Room Synchronization Problem

Total Page:16

File Type:pdf, Size:1020Kb

Room Synchronization Problem Room Synchronizations Guy E. Blelloch Perry Cheng Computer Science Department void push(val y) { it do es not matter what order relative to the increments the int j; values are inserted. enterRoom(PUSHROOM); Therefore, if we can separate the pushes from the p ops, void push(val y) { j = fetchAdd(&top,1); wewould have a safe implementation of a stack. Ro om syn- int j; A[j] = y; j = fetchAdd(&top,1); exitRoom(); chronizations allow ustodothisasshown in Figure 1(b). } A[j] = y; The ro om synchronization guarantees that no two users will } ever simultaneously b e in the PUSHROOM and POPROOM,sothe val pop() { push and p op instructions will never b e interleaved. How- val x; val pop() { ever, it will allowanynumb er of users to b e in either the int k; int k; val x; push or p op ro om simultaneousl y. enterRoom(POPROOM); k = fetchAdd(&top,-1); k = fetchAdd(&top,-1); In the full pap er [4] weshow that using our ro om syn- if (k <= 0) { if (k <= 0) { chronization algorithm (a) asynchronous accesses (pushes or fetchAdd(&top,1); fetchAdd(&top,1); p ops) can arriveatany time, (b) every access is serviced in x = EMPTY; x = EMPTY; 2 time prop ortional to the time of a fetch-and-add , and (c) } } that this implements a linearizab le stack. The exp eriments else x = A[k-1]; elsex=A[k-1]; describ ed in Section 4 are based on a variant of this stackin return x; exitRoom(); } return x; whichmultiple elements are pushed or p opp ed within each } ro om. (b) (a) Outline. The pap er is organized as follows. Section 2 formally de nes ro om synchronizati ons, and presents an al- gorithm that provably implements them. Section 3 shows Figure 1: The co de for a parallel stack. (a) Do es not howroomsynchronizations can b e e ectively used to imple- work if the push and p op are interleaved in time. (b) ment shared queues and dynamic shared stacks. Section 4 Avoids this problem using a ro om synchronization. presents our exp erimental results. Section 5 discusses fur- ther issues and related work, and Section 6 concludes. degrades linearly with the numb er of pro cessors (b ecause tialized ), our version scales almost p er- accesses are sequen 2. ROOM SYNCHRONIZATIONS fectly,beyond an initial cost for going from one to two pro- The ro om synchronization problem involves a set of m cessors. The ro om synchronizatio ns intro duced in this pap er ro oms, and a set of p indep endent users who wish to access have b een incorp orated into our real-time garbage collector the ro oms. A user wishing access to a ro om calls an En- co de [5], where they are used extensively. ter Ro om primitive, which returns once the user is granted One disadvantage of ro om synchronization s is that if a p ermission to enter the ro om. The user is then said to b e user fails or stops while inside a ro om, the user will blo ck inside the ro om. When done with the ro om, the user exits other users from entering another ro om. This prop ertyis the ro om by calling an Exit Ro om primitive. The ro oms clearly not desirable under all conditions, but in manycon- synchronization construct must ensure that at any p ointin ditions, includin g the garbage collector, it is not a problem. time, there is at most one \op en" ro om with users inside it. We discuss this issue in Section 5. However, anynumb er of users can b e inside the op en ro om. eprovide details on the ro om synchro- 1.1 A Motivating Example In this section, w nization problem, discuss necessary and desirable prop erties To motivate our problem, we consider implementing a par- for proto cols implementing ro om synchronizatio n, presenta allel stack using a fetch-and-add. We assume the stackis proto col that implements ro om synchronizatio n, and show stored in an array A and the index top p oints to the next that this proto col satis es all these prop erties. free lo cation in the stack (the stack grows from 0 up). The tr,cnt) op eration adds cnt to the contents of fetchAdd(p 2.1 Primitives lo cation ptr and returns the old contents of the lo cation (b e- The basic primitives of ro om synchronization are: fore the addition). We assume this is executed