17823470. METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS simplified abstract (Micron Technology, Inc.)
METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS
Organization Name
Inventor(s)
Tony M. Brewer of Plano TX (US)
METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17823470 titled 'METHOD OF EFFICIENTLY IDENTIFYING ROLLBACK REQUESTS
Simplified Explanation
The patent application describes methods, systems, memory devices, and machine-readable mediums that enable a memory device to efficiently mark memory extents involved in an enhanced memory operation.
- Memory extents are marked based on a meta state indicating inclusion in the enhanced memory operation.
- The largest memory extents are maintained as a list of unmarked extents in the memory device.
- When a primitive memory operation is received, the memory address is compared to the list of unmarked extents and their meta state.
- If the address is covered by the list of extents or the meta state is marked, the memory operation is performed including the enhanced memory operation.
Potential Applications
- Data processing systems
- Memory management in computer systems
- High-performance computing
Problems Solved
- Efficient marking of memory extents for enhanced memory operations
- Improved memory operation performance
- Simplified memory management
Benefits
- Increased efficiency in memory operations
- Enhanced performance in memory-intensive applications
- Simplified memory management processes
Original Abstract Submitted
Disclosed in some examples are methods, systems, memory devices, and machine-readable mediums that allow a memory device to efficiently mark memory extents involved in an enhanced memory operation. An extent is marked if a meta state associated with the extent indicates that the extent is included in the enhanced memory operation. The largest memory extents of the operation are maintained in the memory device as a list of unmarked extents. When a primitive memory operation is received, the memory address is compared to the unmarked extents in the list to the meta state for that memory line. If the address is covered by the list of extents, or that line's meta state is marked, then the memory operation is performed including the enhanced memory operation.