Process Management and Synchronization
Process Management and Synchronization
Process Management and Synchronization - The Critical Section Problem, Synchronization Hardware,
Semaphores, and Classical Problems of Synchronization, Critical Regions, Monitors
Consider a system consisting of n processes {P0, P1, …, Pn - 1}. Each process has a segment of
table, writing a file, etc., when one process is executing in its critical section, no other process is
allowed into its critical section.
Design a protocol in such a way that the processes can cooperate each other.
Requirements:-
• Mutual exclusion - Only one process can execute their critical sections at any time.
• Progress - If no process is executing in its critical section, any other process can enter based on the
selection.
• Bounded waiting - Bounded waiting bounds on the number of times that the other processes are
allowed to enter their critical sections after a process has made a request to enter into its critical section
and before that the request is granted.
70
Synchronization With Hardware
Certain features of the hardware can make programming task easier and it will alsoimprove system efficiency
in solving critical-section problem. For achieving this in uniprocessor environment we need to disable the
interrupts when a shared variable is being modified. Whereas in multiprocessor environment disabling the
interrupts isa time consuming process and system efficiency also decreases.
Syntax for interrupt disabling process
repeat
disable interrupts;
critical section;
enable interrupts;
remainder section>
forever.
Code: 63
Special Hardware Instructions
For eliminating the problems in interrupt disabling techniques particularly in multiprocessor environment we
need to use special hardware instructions. In a multiprocessor environment, several processors share access
to a common main memory. Processors behave independently. There is no interrupt mechanism between
processors. At a hardware level access to a memory location, excludes anyother access to that same location.
With this foundation designers have proposed several machine instructions that carry out two actions
automatically such as reading and writing or reading and testing of a single memory location.
Most widely implemented instructions are:
• Test-and-set instruction
• Exchange instruction
Test-and-set Instruction
Test-and-set instruction executes automatically. If two test-and-set instructions are executed simultaneously,
each on a different CPU, then they will execute sequentially. That is access to a memory location excludes
any other access to thatsame location which is shared one.
Implementation
Code:
70
function Test-and-set (var i : integer) : boolean;
begin
if i = 0 then begin
i : = 1;
Test-and-set := true
end
else
Test-and-set: = false
end.
Exchange Instruction
Code:
end;
repeat
key:= true;
repeat
Exchange (lock, key);
until key = false;
critical section
lock: = false;
remainder section
until false;
70
Advantages
• Busy-waiting is employed.
• Starvation is possible, because selection of a waiting process is arbitrary.
• Deadlock situation may rise.
Semaphores
The above solution to critical section problem is not easy to generalize to more complex problems. For
overcoming this problem a synchronization tool called a ‘semaphore’ is used. A semaphore ‘S’ is an integer
variable. It is accessed only
Principle
Two or more processes can cooperate by means of simple signals, such that a process can be forced to stop at
a specified place until it has received a specific signal. For signaling, special variables called semaphores are
used. To transmit a signal by semaphores, a process is to execute the primitive signal (s). To receive a signal
by semaphores, a process executes the primitive wait (s). If the corresponding signal has not yet been
transmitted; the process is suspended until the transmission takes place.
Operations
• A semaphore may be initialized to a non-negative value.
• The ‘wait’ operation decrements the semaphore value. If the value becomes negative, then the
process executing the wait is blocked.
• The signal operation increments the semaphore value. If the value is not positive, then a process
blocked by a wait operation is unblocked.
No-op stands for no operation.
Code:
Usage
To deal with the n-process critical-section problem ‘n’ processes share a semaphore by initializing
mutex to 1.
Code:
70
repeat
wait (mutex);
critical section
signal (mutex);
remainder section
until false
Code:
By initializing synch to zero (0), execute S2 only after P1 has invoked signal (synch),which is after S1.
Implementation
In the above semaphore definition the waiting process trying to enter its critical section must loop continuously
in the entry code.This continuous looping in the entrycode is called busy waiting.Busy waiting wastes CPU
cycles, this type of semaphoreis called spinlock. These spinlocks are useful in multiprocessor systems. No
context switch is required when a process waits on a lock. Context switch may take considerable time. Thus
when locks are expected to be held for short times, spinlocks are useful.
When a process executes wait operation and finds that the semaphore value is not positive, it must wait.
However, rather than busy waiting, the process can block itself, and restart by wakeup when some other
process executes a signal operation.That is wakeup operation changes the process from waiting to ready.