atomically. Consider the stack co de shown in Figure 1(a). Assuming a Create Ro oms. Given a p ositiveinteger m,createa constant-time fetchAdd, the push and pop op erations will ro oms ob ject R for a set of m ro oms, and return a p ointer take constant time. The problem is that they can work (a reference) to R. There can b e multiple ro oms ob jects at incorrectly if a push and pop are interleaved in time. For the same time. example, in the following interleaving of instructions Enter Ro om. Given a p ointer to a ro oms ob ject R and aroomnumber i, try to enter ro om i of R. Return when j = fetchAdd(&top,1); // from push the user has succeeded in entering the ro om. When the k = fetchAdd(&top,-1); // from pop primitive returns, the user is said to b e inside the ro om. A x = A[k-1]; // from pop A[j] = y; // from push ro om with a user inside is said to b e open. Exit Ro om. Given a p ointer to a ro oms ob ject R, exit the p op will return garbage. Without an atomic op eration the ro om in R that the user is currently inside. Because the that changes the counter at the same time as mo difying the user can b e inside at most one ro om in R, there is no need stack element, we see no simple way of xing this problem. to sp ecify the ro om numb er. When a user requests to exit One should note, however, that anyinterleaving of twoor a ro om, it is no longer considered to b e inside the ro om. If more pushes or two or more p ops is safe. Consider pushes. 2 The fetchAdd reserves a lo cation to put the value y, and the This is under certain assumptions ab out all pro cessors write inserts the value. Since the counter is only increasing, making progress. 123 Asynchrony is mo deled by the fact that actions from dif- there are no users remaining inside the ro om, the ro om is ferent agent pro cesses can b e interleaved in an arbitrary said to b e closed. manner; thus one agentmayhavemany actions b etween DestroyRooms. Given a p ointer to a ro oms ob ject, actions by another agent. We will consider various fairness deallo cate the ro oms ob ject. metrics for executions and for ro om accesses. A weak form Other primitives. In addition to these four basic primi- of fairness among the agent actions is the following: An ex- tives, there is a Change Ro om primitive, whichisequivalent ecution is weakly-fair if it is either (a) nite and no agent to an Exit Ro om followed byanEnter Ro om, but with the action is enabled in the nal state, or (b) in nite and each guarantee of immediate entry into the requested ro om if it agent has in nitely many opportunities to p erform an ac- is the next ro om to b e op ened. There is also an Assign Exit tion (either there is an action by the agentornoactionis Co de primitive, discussed at the end of Section 2.3. enabled). Certain actions are sp ecially designated as external ac- The Enter Ro om and Exit Ro om primitives can b e viewed tions; these are the (only) actions in which a user communi- as the counterparts to the \trying" (e.g., lo ck) and \exit" cates with its agent. For ro om synchronizatio n, the external (e.g., unlo ck) primitives for the mutual exclusion problem. actions for a user j (and its agent) are: As with the mutual exclusion problem, what the users do while inside the ro om (or critical section) is part of the appli- EnterRo omReq (i): the action of user j signalli ng to j cation and not part of the synchronization construct. This its agent p a desire to enter ro om i. j enables the generality of the primitive, as the same construct can b e used for a variety of applicatio ns. The drawbackis EnterRo omGrant (i): the action of agent p signalli ng j j that, as with mutual exclusion, the construct relies on the to user j that its Enter Ro om request has b een granted. application to alternate entering and exiting requests bya ExitRo omReq : the action of user j signalli ng to its given user. j The Create Ro oms and Destroy Ro oms primitives are ex- agent p a desire to exit its currentroom. j ecuted once for a given ro oms ob ject, in order to allo cate ExitRo omGrant : the action of agent p signalling to j j and initiali ze the ob ject prior to its use and to deallo cate user j that its Exit Ro om request has b een granted.
