SlideShare a Scribd company logo
Describe synchronization techniques used by programmers who develop applications for
LUBUNTU (LINUX)
Solution
Concurrency and locking: Synchronization methods are necessary when the property of
concurrency exists. Concurrency exists when two or more processes execute over the same time
period and potentially interact with one another. The Linux kernel supports concurrency in both
modes. The kernel itself is dynamic, and race conditions can be created in a number of ways. The
Linux kernel also supports multiprocessing known as symmetric multiprocessing (SMP).
Concurrency can occur on uniprocessor (UP) hosts where multiple threads share the same CPU
and preemption creates race conditions. Preemption is sharing the CPU transparently by
temporarily pausing one thread to allow another to execute. A race condition occurs when two or
more threads manipulate a shared data item and the result depends upon timing of the execution.
Concurrency also exists in multiprocessor (MP) machines, where threads executing
simultaneously in each processor share the same data. Note that in the MP case there is true
parallelism because the threads execute simultaneously. In the UP case, parallelism is created by
preemption. The difficulties of concurrency exist in both modes.
To combat the issue of race conditions, the concept of a critical section was created. A critical
section is a portion of code that is protected against multiple access. This portion of code can
manipulate shared data or a shared service (such as a hardware peripheral). Critical sections
operate on the principle of mutual exclusion.
Race condition Situation where simultaneous manipulation of a resource by two or more threads
causes inconsistent results.
Critical section Segment of code that coordinates access to a shared resource.
Mutual exclusion Property of software that ensures exclusive access to a shared resource.
Deadlock Special condition created by two or more processes and two or more resource locks
that keep processes from doing productive work.
Linux synchronization methods
Now that you have a little theory under your belt and an understanding of the problem to be
solved, let's look at the various ways that Linux supports concurrency and mutual exclusion. In
the early days, mutual exclusion was provided by disabling interrupts, but this form of locking is
inefficient (even though you can still find traces of it in the kernel). This method also doesn't
scale well and doesn't guarantee mutual exclusion on other processors.
The atomic operators are ideal for situations where the data you need to protect is simple,
such as a counter. While simple, the atomic API provides a number of operators for a variety of
situations. Here's a sample use of the API.
To declare an atomic variable, you simply declare a variable of type atomic_t. This structure
contains a single int element. Next, you ensure that your atomic variable is initialized using the
ATOMIC_INIT symbolic constant. In the case shown in Listing 1, the atomic counter is set to
zero. It's also possible to initialize the atomic variable at runtime using the atomic_set function.
1. Creating and initializing an atomic variable
The atomic API supports a rich set of functions covering many use cases. You can read the
contents of an atomic variable with atomic_read and also add a specific value to a variable with
atomic_add. The most common operation is to simply increment the variable, which is provided
withatomic_inc. The subtraction operators are also available, providing the converse of the add
and increment operations. Listing 2 demonstrates these functions.
2. Simple arithmetic atomic functions
The API also supports a number of other common use cases, including the operate-and-test
routines. These allow the atomic variable to be manipulated and then tested (all performed as one
atomic operation). One special function called atomic_add_negative is used to add to the atomic
variable and then return true if the resulting value is negative. This is used by some of the
architecture-dependent semaphore functions in the kernel.
While many of the functions do not return the value of the variable, two in particular operate and
return the resulting value (atomic_add_returnand atomic_sub_return)
3. Operate-and-test atomic functions
If your architecture supports 64-bit long types (BITS_PER_LONG is 64), then long_t atomic
operations are available. You can see the available long operations in linux/include/asm-
generic/atomic.h.
You'll also find support for bitmask operations with the atomic API. Rather than arithmetic
operations (as explored earlier), you'll find set and clear operations. Many drivers use these
atomic operations, particularly SCSI. The use of bitmask atomic operations is slightly different
than arithmetic because only two operations are available (set mask and clear mask). You
provide a value and the bitmask upon which the operation is to be performed, as shown in
Listing 4.
4. Bitmask atomic functions
Atomic API prototypes
Spinlocks
Spinlocks are a special way of ensuring mutual exclusion using a busy-wait lock. When the lock
is available, it is taken, the mutually-exclusive action is performed, and then the lock is released.
If the lock is not available, the thread busy-waits on the lock until it is available. While busy-
waiting may seem inefficient, it can actually be faster than putting the thread to sleep and then
waking it up later when the lock is available.
Spinlocks are really only useful in SMP systems, but because your code will end up running on
an SMP system, adding them for UP systems is the right thing to do.