Binary Semaphore
Earlier semaphore is known as counting semaphore, since its integer value can range over an unrestricted
domain, whereas a Binary semaphore value can range between 0 and 1. A binary semaphore is simpler to
implement than counting semaphore. We implement counting semaphore (s) in terms of binary semaphores
with the following data structures.
Code:
70
Var S1: binary-semaphore;
S2: binary-semaphore;
S3: binary-semaphore;
C: integer;
initially S1 = S3 = 1, S2 = 0
value of C is the initial value of the counting semaphore ‘S’.
Wait operation
Code:
wait (S3);
wait (S1);
C: = C - 1;
if C < 0 then
begin
signal (S1);
wait (S2);
end
else
signal (S1);
signal (S3);
Signal operation
Code:
wait (S1);
C: = C + 1;
if C = 0 then
signal (S2);
signal (S1);
For solving these problems use Semaphores concepts. In these problems communication is to takes place
70
between processes and is called ‘Inter Process Communication (IPC)’.
1) Producer-Consumer Problem
Producer-consumer problem is also called as Bounded-Buffer problem. Pool consists of n buffers, each
capable of holding one item. Mutex semaphore is initialized to ‘1’. Empty and full semaphores count the
number of empty and full
buffers, respectively. Empty is initialized to ‘n’ and full is initialized to ‘0’ (zero). Here one or more producers
are generating some type of data and placing these in a buffer. A single consumer is taking items out of the
buffer one at a time. It prevents the overlap of buffer operations.
Producer Process
repeat
...
produce an item in next P
...
wait (empty);
wait (mutex);
...
add next P to buffer
...
signal (mutex);
signal (full);
until false;
Consumer Process
Code:
70
repeat
wait (full);
wait (mutex);
...
remove an item from buffer to next C
...
signal (mutex);
signal (empty);
...
Consume the item in next C
...
until false;
With these codes producer producing full buffers for the consumer. Consumer
producing empty buffers for the producer.
2) Dining-Philosophers Problem:-
Dining-pilosophers problem is posed by Disjkstra in 1965. This problem is very simple. Five
philosophers are seated around a circular table. The life of each philosopher consists of thinking and
The middle of the table with enough food in it. Only five forks are available on the whole. Each
philosopher needs to use two forks on either side of the plate to eat food.
Now the problem is algorithm must satisfy mutual exclusion (i.e., no two philosohers can use the same
fork at the same time) deadlock and starvation.
For this problem various solutions are available.
1. Each philosopher picks up first the fork on the left and then the fork on the right. After
70
eating two forks are replaced on the table. In this case if all the philosophers are hungry all will sit
down and pick up the fork on their left and all reach out for the other fork, which is not there. In this
undignified position, all philosophers will starve. It is the deadlock situation.
2. Buy five additional forks
3. Eat with only one fork
4. Allow only four philosophers at a time; due to this restriction at least one philosopher will
have two forks. He will eat and then replace, then there replaced forks are utilized by the other
philosophers (washing of the forks is implicit).
5. Allow philosopher to pick up the two forks if both are available.
6. An asymmetric solution is, an odd philosopher picks up first their left fork and then their
right side fork whereas an even philosopher picks up their right side fork first and then their left side
fork.
Code for the fourth form of solution is as follows:
Program dining philosophers;
Code:
70
Var fork: array [0 ... 4] of semaphore (: = 1);
room : semaphore (: = 4);
i: integer;
Procedure philosopher (i: integer);
begin
repeat
think;
wait (room);
wait (fork [i]);
wait (fork [(i + 1) mod 5]);
eat;
signal (fork [(i + 1) mod 5]);
signal (fork [i])
signal (room)
forever
end;
begin
philosopher (0);
philosopher (1);
philosopher (2);
philosopher (3);
philosopher (4);
end.
A data object (i.e., file or record) is to be shared among several concurrent processes. Some of these processes
may want only to read the content of the shared object, whereas others may want to update (i.e., read and
write) the shared object.
In this context if two readers access the shared data object simultaneously then no problem at all. If a writer
and some other process (either reader or writer) access the shared object simultaneously then conflict will
raise.
For solving these problems various solutions are there:-
1. Assign higher priorities to the reader processes, as compared to the writer processes.
2. The writers have exclusive access to the shared object.
3. No reader should wait for other readers to finish. Here the problem is writers may starve.
4. If a writer is waiting to access the object, no new readers may start reading. Here readers may starve. 71
General structure of a writer process
Code:
wait (wrt);
...
writing is performed
...
signal (wrt);
Code:
wait (mutex);
readcount: = readcount + 1;
if readcount = 1 then wait (wrt);
signal (mutex);
...
reading is performed
...
wait (mutex);
read count: = readcount - 1;
if readcount = 0 then signal (wrt);
signal (mutex);
A barber shop has one barber chair for the customer being served currently and few chairs for the
waiting customers (if any). The barber manages his time efficiently.
1. When there are no customers, the barber goes to sleep on the barber chair.
2. As soon as a customer arrives, he has to wake up the sleeping barber, and ask for a haircut.
3. If more customers arrive whilst the barber is serving a customer, they either sit down in the waiting
chairs or can simply leave the shop.
72
For solving this problem define three semaphores
Code:
# Define Chairs 4 typedef
int semaphore; semaphore
customers = 0;semaphore
barber = 0; semaphore mutex
= 1;
int waiting = 0; Void
barber (Void)
{
while (TRUE)
{
waiting = waiting - 1;
signal (barber);
cut-hair();
}
}
Void customer (void)
{
if (waiting < chairs)
{
waiting = waiting + 1;
signal (customers); get-
hair cut();
} 73
else
{
wait (mutex);
}
# Define Chairs 4
typedef int semaphore;
semaphore customers = 0;
semaphore barber = 0;
semaphore mutex = 1;
int waiting = 0;
Void barber (Void)
{
while (TRUE)
{
waiting = waiting - 1;
signal (barber);
cut-hair();
}
}
Void customer (void)
{
if (waiting < chairs)
{
waiting = waiting + 1;
signal (customers);
get-hair cut();
}
else
{
wait (mutex);
}
}
74
Critical Regions
Critical regions are high-level synchronization constructs. Although semaphores provide a convenient
and effective mechanism for process synchronization, their incorrect use can still result in timing errors
that are difficult to detect, since these errors happen only if some particular execution sequences take
place, and these sequences do not always occur.
The critical-region construct guards against certain simple errors associated with the semaphore solution
to the critical-section problem made by a programmer. Critical- regions does not necessarily eliminate all
synchronization errors; rather, it reduces them.
All processes share a semaphore variable mutex, which is initialized to 1. Each process must execute wait
(mutex) before entering into the critical section and signal (mutex afterward. If this sequence is not
observed, two processes may be in their critical sections simultaneously.
Difficulties
• Suppose that a process interchanges the order wait and signal then several processes may be executing in
their critical section simultaneously, violating the mutual exclusion requirement. This error may be discovered
only if several processes are simultaneously active in their critical sections. The code is as follows:Signal
(mutex);
...
critical section
...
wait (mutex);
• Suppose a process replaces signal (mutex) with wait (mutex) i.e.,wait (mutex);
...
critical section
...
wait (mutex);
Here a deadlock will occur.
• If a process omits the wait (mutex) or the signal (mutex), or both. In this case, eithermutual exclusion is
violated or a deadlock will occur.
Solution is use high-level synchronization constructs called critical region and monitor. In these two constructs,
assume a process consists of some local data, anda sequential program that can operate on the data. The local
data can be accessed by only the sequential program that is encapsulated within the same process.
Processes can however share global data.
75
Monitors
A monitor is another high-level synchronization construct. It is an abstraction over semaphores. Coding
monitor is similar to programming in high-level programming languages. Monitors are easy to program. The
compiler of a programming language usually implements them, thus reducing the scope of programmatic
errors.
A monitor is a group or collection of data items, a set of procedures to operate on the data items and a set of
special variables known as ‘condition variables’. The condition variables are similar to semaphores. The
operations possible on a condition variable are signal and wait just like a semaphore. The main difference
between a condition variable and a semaphore is the way in which the signal operation is implemented. Syntax
of a monitor is as follows:
Code:
Procedure Pn (...)
{
...
}
Initialization code (...)
{
...
}
}
The client process cannot access the data items inside a monitor directly. The monitor guards them closely.
The processes, which utilize the services of the monitor, need not know about the internal details of the
monitors.
76
At any given time, only one process can be a part of a monitor. For example consider the situation, there is a
monitor M having a shared variable V, a procedure R to operate on V and a condition variable C. There are
two processes P1 and P2 that want to execute the procedure P. In such a situation the following events will
take place:
Message Passing
The need for message passing came into the picture because the techniques such as semaphores and monitors
work fine in the case of local scope. In other words, as long as the processes are local (i.e., on the same CPU),
these techniques will work fine. But, they are not intended to serve the needs of processes, which are not located
on the same machine. For processes which communicate over a network, needs some mechanism to perform the
communication with each other, and yet they are able to ensure concurrency. For eliminating this problem
message passing is one solution.