Recommended publications
  • Synchronization Spinlocks - Semaphores
    CS 4410 Operating Systems Synchronization Spinlocks - Semaphores Summer 2013 Cornell University 1 Today ● How can I synchronize the execution of multiple threads of the same process? ● Example ● Race condition ● Critical-Section Problem ● Spinlocks ● Semaphors ● Usage 2 Problem Context ● Multiple threads of the same process have: ● Private registers and stack memory ● Shared access to the remainder of the process “state” ● Preemptive CPU Scheduling: ● The execution of a thread is interrupted unexpectedly. ● Multiple cores executing multiple threads of the same process. 3 Share Counting ● Mr Skroutz wants to count his $1-bills. ● Initially, he uses one thread that increases a variable bills_counter for every $1-bill. ● Then he thought to accelerate the counting by using two threads and keeping the variable bills_counter shared. 4 Share Counting bills_counter = 0 ● Thread A ● Thread B while (machine_A_has_bills) while (machine_B_has_bills) bills_counter++ bills_counter++ print bills_counter ● What it might go wrong? 5 Share Counting ● Thread A ● Thread B r1 = bills_counter r2 = bills_counter r1 = r1 +1 r2 = r2 +1 bills_counter = r1 bills_counter = r2 ● If bills_counter = 42, what are its possible values after the execution of one A/B loop ? 6 Shared counters ● One possible result: everything works! ● Another possible result: lost update! ● Called a “race condition”. 7 Race conditions ● Def: a timing dependent error involving shared state ● It depends on how threads are scheduled. ● Hard to detect 8 Critical-Section Problem bills_counter = 0 ● Thread A ● Thread B while (my_machine_has_bills) while (my_machine_has_bills) – enter critical section – enter critical section bills_counter++ bills_counter++ – exit critical section – exit critical section print bills_counter 9 Critical-Section Problem ● The solution should ● enter section satisfy: ● critical section ● Mutual exclusion ● exit section ● Progress ● remainder section ● Bounded waiting 10 General Solution ● LOCK ● A process must acquire a lock to enter a critical section.
    [Show full text]
  • Concurrent Objects and Linearizability Concurrent Computaton
    Concurrent Objects and Concurrent Computaton Linearizability memory Nir Shavit Subing for N. Lynch object Fall 2003 object © 2003 Herlihy and Shavit 2 Objectivism FIFO Queue: Enqueue Method • What is a concurrent object? q.enq( ) – How do we describe one? – How do we implement one? – How do we tell if we’re right? © 2003 Herlihy and Shavit 3 © 2003 Herlihy and Shavit 4 FIFO Queue: Dequeue Method Sequential Objects q.deq()/ • Each object has a state – Usually given by a set of fields – Queue example: sequence of items • Each object has a set of methods – Only way to manipulate state – Queue example: enq and deq methods © 2003 Herlihy and Shavit 5 © 2003 Herlihy and Shavit 6 1 Pre and PostConditions for Sequential Specifications Dequeue • If (precondition) – the object is in such-and-such a state • Precondition: – before you call the method, – Queue is non-empty • Then (postcondition) • Postcondition: – the method will return a particular value – Returns first item in queue – or throw a particular exception. • Postcondition: • and (postcondition, con’t) – Removes first item in queue – the object will be in some other state • You got a problem with that? – when the method returns, © 2003 Herlihy and Shavit 7 © 2003 Herlihy and Shavit 8 Pre and PostConditions for Why Sequential Specifications Dequeue Totally Rock • Precondition: • Documentation size linear in number –Queue is empty of methods • Postcondition: – Each method described in isolation – Throws Empty exception • Interactions among methods captured • Postcondition: by side-effects
    [Show full text]
  • The Deadlock Problem
    The deadlock problem More deadlocks mutex_t m1, m2; Same problem with condition variables void p1 (void *ignored) { • lock (m1); - Suppose resource 1 managed by c1, resource 2 by c2 lock (m2); - A has 1, waits on 2, B has 2, waits on 1 /* critical section */ c c unlock (m2); Or have combined mutex/condition variable unlock (m1); • } deadlock: - lock (a); lock (b); while (!ready) wait (b, c); void p2 (void *ignored) { unlock (b); unlock (a); lock (m2); - lock (a); lock (b); ready = true; signal (c); lock (m1); unlock (b); unlock (a); /* critical section */ unlock (m1); One lesson: Dangerous to hold locks when crossing unlock (m2); • } abstraction barriers! This program can cease to make progress – how? - I.e., lock (a) then call function that uses condition variable • Can you have deadlock w/o mutexes? • 1/15 2/15 Deadlocks w/o computers Deadlock conditions 1. Limited access (mutual exclusion): - Resource can only be shared with finite users. 2. No preemption: - once resource granted, cannot be taken away. Real issue is resources & how required • 3. Multiple independent requests (hold and wait): E.g., bridge only allows traffic in one direction - don’t ask all at once (wait for next resource while holding • - Each section of a bridge can be viewed as a resource. current one) - If a deadlock occurs, it can be resolved if one car backs up 4. Circularity in graph of requests (preempt resources and rollback). All of 1–4 necessary for deadlock to occur - Several cars may have to be backed up if a deadlock occurs. • Two approaches to dealing with deadlock: - Starvation is possible.
