos
-
Publication number: 20170300412Abstract: Systems and methods associated with page modification are disclosed. One example method may be embodied on a non-transitory computer-readable medium storing computer-executable instructions. The instructions, when executed by a computer, may cause the computer to fetch a page to a buffer pool in a memory. The page may be fetched from at least one of a log and a backup using single page recovery. The instructions may also cause the computer to store a modification of the page to the log. The modification may be stored to the log as a log entry. The instructions may also cause the computer to evict the page from memory when the page is replaced in the buffer pool. Page writes associated with the eviction may be elided.Type: ApplicationFiled: September 30, 2014Publication date: October 19, 2017Inventors: Charles S. Johnson, Harumi Kuno, Goetz Graefe, Haris Volos, Mark Lillibridge, James Hyungsun Park, Wey Guy
-
Publication number: 20170286417Abstract: A technique includes deduplicating data across subtenants of a tenant of a cloud service. The technique includes applying a rule to apportion a fee reduction due to the deduplication among the subtenants.Type: ApplicationFiled: November 4, 2014Publication date: October 5, 2017Applicant: Hewlett Packard Enterprise Development LPInventors: Mark Lillibridge, Doug Voigt, Vitaly Oratovsky, Scott Grumm
-
Publication number: 20170220483Abstract: Apertures of a first size in a first physical address space of at least one processor are mapped to respective blocks of the first size in a second address space of a storage medium. Apertures of a second size in the first physical address space are mapped to respective blocks of the second size in the second address space, the second size being different from the first size.Type: ApplicationFiled: April 30, 2015Publication date: August 3, 2017Inventors: Mark Lillibridge, Paolo Faraboschi
-
Publication number: 20170004164Abstract: Systems and methods associated with latch-free searching are disclosed. One example method includes receiving a key identifying data to be retrieved from a tree-based data structure. The method also includes performing a concurrent, latch-free search of the tree-based data structure until a leaf node is reached. The method also includes validating the leaf node. The method also includes retreading a portion of the search if the leaf node fails validation.Type: ApplicationFiled: January 16, 2014Publication date: January 5, 2017Inventors: Joseph Tucek, Mark Lillibridge, Harumi Kuno, Goetz Graefe
-
Publication number: 20160342351Abstract: A technique includes acquiring a plurality of write requests from at least one memory controller and logging information associated with the plurality of write requests in persistent storage. The technique includes applying the plurality of write requests atomically as a group to persistent storage.Type: ApplicationFiled: January 23, 2014Publication date: November 24, 2016Inventors: Sheng Li, Jishen Zhao, Jichuan Chang, Parthasarathy Ranganathan, Alistair Veitch, Kevin T. Lim, Mark Lillibridge
-
Publication number: 20160004598Abstract: Examples disclosed herein relate to grouping chunks of data into a compression region. Examples relate to a chunk container comprising a first plurality of chunks of data in a plurality of first compression regions, and include grouping a second plurality of the chunks into a second compression region, and compressing the chunks of the second compression region relative to each other.Type: ApplicationFiled: April 30, 2013Publication date: January 7, 2016Inventors: Mark Lillibridge, Joseph Tucek
-
Patent number: 8447864Abstract: One embodiment of the present invention provides a distributed, differential electronic-data storage system that includes client computers, component data-storage systems, and a routing component. Client computers direct data objects to component data-storage systems within the distributed, differential electronic-data storage system. Component data-storage systems provide data storage for the distributed, differential electronic-data storage system. The routing component directs data objects, received from the clients computers, through logical bins to component data-storage systems by a compression-enhancing routing method.Type: GrantFiled: May 8, 2012Date of Patent: May 21, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Samuel A. Fineberg, Kave Eshghi, Pankaj Mehra, Mark Lillibridge
-
Publication number: 20120239815Abstract: One embodiment of the present invention provides a distributed, differential electronic-data storage system that includes client computers, component data-storage systems, and a routing component. Client computers direct data objects to component data-storage systems within the distributed, differential electronic-data storage system. Component data-storage systems provide data storage for the distributed, differential electronic-data storage system. The routing component directs data objects, received from the clients computers, through logical bins to component data-storage systems by a compression-enhancing routing method.Type: ApplicationFiled: May 8, 2012Publication date: September 20, 2012Inventors: Samuel A. Fineberg, Kave Eshghi, Pankaj Mehra, Mark Lillibridge