-
1.
公开(公告)号:US12265510B1
公开(公告)日:2025-04-01
申请号:US18478895
申请日:2023-09-29
Applicant: ATI Technologies ULC
Inventor: Yinan Jiang , Dmytro Chenchykov , Shaoyun Liu , Vignesh Chander
Abstract: A computer-implemented method for ensuring processing unit hardware state integrity in live migration can include participating as a source, by a processing unit, in a live migration procedure by injecting, into a live migration data package containing a state of the processing unit, a signature verifying the state. The method can additionally include participating as a target, by the processing unit, in an additional live migration procedure migrating an additional live migration data package containing an additional state of an additional processing unit by performing an integrity check based on an additional signature, in the additional live migration data package, verifying the additional state. Various other methods, systems, and computer-readable media are also disclosed.
-
2.
公开(公告)号:US20250110930A1
公开(公告)日:2025-04-03
申请号:US18478895
申请日:2023-09-29
Applicant: ATI Technologies ULC
Inventor: Yinan Jiang , Dmytro Chenchykov , Shaoyun Liu , Vignesh Chander
IPC: G06F16/21
Abstract: A computer-implemented method for ensuring processing unit hardware state integrity in live migration can include participating as a source, by a processing unit, in a live migration procedure by injecting, into a live migration data package containing a state of the processing unit, a signature verifying the state. The method can additionally include participating as a target, by the processing unit, in an additional live migration procedure migrating an additional live migration data package containing an additional state of an additional processing unit by performing an integrity check based on an additional signature, in the additional live migration data package, verifying the additional state. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11768696B2
公开(公告)日:2023-09-26
申请号:US17121678
申请日:2020-12-14
Applicant: ATI Technologies ULC
Inventor: Yinan Jiang , Kamraan Nasim , Dezhi Ming , Ahmed M. Abdelkhalek , Dmytro Chenchykov , Andy Sung
CPC classification number: G06F9/45558 , G06F9/45545 , G06F9/4812 , G06F2009/45591 , G06F2009/45595
Abstract: A technique for managing access to a micro engine, the method comprising: determining that a virtual function “VF”) is to be given access to direct communication with a micro engine; in response to the determining, configuring the micro engine to accept direct communication from the VF; monitoring for unpermitted communication; and after a time period has expired, configuring the micro engine to no longer accept direct communication from the VF.
-
公开(公告)号:US20250117472A1
公开(公告)日:2025-04-10
申请号:US18896418
申请日:2024-09-25
Applicant: ATI Technologies ULC
Inventor: Hao Chen , Manuchehr Taghi-Loo , Dmytro Chenchykov
Abstract: A method for synchronizing trusted operating systems can include receiving, at a first interconnect circuit, an operating system management instruction for a first trusted operating system that is associated with a first trusted memory region of a memory device, the first trusted memory region being allocated to the first interconnect circuit. The method can also include synchronizing the operating system management instruction with a second interconnect circuit such that the operating system management instruction is applied to a second trusted operating system. The second trusted operating system is associated with a second trusted memory region of the memory device and the second trusted memory region is allocated to the second interconnect circuit. Various other methods and systems are also disclosed.
-
公开(公告)号:US20220188139A1
公开(公告)日:2022-06-16
申请号:US17121678
申请日:2020-12-14
Applicant: ATI Technologies ULC
Inventor: Yinan Jiang , Kamraan Nasim , Dezhi Ming , Ahmed M. Abdelkhalek , Dmytro Chenchykov , Andy Sung
Abstract: A technique for managing access to a micro engine, the method comprising: determining that a virtual function “VF”) is to be given access to direct communication with a micro engine; in response to the determining, configuring the micro engine to accept direct communication from the VF; monitoring for unpermitted communication; and after a time period has expired, configuring the micro engine to no longer accept direct communication from the VF.
-
-
-
-