A race condition occurs when commands to read and write data are received at the same time. This can also happen, for example, when a thread is executing a packet of executable data from memory at the same time that a write thread is delivering the data to the memory. The result may be a computer crash, program shutdown, reading/writing errors, or other problems. In one solution, the executing thread may be suspended while waiting for the writing thread to provide the data. However, suspending a thread can cause performance problems for related processes. For example, dozens or hundreds of threads may be running for a process in which only one or a few threads access the data, but all of the threads may have to be suspended to wait for the data delivery every time a stream fault occurs.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Embodiments allow executable code to be delivered in a lock-free manner by disassembling it and ordering the writes to the memory page. This allows the executable code to remain in a consistent state throughout the delivery of streaming data. Because the memory is in a consistent state, other threads may continue to execute while the byte-code is written into memory. This allows for greater scalability and performance.
Further embodiments enable streaming of executable code data in user mode, without suspending the entire process or using a kernel mode component.
To further clarify the above and other advantages and features of embodiments of the present invention, a more particular description of embodiments of the present invention will be rendered by reference to the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
The lock-free solution described herein takes advantage of two features of a modern processor. First, the processor provides an atomic thirty-two bit or sixty-four bit memory access write. This guarantees that the processor will see all thirty-two bits or sixty-four bits in memory. Second, the processor has a one-byte debug break exception operation code (opcode). This debug break opcode allows the processor to retry reading and executing opcodes from the memory without causing a calling thread to fail.
In one embodiment, code is disassembled in memory before the instructions are made available to a processor. This disassembly allows for creation of an ordered list of memory writes consisting of a number of separate thirty-two bit or sixty-four bit writes. This disassembly and analysis can be performed either on a client or on a server. Performing this operation on the client saves network transmissions at the cost of increased processor cycles, while performing the operation on the server means larger network transmissions but requires less processor operation at the client node.
When the memory page is allocated, the entire page is written with one-byte exception codes. A stream fault handler keeps a list of pages and locations that have been written to or that are invalid.
The opcodes are written to memory using the disassembled thirty-two bit or sixty-four bit blocks starting at the end of the page. Alternately, the assembly tree can be analyzed to identify leaf opcodes, which are opcodes that are called by other opcodes. The leaf opcodes may be identified by a traversal of the opcode execution call graph. These leaf opcodes may be written to memory first.
For opcodes that are thirty-two bits or smaller (or sixty-four bit or smaller in other embodiments), the entire opcode is written to memory so that the processor will execute the instruction successfully. If the opcode is larger than thirty-two bits (or larger than sixty-four bits in other embodiments), then the “end” of the opcode is written first. By writing the end of the opcode first, if the processor executes the instruction while the opcode is still being written, then the processor will execute the debug break opcode first. This allows the stream fault handler to finish writing the opcode and so that the processor can retry the opcode. If the thirty-two bit (or sixty-four bit) write straddles more than one opcode, then a debug break opcode is written to allow retry. If the thirty-two bit (or sixty-four bit) write has already been written, then the previous value is written in which case the opcode remains valid.
By writing the disassembled opcodes spaced by debug breaks, the processor will encounter either an invalid debug breakpoint or valid executable code. If the application executes an invalid debug breakpoint, then a stream fault interceptor as described herein will intercept the exception before it is delivered to the application. The stream fault interceptor waits until the memory is valid and then retries the opcode. The stream fault interceptor can use the table of pages and written opcodes to differentiate between a breakpoint that occurs as a part of stream faulting, which must be retried, or one used by a debugger or the application, which must be passed back to the application. In the case of valid executable code, the application executes code successfully. As a result, the stream fault handler does not need to suspend all of the threads in the process when delivering the results of a stream fault.
(1): 0xAB
(2): 0xE9 0x00 0xFE 0x70 0x08
(3): . . .
The first opcode is one byte long, the second opcode is five bytes long, and additional opcodes of various lengths are identified in a similar manner.
Memory 101 comprises a number of thirty-two bit blocks 102-104. In other embodiments, the memory blocks may be sixty-four bits or some other size.
In
The stream fault handler now needs to write the second opcode (i.e., 0xE9 0x00 0xFE 0X70 0x08). The stream fault handler knows the previous instruction (0xAB) was written and knows how blocks 102b-104b were written. The stream fault handler also knows how long the next opcode is and how it needs to be written to memory 101. In particular, the stream fault handler knows that the second, five-byte opcode will be written to blocks 102b and 103b after opcode 0xAB. The stream fault handler also determines that the second opcode will not fit into the remaining space in a single thirty-two bit block 102b. Therefore, the second opcode must be divided between memory blocks 102b and 103b.
As illustrated in
After the second portion of the opcode is written to block 103c, then the first potion (i.e., 0xE9 0x00 0xFE) can be written to memory 101. As illustrated in
In existing systems, stream fault interceptor 204 would need to suspend the process that requested the data. If the process is not suspended, then another thread could execute data on page 202 as it was being written into memory and the process would crash when it attempted to execute partial data. After the page 202 was written to memory, then the process could be resumed with stream fault interceptor changing the operating system exception to “success” and the application continuing to execute.
In existing systems, this step of suspending the entire process is necessary because changing access to data page 202 and writing data to it cannot be accomplished in a single step. This means that two threads in the process cannot be executing when you are servicing a stream fault.
The existing systems are improved herein by adding disassembler 206 and written/unwritten page tracker 207. Disassembler 206 is responsible for taking the returned byte-code and disassembling it. Disassembler 206 returns a list of offsets that contain the boundaries of each opcode. As noted in the example of
The process does not need to be suspended when using disassembler 206 and written/unwritten page tracker 207. Instead, after the requested code is returned to stream fault interceptor 204 from the server 205, the disassembler is called to generate the offset map. The offset map is then stored by the stream fault interceptor 204, which begins writing opcodes to data page 202 in an opcode-by-opcode manner as described above. The stream fault interceptor 204 consults this offset map to determine the boundary of each opcode. The stream fault interceptor 204 may write the opcodes to data page 202 in any appropriate order starting with either the beginning or the end of the list of opcodes.
If any contention occurs, such as if the processor executes a partially filled instruction, then the operating system fault mechanism 203 will be triggered. This will cause the stream fault interceptor 204 to be invoked by operating system 201. The stream fault interceptor 204 consults written/unwritten page tracker 207 and either writes the opcode itself to data page 202 or waits until another thread finishes writing the data. Stream fault interceptor 204 then retries the exception.
In some embodiments, debug break point opcodes may be written to all memory locations to initialize the memory. When the opcodes are written to memory, debug break point opcodes may be appended to the opcode to create a full standard block of memory. The standard block of memory may be thirty-two bits or sixty-four bits long, for example.
When a long opcode will overlap two or more standard blocks of memory, then it may be divided into two portions. The second portion of the long opcode is written to a second memory block, and then the first portion of the long opcode is written to a first memory block. Writing the long opcode in this manner will ensure that a debug break point will be encountered if a memory location is read before the entire opcode is written. Debug break point opcodes may be appended to the second portion of the long opcode to create a full standard block of memory. A previous opcode may be written along with the first portion of the long opcode to the first memory block.
It will be understood that steps 301-305 of the process illustrated in
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in local and/or remote computer storage media including memory storage devices.
With reference to
The computer 400 typically includes a variety of computer-readable media 404. Computer-readable media 404 may be any available media that can be accessed by the computer 400 and includes both volatile and nonvolatile media, and removable and non-removable media, but excludes propagated signals. By way of example, and not limitation, computer-readable media 404 may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computer 400. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above may also be included within the scope of computer-readable media. Computer-readable media may be embodied as a computer program product, such as software stored on computer storage media.
The data storage or system memory 402 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) and random access memory (RAM). Memory 402 or computer readable media 404 may be used to store data pages, opcode boundary lists, opcodes, and the like. A basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within computer 400, such as during start-up, is typically stored in ROM. RAM typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 401. By way of example, and not limitation, data storage 402 holds an operating system, application programs, and other program modules and program data. An operating system running on processing unit 402 may support functions such as operating system exception 203, stream fault interceptor 204, disassembler 206, and/or written/unwritten page tracker 207 (
Data storage 402 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, data storage 402 may be a hard disk drive that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive that reads from or writes to a removable, nonvolatile magnetic disk, and an optical disk drive that reads from or writes to a removable, nonvolatile optical disk such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The drives and their associated computer storage media, described above and illustrated in
A user may enter commands and information through a user interface 405 or other input devices such as a tablet, electronic digitizer, a microphone, keyboard, and/or pointing device, commonly referred to as mouse, trackball or touch pad. Other input devices may include a joystick, game pad, satellite dish, scanner, or the like. Additionally, voice inputs, gesture inputs using hands or fingers, or other natural user interface (NUI) may also be used with the appropriate input devices, such as a microphone, camera, tablet, touch pad, glove, or other sensor. These and other input devices are often connected to the processing unit 401 through a user input interface 405 that is coupled to the system bus 403, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 406 or other type of display device is also connected to the system bus 403 via an interface, such as a video interface. The monitor 406 may also be integrated with a touch-screen panel or the like. Note that the monitor and/or touch screen panel can be physically coupled to a housing in which the computing device 400 is incorporated, such as in a tablet-type personal computer. In addition, computers such as the computing device 400 may also include other peripheral output devices such as speakers and printer, which may be connected through an output peripheral interface or the like.
The computer 400 may operate in a networked or cloud-computing environment using logical connections 407 to one or more remote devices, such as a remote computer. The remote computer may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 400. The logical connections depicted in
When used in a networked or cloud-computing environment, the computer 400 may be connected to a public or private network through a network interface or adapter 407. Network interface 407 may provide a connection to a remote device, such as a network server 205 (
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
This application is a continuation of U.S. patent Ser. No. 13/560,216 filed Jul. 27, 2012 entitled “Lock Free Streaming of Executable Code Data”, the entire Specification of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5768575 | McFarland et al. | Jun 1998 | A |
5946484 | Brandes | Aug 1999 | A |
6009508 | May | Dec 1999 | A |
6077312 | Bates et al. | Jun 2000 | A |
6119115 | Barr | Sep 2000 | A |
6212574 | O'Rourke et al. | Apr 2001 | B1 |
6253309 | Mahalingaiah | Jun 2001 | B1 |
6282698 | Baker et al. | Aug 2001 | B1 |
6339820 | Baentsch et al. | Jan 2002 | B1 |
6397273 | Chilton | May 2002 | B2 |
6408382 | Pechanek et al. | Jun 2002 | B1 |
6564314 | May | May 2003 | B1 |
6708326 | Bhattacarya | Mar 2004 | B1 |
7444500 | Jones | Oct 2008 | B1 |
7581082 | Hahn et al. | Aug 2009 | B2 |
8601246 | Peleg et al. | Dec 2013 | B2 |
8769504 | Jeong | Jul 2014 | B2 |
9389866 | Gilbert | Jul 2016 | B2 |
9600284 | Gilbert | Mar 2017 | B2 |
9619346 | Pape | Apr 2017 | B2 |
20030023960 | Khan et al. | Jan 2003 | A1 |
20040059641 | Brown et al. | Mar 2004 | A1 |
20040268090 | Coke et al. | Dec 2004 | A1 |
20060277438 | Pedersen | Dec 2006 | A1 |
20070006189 | Li | Jan 2007 | A1 |
20070038990 | White | Feb 2007 | A1 |
20070079177 | Spirakis | Apr 2007 | A1 |
20070079296 | Li et al. | Apr 2007 | A1 |
20070168736 | Ottavi et al. | Jul 2007 | A1 |
20080127125 | Anckaert et al. | May 2008 | A1 |
20090037710 | Mavinakayanahalli | Feb 2009 | A1 |
20090138625 | Lee et al. | May 2009 | A1 |
20090282220 | Norden | Nov 2009 | A1 |
20090307528 | Byers et al. | Dec 2009 | A1 |
20100070803 | Carlson et al. | Mar 2010 | A1 |
20100251220 | Jeong | Sep 2010 | A1 |
20100287359 | Norden | Nov 2010 | A1 |
20120079459 | Bates et al. | Mar 2012 | A1 |
20120179895 | Venkataramanan et al. | Jul 2012 | A1 |
20130047037 | Moyer | Feb 2013 | A1 |
20130318398 | Arapov | Nov 2013 | A1 |
20150095625 | Hassanein | Apr 2015 | A1 |
20150121135 | Pape | Apr 2015 | A1 |
Number | Date | Country |
---|---|---|
101233495 | Jul 2008 | CN |
101853148 | Oct 2010 | CN |
0417013 | Mar 1991 | EP |
0889412 | Jan 1999 | EP |
Entry |
---|
‘Verifying the ARM Block Data Transfer Instructions’ by Anthony Fox, archived online beginning on Aug. 7, 2004. |
‘Introducing Shared-Memory Concurrency—Race Conditions and Atomic Blocks’ by Laura Effinger-Dean, Nov. 19, 2007. |
‘Understanding and Using Atomic Memory Operations’ by Lars Nyland & Stephen Jones, GTC 2013. |
‘Understanding Intel Instruction Sizes’ by William Swanson, copyright 2003. |
‘Endianness White Paper’ by Intel, Nov. 15, 2004. |
“Parallel Programming with Microsoft Visual Studio 2010: Introduction to Parallel Programming—Multicore Computing & Speedup”, Retrieved From <<http://mscerts.programming4.us/programming/parallel%20programming%20with%20microsoft%20visual%20studio%202010%20%20%20introduction%20to%20parallel%20programming%20-%20multicore%20computing%20%20%20speedup.aspx>>, Jul. 29, 2011, 6 Pages. |
“First Office Action and Search Report Issued in Chinese Patent Application No. 201380039991.8”, dated Jun. 23, 2016, 14 Pages. |
Mishra, Sudhindra N., “The Vax 8800 microarchitecture”, In Proceedings of Thirty-Second IEEE Computer Society International Conference, COMPCON'87, Feb. 2, 1987, pp. 322-327. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2013/052153”, dated Nov. 12, 2013, 11 Pages. |
Rusling, David D., “Chapter 3: Memory Management”, In Book the Linux Kernel, Jul. 15, 1999, 18 Pages. |
Number | Date | Country | |
---|---|---|---|
20160371083 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13560216 | Jul 2012 | US |
Child | 15257794 | US |