1993 International Conference on Parallel Processing - ICPP'93 Vol2 1993
DOI: 10.1109/icpp.1993.21
|View full text |Cite
|
Sign up to set email alerts
|

A Fair Fast Scalable Rea,der-Writer Lock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

1994
1994
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…Preempting and scheduling processes in an order inconsistent with their order in the lock's queue can degrade performance dramatically. Kontothanassis et al [18] present preemption-safe (or "scheduler-conscious") versions of the ticket lock, the MCS lock [25], and Krieger et al's reader-writer lock [19]. These algorithms detect the descheduling of critical processes using handshaking and/or a widened kernel-user interface, and use this information to avoid handing the lock to a preempted process.…”
Section: Preemption-safe Lockingmentioning
confidence: 99%
“…Preempting and scheduling processes in an order inconsistent with their order in the lock's queue can degrade performance dramatically. Kontothanassis et al [18] present preemption-safe (or "scheduler-conscious") versions of the ticket lock, the MCS lock [25], and Krieger et al's reader-writer lock [19]. These algorithms detect the descheduling of critical processes using handshaking and/or a widened kernel-user interface, and use this information to avoid handing the lock to a preempted process.…”
Section: Preemption-safe Lockingmentioning
confidence: 99%
“…This is to ensure that always the strongest possible annotation is used for gated actions. Then, each gated action whose gate does not contradict with p is annotated with p (lines [8][9][10]. Then, until a valid VC is generated, those gated actions whose modified assertions may be violated (elements of the F ailed set at line 15, returned by Z3) are restored to the values they had at the start of the outer loop iteration (lines [16][17].…”
Section: Annotating Programs -Algorithmmentioning
confidence: 99%
“…The implementation uses the num active and owner variables similar to our readers and write variables in Figure 3; a use of the lock in a program can be specified by the policy S rwlock ((num active==0 && owner==0), (num active>0 && owner==1)). The implementations in the ACE framework [14] and in [10], can be encoded similarly. Philo.…”
Section: Experiencementioning
confidence: 99%
“…Markatos [27] uses a doubly-linked list in a queue-based lock to replace FIFO order with highest-priority-first, for real-time systems. Others have shown how to build queue-based scalable reader-writer 10cks [19,31]. Yang and Anderson [44] have shown how to use localonly spinning to improve the performance of locks that use no atomic memory operations other than loads and stores.…”
Section: Scalable Locksmentioning
confidence: 99%