Deterministic Replay of Memory-mapped File Data for User-level programs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ryu, Joonho | - |
dc.contributor.author | Han, Taeho | - |
dc.contributor.author | Majeed, Shakaiba | - |
dc.contributor.author | Yoon, Hyunmin | - |
dc.contributor.author | Ryu, Minsoo. | - |
dc.date.accessioned | 2022-07-11T13:16:29Z | - |
dc.date.available | 2022-07-11T13:16:29Z | - |
dc.date.created | 2021-05-14 | - |
dc.date.issued | 2018-08 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/149482 | - |
dc.description.abstract | Memory - mapped files allow to map a file on disk into a section in memory such that, when we fetch bytes from th at section of memory , the corresponding bytes of the file are read. Similarly, when we store data in the memory , the corresponding bytes are written to the file. This allows us to perform data trans fer more efficiently without using read or write system calls . This is especially useful when accessing data through memory - mapped I/O. Using memory - mapped files , a process can directly access the data without involving the kernel. This data can be of non - deterministic nature , e.g. , a camera sending some visual information. In order to record and replay a user - level program that accesses data through mem ory - mapped files, it is therefore important to account for this source of non - determinism. In this resear ch work, w e use memory protection mechanism and hardware breakpoints present in modern processors to detect whenever a process performs such a data transfer and inform the kernel so that it can record the non - deterministic data and then replay when desired . | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | CSREA Press | - |
dc.title | Deterministic Replay of Memory-mapped File Data for User-level programs | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Ryu, Minsoo. | - |
dc.identifier.bibliographicCitation | International Conference on Foundations of Computer Science, pp.17 - 20 | - |
dc.relation.isPartOf | International Conference on Foundations of Computer Science | - |
dc.citation.title | International Conference on Foundations of Computer Science | - |
dc.citation.startPage | 17 | - |
dc.citation.endPage | 20 | - |
dc.type.rims | ART | - |
dc.type.docType | Proceeding | - |
dc.description.journalClass | 3 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.subject.keywordAuthor | Non-deterministic bugs | - |
dc.subject.keywordAuthor | memory-mapping | - |
dc.subject.keywordAuthor | data aborts | - |
dc.subject.keywordAuthor | memory protection | - |
dc.identifier.url | https://www.proquest.com/docview/2139462737/abstract/C36B3117C9ED4E47PQ/1?accountid=11283 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.