    [Show full text]
  • Fair K Mutual Exclusion Algorithm for Peer to Peer Systems ∗
    Fair K Mutual Exclusion Algorithm for Peer To Peer Systems ∗ Vijay Anand Reddy, Prateek Mittal, and Indranil Gupta University of Illinois, Urbana Champaign, USA {vkortho2, mittal2, indy}@uiuc.edu Abstract is when multiple clients are simultaneously downloading a large multimedia file, e.g., [3, 12]. Finally applications k-mutual exclusion is an important problem for resource- where a service has limited computational resources will intensive peer-to-peer applications ranging from aggrega- also benefit from a k mutual exclusion primitive, preventing tion to file downloads. In order to be practically useful, scenarios where all the nodes of the p2p system simultane- k-mutual exclusion algorithms not only need to be safe and ously overwhelm the server. live, but they also need to be fair across hosts. We pro- The k mutual exclusion problem involves a group of pro- pose a new solution to the k-mutual exclusion problem that cesses, each of which intermittently requires access to an provides a notion of time-based fairness. Specifically, our identical resource called the critical section (CS). A k mu- algorithm attempts to minimize the spread of access time tual exclusion algorithm must satisfy both safety and live- for the critical resource. While a client’s access time is ness. Safety means that at most k processes, 1 ≤ k ≤ n, the time between it requesting and accessing the resource, may be in the CS at any given time. Liveness means that the spread is defined as a system-wide metric that measures every request for critical section access is satisfied in finite some notion of the variance of access times across a homo- time.
    [Show full text]
  • Goals of This Lecture How to Increase the Compute Power?
    Goals of this lecture Motivate you! Design of Parallel and High-Performance Trends Computing High performance computing Fall 2017 Programming models Lecture: Introduction Course overview Instructor: Torsten Hoefler & Markus Püschel TA: Salvatore Di Girolamo 2 © Markus Püschel Computer Science Trends What doubles …? Source: Wikipedia 3 4 How to increase the compute power? Clock Speed! 10000 Sun’s Surface 1000 ) 2 Rocket Nozzle Nuclear Reactor 100 10 8086 Hot Plate 8008 8085 Pentium® Power Density (W/cm Power 4004 286 386 486 Processors 8080 1 1970 1980 1990 2000 2010 Source: Intel Source: Wikipedia 5 6 How to increase the compute power? Evolutions of Processors (Intel) Not an option anymore! Clock Speed! 10000 Sun’s Surface 1000 ) 2 Rocket Nozzle Nuclear Reactor 100 ~3 GHz Pentium 4 Core Nehalem Haswell Pentium III Sandy Bridge Hot Plate 10 8086 Pentium II 8008 free speedup 8085 Pentium® Pentium Pro Power Density (W/cm Power 4004 286 386 486 Processors 8080 Pentium 1 1970 1980 1990 2000 2010 Source: Intel 7 8 Source: Wikipedia/Intel/PCGuide Evolutions of Processors (Intel) Evolutions of Processors (Intel) Cores: 8x ~360 Gflop/s Vector units: 8x parallelism: work required 2 2 4 4 4 8 cores ~3 GHz Pentium 4 Core Nehalem Haswell Pentium III Sandy Bridge Pentium II Pentium Pro free speedup Pentium memory bandwidth (normalized) 9 10 Source: Wikipedia/Intel/PCGuide Source: Wikipedia/Intel/PCGuide A more complete view Source: www.singularity.com Can we do this today? 11 12 © Markus Püschel Computer Science High-Performance Computing (HPC) a.k.a. “Supercomputing” Question: define “Supercomputer”! High-Performance Computing 13 14 High-Performance Computing (HPC) a.k.a.