Spinlocks are available in two varieties: full locks and reader/writer locks. Let's look at the full
lock variety first.
First you create a new spinlock through a simple declaration. This can be initialized in place or
through a call to spin_lock_init. Each of the variants shown in Listing 5 accomplishes the same
result.
5. Creating and initializing a spinlock
Now that you have a spinlock defined, there are a number of locking variants that you can use.
Each is useful in different contexts.
First is the spin_lock and spin_unlock variant shown in Listing 6. This is the simplest and
performs no interrupt disabling but includes full memory barriers. This variant assumes no
interactions with interrupt handlers and this lock.
6. Spinlock lock and unlock functions
Next is the irqsave and irqrestore pair shown in Listing 7. The spin_lock_irqsave function
acquires the spinlock and disables interrupts on the local processor (in the SMP case). The
spin_unlock_irqrestore function releases the spinlock and restores the interrupts (via theflags
argument).
7. Spinlock variant with local CPU interrupt disable
A less safe variant of spin_lock_irqsave/spin_unlock_irqrestore is
spin_lock_irq/spin_unlock_irq. I recommend that you avoid this variant because it makes
assumptions about interrupt states.
Finally, if your kernel thread shares data with a bottom half, then you can use another variant of
the spinlock. A bottom half is a way to defer work from interrupt handling to be done later in a
device driver. This version of the spinlock disables soft interrupts on the local CPU. This has the
effect of preventing softirqs, tasklets, and bottom halves from running on the local CPU. This
variant is shown in Listing 8.
8. Spinlock functions for bottom-half interactions
Reader/writer spinlocks
In many cases, access to data is indicated by many readers and less writers (accessing the data
for read is more common than accessing for write). To support this model, reader/writer locks
were created. What's interesting with this model is that multiple readers are permitted access to
the data at one time, but only one writer. If a writer has the lock, no reader is allowed to enter the
critical section. If only a reader has the lock, then multiple readers are permitted in the critical
section. Listing 9 demonstrates this model.
9. Reader/writer spinlock functions
You'll also find variants of reader/writer spinlocks for bottom halves and interrupt request (IRQ)
saving depending on the situation for which you require the lock. Obviously, if your use of the
lock is reader/writer in nature, this spinlock should be used over the standard spinlock, which
doesn't differentiate between readers and writers.
Kernel mutexes
Mutexes are available in the kernel as a way to accomplish semaphore behavior. The kernel
mutex is implemented on top of the atomic API, though this is not visible to the kernel user. The
mutex is simple, but there are some rules you should remember. Only one task may hold the
mutex at a time, and only this task can unlock the mutex. There is no recursive locking or
unlocking of mutexes, and mutexes may not be used within interrupt context. But mutexes are
faster and more compact than the current kernel semaphore option, so if they fit your need,
they're the choice to use.
You create and initialize a mutex in one operation through the DEFINE_MUTEX macro. This
creates a new mutex and initializes the structure. You can see this implementation in
./linux/include/linux/mutex.h.
The mutex API provides five functions: three are used for locking, one for unlocking, and
another for testing a mutex. Let's first look at the locking functions. The first function,
mutex_trylock, is used in situations where you want the lock immediately or you want control to
be returned to you if the mutex is not available. This function is shown in Listing 10.
10. Trying to grab a mutex with mutex_trylock
If, instead, you want to wait for the lock, you can call mutex_lock. This call returns if the mutex
is available; otherwise, it sleeps until the mutex is available. In either case, when control is
returned, the caller holds the mutex. Finally, the mutex_lock_interruptible is used in situations
where the caller may sleep. In this case, the function may return -EINTR. Both of these calls are
shown in Listing 11.
11. Locking a mutex with the potential to sleep
After a mutex is locked, it must be unlocked. This is accomplished with the mutex_unlock
function. This function cannot be called from interrupt context. Finally, you can check the status
of a mutex through a call to mutex_is_locked. This call actually compiles to an inline function. If
the mutex is held (locked), then one is returned; otherwise, zero. Listing 12 demonstrates these
functions.
12. Testing a mutex with mutex_is_locked
While the mutex API has its constraints because it's based upon the atomic API, it's efficient
and, therefore, worthwhile if it fits your need.

