Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method for Bypassing Spy Processes During Chip Initialization of Chips At Initial Program Load (IPL) Time for Reducing Time Required for Chip Initialization

IP.com Disclosure Number: IPCOM000198675D
Publication Date: 2010-Aug-11
Document File: 2 page(s) / 23K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method is disclosed for Bypassing spy processes during chip initialization of chips at initial program load (IPL) time for reducing time required for chip initialization.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 1 of 2

Method for Bypassing Spy Processes During Chip Initialization of Chips At Initial Program Load (IPL) Time

for Reducing Time Required for Chip Initialization

Disclosed is a method for Bypassing spy processes during chip initialization of chips at initial program load (IPL) time for reducing time required for chip initialization.

Chip initialization is performed for all chips at a server at IPL time so that the chips can function properly later during run time. Scan Init steps are performed during chip initialization of the chips. The Scan Init steps scan rings out of the chips, set appropriate bits in the rings, and then scan the rings back in. Most of the bits that need to be set are defined in chip Init files under the form of 'spy', which is a code abstraction that brings related bits in rings and registers into a single entity so code can access them all with one call. These chip Init files are compiled at build time and processed during IPL time.

On a chip scope, while performing the Scan Init steps, compiled Init files are loaded for a chip type into a memory. Thereafter, Spy tables in the Init file are looped through for evaluating any necessary expressions. If Init file expressions specify that the spy should be set, a spy code is called to write the spy. Subsequently, the spy code performs a loop on each ring that the spy applies to. The spy code looks up a rule table to determine the ring as well as bits in the ring. If the ring hasn't already been scanned out of the chip, the Spy code scans out the ring data and add the ring to hregScanringFactory. However, in case the ring is already scanned out, the Spy code locates the ring in the ring cache. Thereafter, appropriate bits in the ring are set according to the Init files on the spy.

The Spy code calls hregScanringFactory to write out to the chip all of the rings in its cache. Similarly, the spy code performs the operations on another chip.

As described above, the spy code processes consumes a significant time of the Scan Init steps, therefore, if the spy code processes can be bypassed, overall time required for chip initialization at IPL may be reduced.

In order to bypass the spy code processes, the method disclosed herein saves ring images (resulted data after spy processes) into a flash space during build and genesis IPL (first IPL after a change in hardware configuration or firmware upgrade). On subsequent IPLs, the ring images can be read out directly from the flash space and write to hardwa...