By using the message passing technique, one process (i.e., sender) can safely send a message to another process
(i.e., destination). Message passing is similar to remote procedure calls (RPC), the difference is message
passing is an operating system concept, whereas RPC is a data communications concept.
77
Inter Process Communication
Inter Process Communication (IPC) is an OS supported mechanism for interaction among processes
(coordination and communication)
Send/Receive messages
OS creates and maintains a channel
o buffer, FIFO queue
OS provides interfaces to processes
o a port
o processes send/write messages to this port
o processes receive/read messages from this port
Message Passing
o e.g. sockets, pips, messages, queues
Memory based IPC
o shared memory, memory mapped files
Higher level semantics
o files, RPC
Synchronization primitives
Message Passing
78
Kernel required to
o establish communication
o perform each IPC operation
o send: system call + data copy
o receive: system call + data copy
Request-response:4xuser/kernelcrossings+4x data copies
Advantages
Forms of Message Passing IPC
1. Pipes
simplicity : kernel does channel management and synchronization
Disadvantages
Overheads
2. Message queues
another
79
OS management includes priorities, scheduling of message delivery
APIs : Sys-V and POSIX
3. Sockets
80
Advantages
System calls only for setup data co ies potentially reduced (but not eliminated)
Disadvantages
explicit synchronization
communication protocol, shared buffer management
o programmer's responsibility
Overheads for 1. Message Passing : mu st perform multiple copies 2. Shared Memory : must establish all
mappings among processes' address space and shared memory pages
Copy vs Map
Goal for both is to transfer data from one into target address space
Synchronization method:
81
1. mechanism supported by processing threading library (pthreads)
2. OS supported IPC for sync
IPC Synchronization
Message Queues Semaphores
Implement "mutual
OS supported synchronization construct
exclusion" via send/receive
binary construct (either allow process or
not)
Like mutex, if value = 0, stop; if value =
1, decrement(lock) and proceed
Synchronization
Waiting for other processes, so that they can continue working togethermay repeatedly check to continue
Synchronization constructs:
82
mutual exclusion
lock and unlock(free)
but, lock == busy => spinning
2. Semaphores
common sync construct in OS kernels
like a traffic light: Stop and Go
like mutex, but more general
RW locks
o specify type of access, then lock behaves accordingly
shared resource
entry resource
possible condition variables
On entry:
83
o lock, check
On exit:
o unlock, check, signal
serializers
path expressions
barriers
rendezvous points
optimistic wait-free sync (RCU) [Read Copy Update]
Problem
o concurrent check/update on different CPUs can overlap
Atomic instructions
Critical section with hardware supported synchronization
Hardware specific
Test-and-set
84
read-and-increment
compare-and-swap
Guarantees
atomicity
mutual exclusion
queue all concurrent instructions but one
Caches
o hide memory latency, "memory" further away due to contention
Cache Coherence
85
What are system calls in Operating System?
The interface between a process and an operating system is provided by system calls. In general,
system calls are
available as assembly language instructions. They are also included in the manuals used by the
assembly level programmers. System calls are usually made when a process in user mode requires access to
a resource.
Then it requests the kernel to provide the resource via a system call.
A figure representing the execution of the system call is given as follows −
As can be seen from this diagram, the processes execute normally in the user mode until a system call interrupts
this. Then the system call is executed on a priority basis in the kernel mode. After the execution of the system
call, the control returns to the user mode and execution of user processes can be resumed.
In general, system calls are required in the following situations −
If a file system requires the creation or deletion of files. Reading and writing from files also require a
system call.
Creation and management of new processes.
Network connections also require system calls. This includes sending and receiving packets.
Access to a hardware devices such as a printer, scanner etc. requires a system call.
Types of System Calls
There are mainly five types of system calls. These are explained in detail as follows −
Process Control
These system calls deal with processes such as process creation, process termination etc.
86
File Management
These system calls are responsible for file manipulation such as creating a file, reading a file, writing into a
file etc.
Device Management
These system calls are responsible for device manipulation such as reading from device buffers, writing into
device buffers etc.
Information Maintenance
These system calls handle information and its transfer between the operating system and the user program.
Communication
These system calls are useful for interprocess communication. They also deal with creating and deleting a
communication connection.
Some of the examples of all the above types of system calls in Windows and Unix are given as follows −
Types of System
Windows Linux
Calls
CreateProcess() fork()
Process Control ExitProcess() exit()
WaitForSingleObject() wait()
CreateFile() open()
ReadFile() read()
File Management
WriteFile() write()
CloseHandle() close()
SetConsoleMode() ioctl()
Device Management ReadConsole() read()
WriteConsole() write()
GetCurrentProcessID() getpid()
Information
SetTimer() alarm()
Maintenance
Sleep() sleep()
CreatePipe() pipe()
Communication CreateFileMapping() shmget()
MapViewOfFile() mmap()
There are many different system calls as shown above. Details of some of those system calls are as follows
−
open()
The open() system call is used to provide access to a file in a file system. This system call allocates resources
to the file and provides a handle that the process uses to refer to the file. A file can be opened by multiple
processes at the same time or be restricted to one process. It all depends on the file organisation and file
system.
read()
The read() system call is used to access data from a file that is stored in the file system. The file to read can
be identified by its file descriptor and it should be opened using open() before it can be read. In general, the
87
read() system calls takes three arguments i.e. the file descriptor, buffer which stores read data and number of
bytes to be read from the file.
write()
The write() system calls writes the data from a user buffer into a device such as a file. This system call is one
of the ways to output data from a program. In general, the write system calls takes three arguments i.e. file
descriptor, pointer to the buffer where data is stored and number of bytes to write from the buffer.
close()
The close() system call is used to terminate access to a file system. Using this system call means that the file
is no longer required by the program and so the buffers are flushed, the file metadata is updated and the file
resources are de-allocated.
Main Memory
Background
Obviously memory accesses and memory management are a very important part of modern computer
operation. Every instruction has to be fetched from memory before it can be executed, and most instructions
involve retrieving data from memory or storing data in memory or both.
The advent of multi-tasking OSs compounds the complexity of memory management, because as
processes are swapped in and out of the CPU, so must their code and data be swapped in and out of memory,
all at high speeds and without interfering with any other processes.
Shared memory, virtual memory, the classification of memory as read-only versus read-write, and
concepts like copy-on-write forking all further complicate the issue.
Basic Hardware
It should be noted that from the memory chips point of view, all memory accesses are equivalent.
The memory hardware doesn't know what a particular part of memory is being used for, nor does it care.
This is almost true of the OS as well, although not entirely.
The CPU can only access its registers and main memory. It cannot, for example, make direct access
to the hard drive, so any data stored there must first be transferred into the main memory chips before the
CPU can work with it. ( Device drivers communicate with their hardware via interrupts and "memory"
accesses, sending short instructions for example to transfer data from the hard drive to a specified location
in main memory. The disk controller monitors the bus for such instructions, transfers the data, and then
notifies the CPU that the data is there with another interrupt, but the CPU never gets direct access to the
disk. )
Memory accesses to registers are very fast, generally one clock tick, and a CPU may be able to
execute more than one machine instruction per clock tick.
Memory accesses to main memory are comparatively slow, and may take a number of clock ticks to
complete. This would require intolerable waiting by the CPU if it were not for an intermediary fast memory
cache built into most modern CPUs. The basic idea of the cache is to transfer chunks of memory at a time
from the main memory to the cache, and then to access individual memory locations one at a time from the
cache.
User processes must be restricted so that they only access memory locations that "belong" to that
particular process. This is usually implemented using a base register and a limit register for each process, as
shown in Figures 3.1 and 3.2 below. Every memory access made by a user process is checked against these
two registers, and if a memory access is attempted outside the valid range, then a fatal error is generated.
The OS obviously has access to all existing memory locations, as this is necessary to swap
88
users' code and data in and out of memory. It should also be obvious that changing the contents of the base
and limit registers is a privileged activity, allowed only to the OS kernel.
Figure 4.1 - A base and a limit register define a logical address space
Figure 3.2 - Hardware address protection with base and limit registers
Address Binding
User programs typically refer to memory addresses with symbolic names such as "i", "count", and
"average Temperature". These symbolic names must be mapped or bound to physical memory addresses,
which typically occurs in several stages:
o Compile Time - If it is known at compile time where a program will reside in physical memory, then
absolute code can be generated by the compiler, containing actual physical addresses. However if the load
address changes at some later time, then the program will have to be recompiled. DOS .COM programs use
compile time binding.
o Load Time - If the location at which a program will be loaded is not known at compile time, then the
compiler must generate relocatable code, which references addresses relative to the start of the program. If
that starting address changes, then the program must be reloaded but not recompiled.
89
o Execution Time - If a program can be moved around in memory during the course of its execution,
then binding must be delayed until execution time. This requires special hardware, and is the method
implemented by most modern OSes.
Figure 3.3 shows the various stages of the binding processes and the units involved in each stage:
90