More Related Content

PDF
Linux kernel development_ch9-10_20120410
PDF
Linux kernel development chapter 10
PPT
Synchronization linux
DOC
Linux synchronization tools
PDF
Kernel locking
PDF
Linux Locking Mechanisms
PDF
AOS Lab 4: If you liked it, then you should have put a “lock” on it
PPTX
Memory model
Linux kernel development_ch9-10_20120410
Linux kernel development chapter 10
Synchronization linux
Linux synchronization tools
Kernel locking
Linux Locking Mechanisms
AOS Lab 4: If you liked it, then you should have put a “lock” on it
Memory model

Similar to Describe synchronization techniques used by programmers who develop .pdf (20)

PPTX
9-Operating Systems -Synchronization, interprocess communication, deadlock.pptx
PPTX
Operating Systems
PPTX
UNIT -5 EMBEDDED DRIVERS AND APPLICATION PORTING.pptx
PPT
Lecture18-19 (1).ppt
PPTX
Operating system 24 mutex locks and semaphores
PDF
Linux Internals - Interview essentials - 1.0
PPT
Os4
PDF
spinlock.pdf
PPTX
prez4_operacni_systemy principles and fundamentals
PPTX
Computer architecture related concepts, process
ODP
Multithreading 101
PPT
Intro Basic of OS .ppt
PDF
PART-3 : Mastering RTOS FreeRTOS and STM32Fx with Debugging
PPTX
Process management
PPT
Processes and Thread OS_Tanenbaum_3e
PPTX
interprocess communation and security in linux.pptx
PPTX
Computer Operating Systems Concurrency Slide
9-Operating Systems -Synchronization, interprocess communication, deadlock.pptx
Operating Systems
UNIT -5 EMBEDDED DRIVERS AND APPLICATION PORTING.pptx
Lecture18-19 (1).ppt
Operating system 24 mutex locks and semaphores
Linux Internals - Interview essentials - 1.0
Os4
spinlock.pdf
prez4_operacni_systemy principles and fundamentals
Computer architecture related concepts, process
Multithreading 101
Intro Basic of OS .ppt
PART-3 : Mastering RTOS FreeRTOS and STM32Fx with Debugging
Process management
Processes and Thread OS_Tanenbaum_3e
interprocess communation and security in linux.pptx
Computer Operating Systems Concurrency Slide
Ad

More from excellentmobiles (20)

PDF
How is the spleen like a lymph node How is it unlike a lymph node .pdf
PDF
Give two advantages and two disadvantages of placing IO function in.pdf
PDF
Frances drop in output per capita relative to U.S. output per capi.pdf
PDF
Describe the effect of cyanide ion, CN^-, on oxidative phosphorylatio.pdf
PDF
Barney had a bag of cookies. He ate 35 in the first 10 minutes. He a.pdf
PDF
2.4 Write a stream –based echo server and a client sending message t.pdf
PDF
11. In the United States, financial statement audits of non-public co.pdf
PDF
When you make the following dihybrid testcross MmPp x mmpp, what is .pdf
PDF
Why do you think nursing core competencies were selectedWhy do .pdf
PDF
Which of the following is true of water It is a phospholipid It is.pdf
PDF
Which of the following are considered to be alive and whyProteins.pdf
PDF
Which of the following are actually vector spaces over the real numbe.pdf
PDF
What is the change of entropy of water (Lf = 0.333 MJkg, Lv = 2.26 .pdf
PDF
What are the epidemiological characteristics of infection with avian.pdf
PDF
What benefits if any, are inherent with interactive communication fo.pdf
PDF
What are the features of linear and charter What are the featur.pdf
PDF
W hy is D the answer Why does it not indicate the same relations.pdf
PDF
what are handles, WS private, WS shared and Working set used for in .pdf
PDF
USA Today conducted a survey asking readers, “What is the most hilar.pdf
PDF
The distance between two successive minima of a transverse wave i.pdf
How is the spleen like a lymph node How is it unlike a lymph node .pdf
Give two advantages and two disadvantages of placing IO function in.pdf
Frances drop in output per capita relative to U.S. output per capi.pdf
Describe the effect of cyanide ion, CN^-, on oxidative phosphorylatio.pdf
Barney had a bag of cookies. He ate 35 in the first 10 minutes. He a.pdf
2.4 Write a stream –based echo server and a client sending message t.pdf
11. In the United States, financial statement audits of non-public co.pdf
When you make the following dihybrid testcross MmPp x mmpp, what is .pdf
Why do you think nursing core competencies were selectedWhy do .pdf
Which of the following is true of water It is a phospholipid It is.pdf
Which of the following are considered to be alive and whyProteins.pdf
Which of the following are actually vector spaces over the real numbe.pdf
What is the change of entropy of water (Lf = 0.333 MJkg, Lv = 2.26 .pdf
What are the epidemiological characteristics of infection with avian.pdf
What benefits if any, are inherent with interactive communication fo.pdf
What are the features of linear and charter What are the featur.pdf
W hy is D the answer Why does it not indicate the same relations.pdf
what are handles, WS private, WS shared and Working set used for in .pdf
USA Today conducted a survey asking readers, “What is the most hilar.pdf
The distance between two successive minima of a transverse wave i.pdf
Ad

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Cell Structure & Organelles in detailed.