    [Show full text]
  • Core Processors
    UNIVERSITY OF CALIFORNIA Los Angeles Parallel Algorithms for Medical Informatics on Data-Parallel Many-Core Processors A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Maryam Moazeni 2013 © Copyright by Maryam Moazeni 2013 ABSTRACT OF THE DISSERTATION Parallel Algorithms for Medical Informatics on Data-Parallel Many-Core Processors by Maryam Moazeni Doctor of Philosophy in Computer Science University of California, Los Angeles, 2013 Professor Majid Sarrafzadeh, Chair The extensive use of medical monitoring devices has resulted in the generation of tremendous amounts of data. Storage, retrieval, and analysis of such data require platforms that can scale with data growth and adapt to the various behavior of the analysis and processing algorithms. In recent years, many-core processors and more specifically many-core Graphical Processing Units (GPUs) have become one of the most promising platforms for high performance processing of data, due to the massive parallel processing power they offer. However, many of the algorithms and data structures used in medical and bioinformatics systems do not follow a data-parallel programming paradigm, and hence cannot fully benefit from the parallel processing power of ii data-parallel many-core architectures. In this dissertation, we present three techniques to adapt several non-data parallel applications in different dwarfs to modern many-core GPUs. First, we present a load balancing technique to maximize parallelism in non-serial polyadic Dynamic Programming (DP), which is a family of dynamic programming algorithms with more non-uniform data access pattern. We show that a bottom-up approach to solving the DP problem exploits more parallelism and therefore yields higher performance.
    [Show full text]
  • Download Distributed Systems Free Ebook
    DISTRIBUTED SYSTEMS DOWNLOAD FREE BOOK Maarten van Steen, Andrew S Tanenbaum | 596 pages | 01 Feb 2017 | Createspace Independent Publishing Platform | 9781543057386 | English | United States Distributed Systems - The Complete Guide The hope is that together, the system can maximize resources and information while preventing failures, as if one system fails, it won't affect the availability of the service. Banker's algorithm Dijkstra's algorithm DJP algorithm Prim's algorithm Dijkstra-Scholten algorithm Dekker's algorithm generalization Smoothsort Shunting-yard algorithm Distributed Systems marking algorithm Concurrent algorithms Distributed Systems algorithms Deadlock prevention algorithms Mutual exclusion algorithms Self-stabilizing Distributed Systems. Learn to code for free. For the first time computers would be able to send messages to other systems with a local IP address. The messages passed between machines contain forms of data that the systems want to share like databases, objects, and Distributed Systems. Also known as distributed computing and distributed databases, a distributed system is a collection of independent components located on different machines that share messages with each other in order to achieve common goals. To prevent infinite loops, running the code requires some amount of Ether. As mentioned in many places, one of which this great articleyou cannot have consistency and availability without partition tolerance. Because it works in batches jobs a problem arises where if your job fails — Distributed Systems need to restart the whole thing. While in a voting system an attacker need only add nodes to the network which is Distributed Systems, as free access to the network is a design targetin a CPU power based scheme an attacker faces a physical limitation: getting access to more and more powerful hardware.
    [Show full text]
  • Concurrent and Parallel Programming
    Concurrent and parallel programming Seminars in Advanced Topics in Computer Science Engineering 2019/2020 Romolo Marotta Trend in processor technology Concurrent and parallel programming 2 Blocking synchronization SHARED RESOURCE Concurrent and parallel programming 3 Blocking synchronization …zZz… SHARED RESOURCE Concurrent and parallel programming 4 Blocking synchronization Correctness guaranteed by mutual exclusion …zZz… SHARED RESOURCE Performance might be hampered because of waste of clock cycles Liveness might be impaired due to the arbitration of accesses Concurrent and parallel programming 5 Parallel programming • Ad-hoc concurrent programming languages • Development tools ◦ Compilers ◦ MPI, OpenMP, libraries ◦ Tools to debug parallel code (gdb, valgrind) • Writing parallel code is an art ◦ There are approaches, not prepackaged solutions ◦ Every machine has its own singularities ◦ Every problem to face has different requisites ◦ The most efficient parallel algorithm might not be the most intuitive one Concurrent and parallel programming 6 What do we want from parallel programs? • Safety: nothing wrong happens (Correctness) ◦ parallel versions of our programs should be correct as their sequential implementations • Liveliness: something good happens eventually (Progress) ◦ if a sequential program terminates with a given input, we want that its parallel alternative also completes with the same input • Performance ◦ we want to exploit our parallel hardware Concurrent and parallel programming 7 Correctness conditions Progress conditions
    [Show full text]
  • In the Beginning... Example Critical Sections / Mutual Exclusion Critical
    Temporal relations • Instructions executed by a single thread are totally CSE 451: Operating Systems ordered Spring 2013 – A < B < C < … • Absent synchronization, instructions executed by distinct threads must be considered unordered / Module 7 simultaneous Synchronization – Not X < X’, and not X’ < X Ed Lazowska [email protected] Allen Center 570 © 2013 Gribble, Lazowska, Levy, Zahorjan © 2013 Gribble, Lazowska, Levy, Zahorjan 2 Critical Sections / Mutual Exclusion Example: ExampleIn the beginning... • Sequences of instructions that may get incorrect main() Y-axis is “time.” results if executed simultaneously are called critical A sections Could be one CPU, could pthread_create() • (We also use the term race condition to refer to a be multiple CPUs (cores). situation in which the results depend on timing) B foo() A' • Mutual exclusion means “not simultaneous” – A < B or B < A • A < B < C – We don’t care which B' • A' < B' • Forcing mutual exclusion between two critical section C • A < A' executions is sufficient to ensure correct execution – • C == A' guarantees ordering • C == B' • One way to guarantee mutually exclusive execution is using locks © 2013 Gribble, Lazowska, Levy, Zahorjan 3 © 2013 Gribble, Lazowska, Levy, Zahorjan 4 CriticalCritical sections When do critical sections arise? is the “happens-before” relation • One common pattern: T1 T2 T1 T2 T1 T2 – read-modify-write of – a shared value (variable) – in code that can be executed concurrently (Note: There may be only one copy of the code (e.g., a procedure), but it
    [Show full text]
  • The Deadlock Problem
    The deadlock problem n A set of blocked processes each holding a resource and waiting to acquire a resource held by another process. n Example n locks A and B Deadlocks P0 P1 lock (A); lock (B) lock (B); lock (A) Arvind Krishnamurthy Spring 2004 n Example n System has 2 tape drives. n P1 and P2 each hold one tape drive and each needs another one. n Deadlock implies starvation (opposite not true) The dining philosophers problem Deadlock Conditions n Five philosophers around a table --- thinking or eating n Five plates of food + five forks (placed between each n Deadlock can arise if four conditions hold simultaneously: plate) n Each philosopher needs two forks to eat n Mutual exclusion: limited access to limited resources n Hold and wait void philosopher (int i) { while (TRUE) { n No preemption: a resource can be released only voluntarily think(); take_fork (i); n Circular wait take_fork ((i+1) % 5); eat(); put_fork (i); put_fork ((i+1) % 5); } } Resource-allocation graph Resource-Allocation & Waits-For Graphs A set of vertices V and a set of edges E. n V is partitioned into two types: n P = {P1, P2, …, Pn }, the set consisting of all the processes in the system. n R = {R1, R2, …, Rm }, the set consisting of all resource types in the system (CPU cycles, memory space, I/O devices) n Each resource type Ri has Wi instances. n request edge – directed edge P1 ® Rj Resource-Allocation Graph Corresponding wait-for graph n assignment edge – directed edge Rj ® Pi 1 Deadlocks with multiple resources Another example n P1 is waiting for P2 or P3, P3 is waiting for P1 or P4 P1 is waiting for P2, P2 is waiting for P3, P3 is waiting for P1 or P2 n Is there a deadlock situation here? Is this a deadlock scenario? Announcements Methods for handling deadlocks th n Midterm exam on Feb.
