Instruction execution method based on hash value, computing device and storage medium

A technology for computing equipment and instruction execution, which is applied in the field of instruction execution methods based on hash values, computing equipment and storage media, and can solve problems such as errors, abnormal operation of applications, and data errors

Pending Publication Date: 2022-02-01
武汉深之度科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But this method converts one memory access into multiple memory accesses, thus essentially changing the memory access model of the application
For some special application scenarios, the atomicity of one memory access is destroyed by multiple memory accesses. If the application relies on the atomicity of memory access, in this case, it will be caused by the destruction of atomicity. Errors or errors in the data may cause the application to run abnormally in severe cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction execution method based on hash value, computing device and storage medium
  • Instruction execution method based on hash value, computing device and storage medium
  • Instruction execution method based on hash value, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art. Like reference numbers generally refer to like parts or elements.

[0027] figure 1 A schematic structural diagram of disposing a processor and an internal memory in a computing device according to an exemplary embodiment of the present invention is shown. Such as figure 1 As shown, computing device 200 includes therein a processor 204 and internal memory 140 . An operating system 220 is also installed in the computing device 200 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an instruction execution method based on a hash value, computing equipment and a storage medium. The method comprises the steps of: submitting a first storage instruction of stored data applied in the internal memory to the processor; constructing a data storage section in the internal memory; generating a second storage address of the stored data according to the data storage section; generating a second storage instruction according to the second storage address, the second storage instruction being suitable for storing data to be stored by the first storage instruction, and the processor not generating a data storage exception message when executing the second storage instruction; executing, by the processor, a second storage instruction to store data in a data storage section of the internal memory; generating a second reading instruction according to the first reading instruction; executing the second read instruction by the processor to read the data from the data storage section of the internal memory. According to the invention, the atomicity of data access and storage is not lost, so that the problem of abnormal operation of some special application programs is avoided.

Description

technical field [0001] The invention relates to the field of computer instruction execution, in particular to an instruction execution method based on a hash value, a computing device and a storage medium. Background technique [0002] With the continuous development of computer technology, more and more applications have been developed. Correspondingly, the application data is also increasing, and the data structure is becoming more and more complex. Therefore, the access performance of the system to complex data structures in the memory is becoming more and more important, which directly affects the running speed of key applications. When data is stored, there are often special storage situations. When the application accesses these stored data, the processor does not support special access instructions for the data, and errors will be reported. The processor cannot directly handle this type of access. Store instructions to manipulate data. [0003] For this reason, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/30G06F9/50G06F12/06
CPCG06F9/3004G06F9/30043G06F9/5016G06F12/0646
Inventor 钟俊
Owner 武汉深之度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products