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
TR - Agricultural Crops Production NC III.pdf
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Describe synchronization techniques used by programmers who develop .pdf

  • 1. Describe synchronization techniques used by programmers who develop applications for LUBUNTU (LINUX) Solution Concurrency and locking: Synchronization methods are necessary when the property of concurrency exists. Concurrency exists when two or more processes execute over the same time period and potentially interact with one another. The Linux kernel supports concurrency in both modes. The kernel itself is dynamic, and race conditions can be created in a number of ways. The Linux kernel also supports multiprocessing known as symmetric multiprocessing (SMP). Concurrency can occur on uniprocessor (UP) hosts where multiple threads share the same CPU and preemption creates race conditions. Preemption is sharing the CPU transparently by temporarily pausing one thread to allow another to execute. A race condition occurs when two or more threads manipulate a shared data item and the result depends upon timing of the execution. Concurrency also exists in multiprocessor (MP) machines, where threads executing simultaneously in each processor share the same data. Note that in the MP case there is true parallelism because the threads execute simultaneously. In the UP case, parallelism is created by preemption. The difficulties of concurrency exist in both modes. To combat the issue of race conditions, the concept of a critical section was created. A critical section is a portion of code that is protected against multiple access. This portion of code can manipulate shared data or a shared service (such as a hardware peripheral). Critical sections operate on the principle of mutual exclusion. Race condition Situation where simultaneous manipulation of a resource by two or more threads causes inconsistent results. Critical section Segment of code that coordinates access to a shared resource. Mutual exclusion Property of software that ensures exclusive access to a shared resource. Deadlock Special condition created by two or more processes and two or more resource locks that keep processes from doing productive work. Linux synchronization methods Now that you have a little theory under your belt and an understanding of the problem to be solved, let's look at the various ways that Linux supports concurrency and mutual exclusion. In the early days, mutual exclusion was provided by disabling interrupts, but this form of locking is inefficient (even though you can still find traces of it in the kernel). This method also doesn't scale well and doesn't guarantee mutual exclusion on other processors. The atomic operators are ideal for situations where the data you need to protect is simple,
  • 2. such as a counter. While simple, the atomic API provides a number of operators for a variety of situations. Here's a sample use of the API. To declare an atomic variable, you simply declare a variable of type atomic_t. This structure contains a single int element. Next, you ensure that your atomic variable is initialized using the ATOMIC_INIT symbolic constant. In the case shown in Listing 1, the atomic counter is set to zero. It's also possible to initialize the atomic variable at runtime using the atomic_set function. 1. Creating and initializing an atomic variable The atomic API supports a rich set of functions covering many use cases. You can read the contents of an atomic variable with atomic_read and also add a specific value to a variable with atomic_add. The most common operation is to simply increment the variable, which is provided withatomic_inc. The subtraction operators are also available, providing the converse of the add and increment operations. Listing 2 demonstrates these functions. 2. Simple arithmetic atomic functions The API also supports a number of other common use cases, including the operate-and-test routines. These allow the atomic variable to be manipulated and then tested (all performed as one atomic operation). One special function called atomic_add_negative is used to add to the atomic variable and then return true if the resulting value is negative. This is used by some of the architecture-dependent semaphore functions in the kernel. While many of the functions do not return the value of the variable, two in particular operate and return the resulting value (atomic_add_returnand atomic_sub_return) 3. Operate-and-test atomic functions If your architecture supports 64-bit long types (BITS_PER_LONG is 64), then long_t atomic operations are available. You can see the available long operations in linux/include/asm- generic/atomic.h. You'll also find support for bitmask operations with the atomic API. Rather than arithmetic operations (as explored earlier), you'll find set and clear operations. Many drivers use these atomic operations, particularly SCSI. The use of bitmask atomic operations is slightly different than arithmetic because only two operations are available (set mask and clear mask). You provide a value and the bitmask upon which the operation is to be performed, as shown in Listing 4. 4. Bitmask atomic functions Atomic API prototypes Spinlocks Spinlocks are a special way of ensuring mutual exclusion using a busy-wait lock. When the lock is available, it is taken, the mutually-exclusive action is performed, and then the lock is released. If the lock is not available, the thread busy-waits on the lock until it is available. While busy-
