17823470. METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS

Organization Name

Micron Technology, Inc.

Inventor(s)

Tony M. Brewer of Plano TX (US)

METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17823470 titled 'METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS

Simplified Explanation

The patent application describes methods, systems, memory devices, and machine-readable mediums that enable a memory device to efficiently mark memory extents involved in an enhanced memory operation.

  • Memory extents are marked based on a meta state indicating inclusion in the enhanced memory operation.
  • The largest memory extents are maintained as a list of unmarked extents in the memory device.
  • When a primitive memory operation is received, the memory address is compared to the list of unmarked extents and their meta state.
  • If the address is covered by the list of extents or the meta state is marked, the memory operation is performed including the enhanced memory operation.

Potential Applications

  • Data processing systems
  • Memory management in computer systems
  • High-performance computing

Problems Solved

  • Efficient marking of memory extents for enhanced memory operations
  • Improved memory operation performance
  • Simplified memory management

Benefits

  • Increased efficiency in memory operations
  • Enhanced performance in memory-intensive applications
  • Simplified memory management processes


Original Abstract Submitted

Disclosed in some examples are methods, systems, memory devices, and machine-readable mediums that allow a memory device to efficiently mark memory extents involved in an enhanced memory operation. An extent is marked if a meta state associated with the extent indicates that the extent is included in the enhanced memory operation. The largest memory extents of the operation are maintained in the memory device as a list of unmarked extents. When a primitive memory operation is received, the memory address is compared to the unmarked extents in the list to the meta state for that memory line. If the address is covered by the list of extents, or that line's meta state is marked, then the memory operation is performed including the enhanced memory operation.