Prevent race conditions in kernel code for a uni-processor

Assignment Help Basic Computer Science
Reference no: EM13696132

In early Unix kernels the approach used to avoid race conditions in kernel code was to use a combination of the following two techniques: (i) non- preemptive scheduling of threads when they are running in privileged mode and (ii) interrupt disabling for those short sections of kernel code that manipulate data used by interrupt handlers.
(a) Explain how and why these techniques, when used together, are sufficient to prevent race conditions in kernel code for a uni-processor operating system.
(b) Explain why it is insufficient to use one or other technique in isolation. (c) Explain why the approach of using them together is still not sufficient for a shared memory multi-processor operating system, and describe a technique that would solve the problem in a shared memory multi- processor operating system.

Reference no: EM13696132

Questions Cloud

Discuss how current or potential employers : From the e-Activity, discuss how current or potential employers might be able to use the information you found and possible steps that could be taken to help ensure your privacy. Provide specific examples to support your response.
Summarize by outlining the sequence of operations : Explain how an operating system can temporarily pass control of the CPU over to user code without risking an indefinite loss of control. Discuss the roles of timer interrupts, privileged mode operation, and memory protection and explain why all of..
The game of nim is played with a collection of piles of stic : The game of Nim is played with a collection of piles of sticks. In one move a player may remove any nonzero number of sticks from a single pile. The players alternately take turns making moves. The player who removes the very last stick loses. Say..
Describe how concepts such as risc : In this six pages research paper, you will investigate the evolution of and current trends in improving system performance with concepts such as RISC, pipelining, cache memory, and virtual memory. In this paper you must, as part of your conclus..
Prevent race conditions in kernel code for a uni-processor : In early Unix kernels the approach used to avoid race conditions in kernel code was to use a combination of the following two techniques: (i) non- preemptive scheduling of threads when they are running in privileged mode and (ii) interrupt disabli..
Perform dynamic address translation : Perform dynamic address translation
Computer forensics examiner get involved with, and how : Other than the two basic types of computer crimes above, what non-computer crimes might a computer forensics examiner get involved with, and how?
The convergence of different devices such as cameras : Think about how mobile our computing devices have become and the convergence of different devices such as cameras, phones, and computers. What do you think the computer of the future will be like? What capabilities will it have that computers ..
The southern tiny college to develop student registration : You have been employed by the Southern Tiny College to develop Student Registration System. To understand the functions of Registrar Office, you have spent some time talking to various personnel in the Registrar Office and also you've examined ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Using wireshark note the ip address and tcp port number

Using wireshark note the IP address and TCP port number used by your client computer (source) to transfer the file to any FTP server?

  Multiplexing-modulation techniques-line of sight propagation

Write about Multiplexing and Modulation techniques in detail with respect to Line of Sight Propagation. What is meant by Geo stationary orbit? Write down the advantages of Geo synchronous satellites?

  Explain how has science enhanced quality of life

Explain typical day in your life from time you wake up, until time you go to bed. Explain how science influences you and your routine throughout the day.

  Explain implications of copyrights on usage of web site

Study and explain copyright implications associated to Web site development. Write down minimum of 350 words explaining the implications of copyrights on usage of content on Web site.

  What will be the average access time

What will be the average access time when both read and write are taken into consideration with write through strategy?

  Register mapping and then any possible

First do the register mapping and then any possible instruction reordering. How many machine registers are used? Has there been any pipeline improvement?

  Review the car-caravan analogy

Review the car-caravan analogy

  The hyperlink from the homepage to the other pages

The hyperlink from the homepage to the other pages should be contained in an unordered list.

  Translate the following function into mips assembly language

Translate the following function into MIPS assembly language

  Diversity of living things i have to do a project in one

i have to do a project in one area of the diversity of living things we i choose the 5 kingdoms i need to include

  The three common security goals

1. Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial,..

  Explain elements of enterprise information security policy

Write and explain briefly the three kinds of information security policy as described by NIST SP 800-14. Write and explain briefly four elements that must be present in Enterprise Information Security Policy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd