Patent classifications
G06F2213/24
APPLICATION PROCESSOR SUPPORTING INTERRUPT DURING AUDIO PLAYBACK, ELECTRONIC DEVICE INCLUDING THE SAME AND METHOD OF OPERATING THE SAME
An application processor includes a system bus, as well as a host processor, a voice trigger system, and an audio subsystem that are electrically connected to the system bus. The voice trigger system performs a voice trigger operation and issues a trigger event based on a trigger input signal that is provided through a trigger interface. The audio subsystem processes audio streams that are replayed or recorded through an audio interface, and receives an interrupt signal through the audio interface while an audio replay operation is performed through the audio interface.
Systems, methods, and computer-readable media for managing instruction fetch in virtual computing environments
Methods, systems, and computer readable media for intelligent fetching of storage device commands from submission queues are disclosed. The controller may implement a hierarchical scheme comprising first-level arbitration(s) between submission queues of each of a plurality of input/output virtualization (IOV) functions, and a second-level arbitration between the respective IOV functions. Alternatively, or in addition, the controller may implement a flat arbitration scheme, which may comprise selecting submission queue(s) from one or more groups, each group comprising submission queues of each of the plurality of IOV functions. In some embodiments, the controller implements a credit-based arbitration scheme. The arbitration scheme(s) may be modified in accordance with command statistics and/or current resource availability.
SECURE ENVIRONMENT IN A NON-SECURE MICROCONTROLLER
A secure engine method includes providing an embedded microcontroller in an embedded device, the embedded microcontroller having internal memory. The method also includes providing a secure environment in the internal memory. The secure environment method recognizes a boot sequence and restricts user-level access to the secure environment by taking control over the secure environment memory. Taking such control may include disabling DMA controllers, configuring at least one memory controller for access to the secure environment, preventing the execution of instructions fetched from outside the secure environment, and only permitting execution of instructions fetched from within the secure environment. Secure engine program instructions are then executed to disable interrupts, perform at least one secure operation, and re-enable interrupts after performing the at least one secure operation. Control over the secure environment memory is released, which can include clearing memory, re-enabling DMA controllers, and restoring memory controller parameters.
Application processor supporting interrupt during audio playback, electronic device including the same and method of operating the same
An application processor includes a system bus, as well as a host processor, a voice trigger system, and an audio subsystem that are electrically connected to the system bus. The voice trigger system performs a voice trigger operation and issues a trigger event based on a trigger input signal that is provided through a trigger interface. The audio subsystem processes audio streams that are replayed or recorded through an audio interface, and receives an interrupt signal through the audio interface while an audio replay operation is performed through the audio interface.
Secure environment in a non-secure microcontroller
A secure engine method includes providing an embedded microcontroller in an embedded device, the embedded microcontroller having internal memory. The method also includes providing a secure environment in the internal memory. The secure environment method recognizes a boot sequence and restricts user-level access to the secure environment by taking control over the secure environment memory. Taking such control may include disabling DMA controllers, configuring at least one memory controller for access to the secure environment, preventing the execution of instructions fetched from outside the secure environment, and only permitting execution of instructions fetched from within the secure environment. Secure engine program instructions are then executed to disable interrupts, perform at least one secure operation, and re-enable interrupts after performing the at least one secure operation. Control over the secure environment memory is released, which can include clearing memory, re-enabling DMA controllers, and restoring memory controller parameters.
Method and apparatus to gather platform configuration profile in a trustworthy manner
Various embodiments are generally directed to an apparatus, method and other techniques for gathering configuration information of a computer system during a system management mode of the computer system and exposing the gathered configuration information to securely attest to the configuration of the system.
Composite Ply-by-Ply Damage Assessment Using Correlation Factors Between Finite Element Models (FEMs) and Non-Destructive Evaluations (NDEs)
A computer is configured to enable a rapid, consistent, ply-by-ply, quantitative analytical assessment of various Finite Element Method (FEM) material models based on metrics defined for impact damage. Additionally, the computer is configured to provide a method for determining the accuracy of such FEM material model(s) by comparing the output of those models to non-destructive evaluation (NDE) test data.
DIRECTED INTERRUPT VIRTUALIZATION WITH FALLBACK
An interrupt signal is provided to a guest operating system executed using one or more processors of a plurality of processors. One of the processors receives from a bus attachment device an interrupt signal issued by a bus connected module. A logical processor ID resulting from a translation of an interrupt target ID provided with the interrupt signal is used to address the receiving processor directly. The receiving processor checks whether interrupt target ID identifies the receiving processor as a target processor of the interrupt signal. If the receiving processor is not the target processor, the interrupt signal is forwarded for handling by the guest operating system using broadcasting.
Communication apparatus, communication method, program, and communication system
There is provided a communication apparatus, including: a transmission/reception unit that transmits/receives a signal to/from a different apparatus; a confirmation signal detection unit that detects one of a reception confirmation signal and a non-reception confirmation signal, the reception confirmation signal and the non-reception confirmation signal being transmitted from the different apparatus that has received the signal transmitted from the transmission/reception unit; and a conflict avoiding unit that instructs the transmission/reception unit to transmit an abort signal for instructing to interrupt communication after ignoring a predetermined number of bits following the non-reception confirmation signal when the confirmation signal detection unit has detected the non-reception confirmation signal.
Programming and controlling compute units in an integrated circuit
An integrated circuit (IC) can include a command queue having a plurality of slots corresponding to commands from a host processor for execution by a plurality of compute units of the IC and a command request register having a plurality of locations corresponding to the plurality of slots in the command queue. The command request register is configured to generate an interrupt indicating a new command stored within the command queue. The IC can include a controller configured to, in response to the interrupt from the command request register, determine a selected compute unit that is idle from the plurality of compute units to execute the new command. The IC can also include a compute unit direct memory access circuit configured to provide the new command to the available compute unit.