Locks |
Locks are used to control access to critical sections. |
The routine Tmk_lock_acquire(i) acquires a lock for the calling processor, and the routine Tmk_lock_release(i) releases it. |
TreadMarks uses a lazy invalidate version of release consistency and a multiple-writer protocol to reduce the amount of communication involved in implementing the SM abstraction. |
The virtual memory hardware is used to detect accesses to shared memory. |