Patents by Inventor Bratin Saha

Bratin Saha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070156994
    Abstract: Methods and apparatus to provide unbounded transactional memory systems are described. In one embodiment, an operation corresponding to a software transactional memory (STM) access may be executed if a preceding hardware transactional memory (HTM) access operation fails.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Haitham Akkary, Ali-Reza Adl-tabatabai, Bratin Saha, Ravi Rajwar
  • Publication number: 20070143549
    Abstract: According to one embodiment of the invention, a method comprises verifying that a cache block is not exclusively owned, and if not, transmitting a message identifying both the cache block and a caching agent requesting ownership of the cache block to a broadcast interconnect.
    Type: Application
    Filed: December 19, 2005
    Publication date: June 21, 2007
    Inventors: Bratin Saha, Hariharan Thantry, Ali-Reza Adl-Tabatabai
  • Publication number: 20070143287
    Abstract: Provided is a method, system, and program for coordinating access to memory locations for hardware transactional memory transactions and software transactional memory transactions. A hardware transaction executing in hardware transactional memory initiates a request to access a memory location. A fault is returned to the hardware transaction request in response to an operation by one software transaction executing in a software transactional memory.
    Type: Application
    Filed: December 15, 2005
    Publication date: June 21, 2007
    Inventors: Ali-Reza Adl-tabatabai, Bratin Saha, Richard Hudson, Haitham Akkary, Ravi Rajwar
  • Publication number: 20070136289
    Abstract: In a system comprising a transactional memory architecture, initiating a transactional memory based transaction and then, within the transaction, checking a lock and if the lock is free, executing a critical section.
    Type: Application
    Filed: December 14, 2005
    Publication date: June 14, 2007
    Inventors: Ali-Reza Adl-Tabatabai, Jesse Fang, Anwar Ghuloum, Rick Hudson, Brian Murphy, Bratin Saha, Tatiana Shpeisman
  • Publication number: 20070079071
    Abstract: A system includes a processor and a size bounded first-in first-out (FIFO) memory that is connected to the processor and a display is connected to the processor. A managing process to run on the processor to manage the FIFO memory structure. The FIFO memory includes a counter portion and a value portion for each of a tail portion and a head portion, and the managing process is non-blocking. The counter portion is used as a timestamp to maintain FIFO order.
    Type: Application
    Filed: September 30, 2005
    Publication date: April 5, 2007
    Inventors: Bratin Saha, Ali-Reza Adl-Tabatabai
  • Publication number: 20060161738
    Abstract: In one embodiment, the present invention includes a predictor to predict contention of an operation to be executed in a program. The operation may be processed based on a result of the prediction, which may be based on multiple independent predictions. In one embodiment, the operation may be optimized if no contention is predicted. Other embodiments are described and claimed.
    Type: Application
    Filed: December 29, 2004
    Publication date: July 20, 2006
    Inventors: Bratin Saha, Matthew Merten, Sebastien Hily, David Koufaty, Per Hammarlund
  • Publication number: 20060005197
    Abstract: A method, apparatus, and system are provided for performing compare and exchange operations using a sleep-wakeup mechanism. According to one embodiment, an instruction at a processor is executed to help acquire a lock on behalf of the processor. If the lock is unavailable to be acquired by the processor, the instruction is put to sleep until an event has occurred.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Bratin Saha, Matthew Merten, Per Hammarlund
  • Publication number: 20060004998
    Abstract: A method and apparatus for executing lock instructions speculatively in an out-of-order processor are disclosed. In one embodiment, a prediction is made whether a given lock instruction will actually be contended. If not, then the lock instruction may be treated as having a normal load micro-operation which may be speculatively executed. Monitor logic may look for indications that the lock instruction is actually contended. If no such indications are found, the speculative load micro-operation and other micro-operations corresponding to the lock instruction may retire. However, if such indications are in fact found, the lock instruction may be restarted, and the prediction mechanism may be updated.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Bratin Saha, Matthew Merten, Per Hammarlund
  • Publication number: 20050273605
    Abstract: Processor extensions and software verification to support type-safe language environments running with untrusted code. Code and data spaces are partitioned into trusted and untrusted regions. Type-safe code is loaded into the trusted region of the code space, while non-type-safe code is loaded into the untrusted region of the code space. The trusted region of the data space is allocated to the type-safe code. The untrusted region of the data space is allocated to the non-type-safe code. Hardware-based truth tables are employed for defining allowable and disallowable code sequences and memory access operations. For code sequences, allowable operations are based on the location (i.e., region) of a code sequence including a current instruction and a prior instruction. For memory access, the location of the requesting instruction and data requested are considered. Disallowed code sequence or memory access operations cause the processor to generate a safe access protection trap.
    Type: Application
    Filed: May 20, 2004
    Publication date: December 8, 2005
    Inventors: Bratin Saha, Weldon Washburn, James Held
  • Publication number: 20050204119
    Abstract: A speculative execution capability of a processor is exposed to program control through at least one machine instruction. The at least one machine instruction may be two instructions designed to facilitate synchronization between parallel processes. According to an aspect, an instruction set architecture includes circuitry that handles a speculative execution instruction and a speculation termination instruction. The speculative execution instruction may be an instruction that takes first and second operands, causes the processor to speculatively execute additional instructions if a memory location contains a value, and causes the processor to start executing instructions from an address indicated by the second operand if a mis-speculation occurs, and the speculation termination instruction may be an instruction that causes the processor to begin retiring the additional instructions.
    Type: Application
    Filed: March 9, 2004
    Publication date: September 15, 2005
    Inventor: Bratin Saha