Identify the critical races, computer science, Basic Computer Science

Assignment Help:
1. The standard way for debuggers to plant breakpoints in a program in RAM (whatever the processor instruction set) is to save the breakpointed instruction and replace it by a jump to the breakpoint handling code. After the breakpoint is triggered, the saved instruction is restored in its original place. If the interactive dialogue with the debugger during the breakpoint indicates that that the triggered breakpoint is to be removed, execution of the program can be resumed simply by jumping to the instruction that had been breakponted. However, if the dialogue with the debugger indicates that the breakpoint is to remain in place when execution of the program is resumed, implementation is more complicated. Execution of the saved instruction could be emulated, but this is difficult to do, ensuring all side effects such as condition code setting and exception triggering are performed correctly, as well as following all addressing modes, such as PC relative. It is much easier simply to execute the breakpointed instruction in place, but to plant another breakpoint on a subsequent instruction in the same basic block, usually the immediate successor to the original breakpoint, so that the breakpoint handler can regain control in order to replant the original breakpoint and remove the secondary one. This obviously has some challenges if the successor of the breakpointed instruction cannot be statically predicted, for instance if the breakpointed instruction is a conditional jump, but a common solution is simply to ban breakpointing such instructions.
Identify the critical races that exist with this scheme if the program is executed by multiple threads, possibly multiple cores or multiple processors. Use pseudo-code to illustrate how you would resolve these issues.

Related Discussions:- Identify the critical races, computer science

Finite automata, find the regular expression of(a/?)(a/b)?

find the regular expression of(a/?)(a/b)?

Write a program to solve a maze 10x10, write a program to solve a 10x10 maz...

write a program to solve a 10x10 maze. prompt the user for an input text file containing ten rows(ten characters on each row). Use following characters in the input file: * startin

Development of personnel computer operating system, Development of Personne...

Development of Personnel Computer Operating System: The next important breakthrough in computer use occurred in 1982, with the introduction of the IBM personal computer. The I

Poset , 1. (40 points) Add a course drop method to the system that you impl...

1. (40 points) Add a course drop method to the system that you implemented in Problem Set 1. Modularize your new implementation properly. For any new methods that you introduce: 1.

Data output, Data Output : Processed data is no use to you if you cannot u...

Data Output : Processed data is no use to you if you cannot use it. Once data has been processed, you will either: (1) Send it as a data file to another system, e.g. write a fi

Merchant problem, Pebble Merchant Problem Description There is a pebble mer...

Pebble Merchant Problem Description There is a pebble merchant. He sells the pebbles, that are used for shining the floor. His main duty is to take the length of the room’s sides.

Artificial intelligence-representations/languages used, Many persons are ta...

Many persons are taught AI with the opening line: " The three most important things in AI are representation, representation and representation ". While selecting the method of

What is fragmentation? explain its significance, Question A What is fragme...

Question A What is fragmentation? Explain its significance Question B Briefly discuss the functions of transport layer Question C What is CIDR? Explain Question D W

Electronic mail , Electronic mail is another PC to PC and PC to mainframe ...

Electronic mail is another PC to PC and PC to mainframe data exchange. If you subscribe to an electronic mail service, it will enable your PC to gain access to a 'mailbox' on a ma

Read only memory (rom), Read only memory (rom): The problem with RAM is...

Read only memory (rom): The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd