期刊文献+

非阻塞算法的形式化建模与分析 被引量:1

Formal modeling and analysis of non-blocking algorithm
下载PDF
导出
摘要 目前针对非阻塞(Non-blocking)同步算法的实现已有大量研究,但在实践应用中受到阻碍。其中的关键问题是在没有自动垃圾回收机制(GC)的环境中,如何安全地回收这些数据结构对象中删除掉的动态节点所占用的内存。一个有效的解决方案是Michael提出的风险指针,同时,这种内存管理方法也提供了ABA问题的一个解决方案。将应用该内存回收方法于非阻塞同步算法中,使用CIVL验证框架对其进行形式化建模,并提取内存管理方面的性质进行验证。实验结果表明,应用了该内存回收算法的非阻塞模型不仅功能正确,同时也能够避免内存管理方面的问题。 At present,there are a lot of researches on the implementation of non-blocking synchronization algorithms,but they are hindered in practice.The key issue is how to safely reclaim the memory occupied by the dynamic nodes which have been deleted from the data structure objects in an environment without an automatic Garbage Collection(GC)mechanism.An effective solution is hazard pointer proposed by Michael.At the same time,this memory management method also provides a solution to the ABA problem.This memory reclamation method was applied to the non-blocking synchronization algorithm,and CIVL(Concurrency Intermediate Verification Language)verification framework was used to formally model it and verify the properties related to memory management.Experimental result shows that the non-blocking model applied with this memory reclamation algorithm is not only functionally correct,but also avoids memory management problems.
作者 杨兰兰 郭建 YANG Lanlan;GUO Jian(Software Engineering Institute,East China Normal University,Shanghai 200062,China)
出处 《计算机应用》 CSCD 北大核心 2020年第S02期106-111,共6页 journal of Computer Applications
基金 国家自然科学基金重点项目(61532019)。
关键词 非阻塞算法 形式化建模 风险指针 ABA问题 CIVL验证框架 non-blocking algorithm formal modeling hazard pointer ABA problem CIVL(Concurrency Intermediate Verification Language)verification framework
  • 相关文献

参考文献1

二级参考文献14

  • 1Herlihy M,Shavit N.多处理器编程的艺术[M].金海,胡侃,译.北京:机械工业出版社,2009:141-145.
  • 2Susanne A,Jeffery W.Self-organizing Data Structure[M]//Fiat A,Woeginger G.Online Algorithms:The State of the Art.Berlin,Germany:Springer-Verlag,1998:13-51.
  • 3Valois J D.Lock-free Linked Lists Using Compare-and-swap[C]//Proceedings of the 14th Annual ACM Symposiumon Principles of Distributed Computing.New York,USA:ACM Press,1995.
  • 4Harris T L.A Pragmatic Implementation of Non-blockingLinked-lists[C]//Proceedings of the 15th International Con-ference on Distributed Computing.London,UK:[s.n.],2001.
  • 5Michael M M.High Performance Dynamic Lock-free HashTables and List-based Sets[C]//Proceedings of the 14th AnnualACM Symposium on Parallel Algorithms and Architectures.New York,USA:ACM Press,2002.
  • 6IBM.IBM System/370 Extended Architecture——Principlesof Operation:USA,SA22-7085[P].1983-03-20.
  • 7Treiber R K.Systems Programming:Coping with Parallelism[R].IBM Almaden Research Center,Tech.Rep.:RJ 5118,1986.
  • 8Michael M M.Safe Memory Reclamation for Dynamic Lock-free Objects Using Atomic Reads and Writes[C]//Proceedingsof the 21st Annual Symposium on Principles of DistributedComputing.New York,USA:[s.n.],2002.
  • 9Michael M M.Hazard Pointers:Safe Memory Reclamation forLock-free Objects[J].IEEE Transactions on Parallel andDistributed Systems,2004,15(8):491-504.
  • 10Michael M M.Scalable Lock-free Dynamic Memory Alloca-tion[C]//Proceedings of Special Interest Group onProgramming Languages Notices.Verona,Italy:[s.n.],2004.

共引文献7

同被引文献11

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部