MANAGING OBJECTS IN SHARED CACHES USING MULTIPLE CHAINS

    公开(公告)号:US20210240697A1

    公开(公告)日:2021-08-05

    申请号:US16779475

    申请日:2020-01-31

    Abstract: A method for maintaining cache of database objects using a chain set that includes multiple chains each specifying an ordering of database objects is disclosed. In response to a change of state of a particular database object, a corresponding chain is selected. The selected chain is then locked, the state of the particular database object changed, and then the selected chain is unlocked.

    Mechanisms for maintaining chains without locks

    公开(公告)号:US11940994B2

    公开(公告)日:2024-03-26

    申请号:US17515118

    申请日:2021-10-29

    CPC classification number: G06F16/2379 G06F16/24552

    Abstract: Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.

    DEPENDENCY MANAGEMENT FOR SHARED DATA OBJECTS IN A DATABASE SYSTEM

    公开(公告)号:US20220247832A1

    公开(公告)日:2022-08-04

    申请号:US17503464

    申请日:2021-10-18

    Inventor: Rui Zhang

    Abstract: Techniques are disclosed relating to managing dependencies between shared data objects in a database system. In various embodiments, a data storage system may maintain a function cache that is operable to store functions that are accessible to one or more applications hosted by a server system. In response to a request to invalidate a first data type utilized by one or more of these functions, various embodiments may include accessing an inverted index that specifies a mapping between data types and corresponding functions, stored in the function cache, which depend on those data types. Using the inverted index, various embodiments include identifying a set of functions that depend on the first data type and invalidating the set of functions in the function cache such that the set of functions are no longer accessible by the applications.

    Dependency management for shared data objects in a database system

    公开(公告)号:US11153408B1

    公开(公告)日:2021-10-19

    申请号:US17162728

    申请日:2021-01-29

    Inventor: Rui Zhang

    Abstract: Techniques are disclosed relating to managing dependencies between shared data objects in a database system. In various embodiments, a data storage system may maintain a function cache that is operable to store functions that are accessible to one or more applications hosted by a server system. In response to a request to invalidate a first data type utilized by one or more of these functions, various embodiments may include accessing an inverted index that specifies a mapping between data types and corresponding functions, stored in the function cache, which depend on those data types. Using the inverted index, various embodiments include identifying a set of functions that depend on the first data type and invalidating the set of functions in the function cache such that the set of functions are no longer accessible by the applications.

    Dependency management for shared data objects in a database system

    公开(公告)号:US11722579B2

    公开(公告)日:2023-08-08

    申请号:US17503464

    申请日:2021-10-18

    Inventor: Rui Zhang

    Abstract: Techniques are disclosed relating to managing dependencies between shared data objects in a database system. In various embodiments, a data storage system may maintain a function cache that is operable to store functions that are accessible to one or more applications hosted by a server system. In response to a request to invalidate a first data type utilized by one or more of these functions, various embodiments may include accessing an inverted index that specifies a mapping between data types and corresponding functions, stored in the function cache, which depend on those data types. Using the inverted index, various embodiments include identifying a set of functions that depend on the first data type and invalidating the set of functions in the function cache such that the set of functions are no longer accessible by the applications.

    MECHANISMS FOR MAINTAINING CHAINS WITHOUT LOCKS

    公开(公告)号:US20230135823A1

    公开(公告)日:2023-05-04

    申请号:US17515118

    申请日:2021-10-29

    Abstract: Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.

    Identifying and preventing invalid memory access

    公开(公告)号:US11573713B1

    公开(公告)日:2023-02-07

    申请号:US17516833

    申请日:2021-11-02

    Abstract: Methods, computer readable media, and devices for identifying and preventing invalid memory access. A method may include defining a dynamic scope for an operation, receiving a request to allocate a portion of the range of shared memory, allocating a monotonically increasing portion of the range of shared memory such that a subsequent request to allocate memory is allocated a different portion of the range of shared memory, receiving a request to deallocate the allocated portion of the range of shared memory, deallocating the allocated portion of the range of shared memory by protecting the deallocated portion of the range of shared memory from any subsequent access, and in response to an access of the protected deallocated portion of the range of shared memory by one of the one or more threads or processes of the operation, trapping and terminating the one thread or process.

Patent Agency Ranking