    [Show full text]
  • 05 Mutex Algorithms I
    G52CON: Concepts of Concurrency Lecture 5: Algorithms for Mutual Exclusion "I Brian Logan School of Computer Science [email protected] Outline of this lecture" •# mutual exclusion protocols •# criteria for a solution –# safety properties –# liveness properties •# simple spin lock •# spin lock using turns •# spin lock using the Test-and-Set special instruction © Brian Logan 2014 G52CON Lecture 5: Algorithms for Mutual 2 Exclusion I Archetypical mutual exclusion" Any program consisting of n processes for which mutual exclusion is required between critical sections belonging to just one class can be written: // Process 1 // Process 2 ... // Process n init1; init2; initn; while(true) { while(true) { while(true) { crit1; crit2; critn; rem1; rem2; remn; } } } where initi denotes any (non-critical) initialisation, criti denotes a critical section, remi denotes the (non-critical) remainder of the program, and i is 1, 2, … n. © Brian Logan 2014 G52CON Lecture 5: Algorithms for Mutual 3 Exclusion I Archetypical mutual exclusion" We assume that init, crit and rem may be of any size: •#crit must execute in a finite time—process does not terminate in crit •#init and rem may be infinite—process may terminate in init or rem •#crit and rem may vary from one pass through the while loop to the next With these assumptions it is possible to rewrite any process with critical sections into the archetypical form. © Brian Logan 2014 G52CON Lecture 5: Algorithms for Mutual 4 Exclusion I Ornamental Gardens problem" // West turnstile // East turnstile init1; init2; while(true) { while(true) { // wait for turnstile // wait for turnstile < count = count + 1; > < count = count + 1; > // other stuff ..
    [Show full text]
  • Arxiv:2012.03692V1 [Cs.DC] 7 Dec 2020
    Separation and Equivalence results for the Crash-stop and Crash-recovery Shared Memory Models Ohad Ben-Baruch Srivatsan Ravi Ben-Gurion University, Israel University of Southern California, USA [email protected] [email protected] December 8, 2020 Abstract Linearizability, the traditional correctness condition for concurrent data structures is considered insufficient for the non-volatile shared memory model where processes recover following a crash. For this crash-recovery shared memory model, strict-linearizability is considered appropriate since, unlike linearizability, it ensures operations that crash take effect prior to the crash or not at all. This work formalizes and answers the question of whether an implementation of a data type derived for the crash-stop shared memory model is also strict-linearizable in the crash-recovery model. This work presents a rigorous study to prove how helping mechanisms, typically employed by non-blocking implementations, is the algorithmic abstraction that delineates linearizabil- ity from strict-linearizability. Our first contribution formalizes the crash-recovery model and how explicit process crashes and recovery introduces further dimensionalities over the stan- dard crash-stop shared memory model. We make the following technical contributions that answer the question of whether a help-free linearizable implementation is strict-linearizable in the crash-recovery model: (i) we prove surprisingly that there exist linearizable imple- mentations of object types that are help-free, yet not strict-linearizable; (ii) we then present a natural definition of help-freedom to prove that any obstruction-free, linearizable and help-free implementation of a total object type is also strict-linearizable. The next technical contribution addresses the question of whether a strict-linearizable implementation in the crash-recovery model is also help-free linearizable in the crash-stop model.
    [Show full text]