  • 3. waiting may seem inefficient, it can actually be faster than putting the thread to sleep and then waking it up later when the lock is available. Spinlocks are really only useful in SMP systems, but because your code will end up running on an SMP system, adding them for UP systems is the right thing to do. Spinlocks are available in two varieties: full locks and reader/writer locks. Let's look at the full lock variety first. First you create a new spinlock through a simple declaration. This can be initialized in place or through a call to spin_lock_init. Each of the variants shown in Listing 5 accomplishes the same result. 5. Creating and initializing a spinlock Now that you have a spinlock defined, there are a number of locking variants that you can use. Each is useful in different contexts. First is the spin_lock and spin_unlock variant shown in Listing 6. This is the simplest and performs no interrupt disabling but includes full memory barriers. This variant assumes no interactions with interrupt handlers and this lock. 6. Spinlock lock and unlock functions Next is the irqsave and irqrestore pair shown in Listing 7. The spin_lock_irqsave function acquires the spinlock and disables interrupts on the local processor (in the SMP case). The spin_unlock_irqrestore function releases the spinlock and restores the interrupts (via theflags argument). 7. Spinlock variant with local CPU interrupt disable A less safe variant of spin_lock_irqsave/spin_unlock_irqrestore is spin_lock_irq/spin_unlock_irq. I recommend that you avoid this variant because it makes assumptions about interrupt states. Finally, if your kernel thread shares data with a bottom half, then you can use another variant of the spinlock. A bottom half is a way to defer work from interrupt handling to be done later in a device driver. This version of the spinlock disables soft interrupts on the local CPU. This has the effect of preventing softirqs, tasklets, and bottom halves from running on the local CPU. This variant is shown in Listing 8. 8. Spinlock functions for bottom-half interactions Reader/writer spinlocks In many cases, access to data is indicated by many readers and less writers (accessing the data for read is more common than accessing for write). To support this model, reader/writer locks were created. What's interesting with this model is that multiple readers are permitted access to the data at one time, but only one writer. If a writer has the lock, no reader is allowed to enter the critical section. If only a reader has the lock, then multiple readers are permitted in the critical
  • 4. section. Listing 9 demonstrates this model. 9. Reader/writer spinlock functions You'll also find variants of reader/writer spinlocks for bottom halves and interrupt request (IRQ) saving depending on the situation for which you require the lock. Obviously, if your use of the lock is reader/writer in nature, this spinlock should be used over the standard spinlock, which doesn't differentiate between readers and writers. Kernel mutexes Mutexes are available in the kernel as a way to accomplish semaphore behavior. The kernel mutex is implemented on top of the atomic API, though this is not visible to the kernel user. The mutex is simple, but there are some rules you should remember. Only one task may hold the mutex at a time, and only this task can unlock the mutex. There is no recursive locking or unlocking of mutexes, and mutexes may not be used within interrupt context. But mutexes are faster and more compact than the current kernel semaphore option, so if they fit your need, they're the choice to use. You create and initialize a mutex in one operation through the DEFINE_MUTEX macro. This creates a new mutex and initializes the structure. You can see this implementation in ./linux/include/linux/mutex.h. The mutex API provides five functions: three are used for locking, one for unlocking, and another for testing a mutex. Let's first look at the locking functions. The first function, mutex_trylock, is used in situations where you want the lock immediately or you want control to be returned to you if the mutex is not available. This function is shown in Listing 10. 10. Trying to grab a mutex with mutex_trylock If, instead, you want to wait for the lock, you can call mutex_lock. This call returns if the mutex is available; otherwise, it sleeps until the mutex is available. In either case, when control is returned, the caller holds the mutex. Finally, the mutex_lock_interruptible is used in situations where the caller may sleep. In this case, the function may return -EINTR. Both of these calls are shown in Listing 11. 11. Locking a mutex with the potential to sleep After a mutex is locked, it must be unlocked. This is accomplished with the mutex_unlock function. This function cannot be called from interrupt context. Finally, you can check the status of a mutex through a call to mutex_is_locked. This call actually compiles to an inline function. If the mutex is held (locked), then one is returned; otherwise, zero. Listing 12 demonstrates these functions. 12. Testing a mutex with mutex_is_locked While the mutex API has its constraints because it's based upon the atomic API, it's efficient and, therefore, worthwhile if it fits your need.