1 | Locks |
2 | Locks are used to control access to critical sections. |
3 | The routine Tmk_lock_acquire(i) acquires a lock for the calling processor, and the routine Tmk_lock_release(i) releases it. |
4 | TreadMarks uses a lazy invalidate version of release consistency and a multiple-writer protocol to reduce the amount of communication involved in implementing the SM abstraction. |
5 | The virtual memory hardware is used to detect accesses to shared memory. |