PPT-Hazard Pointers

Author : pasty-toler | Published Date : 2017-07-29

C Memory Ordering Issues Maged Michael Facebook NY Dagstuhl 2125 November 2016 Maged Michael Hazard Pointers Safe Memory Reclamation for LockFree Objects  

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Hazard Pointers" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Hazard Pointers: Transcript


C Memory Ordering Issues Maged Michael Facebook NY Dagstuhl 2125 November 2016 Maged Michael Hazard Pointers Safe Memory Reclamation for LockFree Objects   IEEE Transactions on Parallel and Distributed Systems. Michael Abstract Lockfree objects offer significant performance and reliability advantages over conventional lockbased objects However the lack of an efficient portable lockfree method for the reclamation of the memory occupied by dynamic nodes remo Keerthi. . Nelaturu. Functions. Also called as subroutines or procedures. Return statement. Example: . double power(double . val. , unsigned . pow. ) . { . double . ret_val. = 1.0; . unsigned i; . We’ll talk about today. Pointers. Arrays. Strings. Classes. “new” operator. Pointers. Stores the memory address where the data is stored. int. * . numberPointer. ;. Can access the data that is pointed to with *. Maged. M. Michael. The Problem. Lock-free algorithms assume that threads can operate on any object at any time. Freeing memory could break this assumption. How can we free memory of deleted nodes in a safe and lock-free manner?. CSE 2451. Rong. Shi. Language comparison. C has pointers. Java has references. C++ has pointers . and . references. Pointers. Values of variables are stored in memory, at a particular location. A location is identified and referenced with an address. COP3275 – Programming using c. Diego J. Rivera-Gutierrez. Administrative stuff. Reminder: No class on Friday. . Celebrate the US Independence. Dress in Stripes and stars.... Yell “ ‘. merica. ” at everyone and have fun, but be safe. . Overview. What is a pointer. Why do I care?. What can be 'pointed to'?. Example. What is a pointer. A pointer is essentially an address. It tells your. code "manipulate whatever is 'here'". Why do I care?. Copies from SEE C++ programming course and from . Starting . Out with C++: Early Objects, . 8/E . by Tony . Gaddis, . Judy Walters and Godfrey . Muganda. Simple Pointer Operations. int. main(). {. CSSE 332. Operating Systems. Rose-Hulman Institute of Technology. Announcements. Checkout the examples folder (in your svn repo and on the course website. . Instructions available at . Resources. => . CSC215. Lecture. Outline. Pointer to Pointer. Pointer Array. Strings Array. Multidimensional Array. void Pointers. Incomplete Types. Pointer to Function . Array vs. Pointer. #include <stdio.h>. Required. : . PM. : . Ch. 6.5, . pgs. 73-75. Arrays. . Pointer . Basics. . Pointer . Tutorial (. Chps. 1-4. ). Recommended. : . K&R, . Chapter 5. BYU CS 224. Pointers and Arrays. 2. Define wild pointers. See how wild pointers caus. e problems. Sometimes you’re lucky; other times, you’re not…. Review the steps for avoiding wild pointers. Wild pointers. Uninitialized local or member variables can cause problems. The Desired Brand Effect Stand Out in a Saturated Market with a Timeless Brand The Desired Brand Effect Stand Out in a Saturated Market with a Timeless Brand

Download Document

Here is the link to download the presentation.
"Hazard Pointers"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents