[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Sources of unbounded priority inversions in real-time systems and a comparative study of possible solutions

Published: 01 April 1992 Publication History

Abstract

In the design of real-time systems, tasks are often assigned priorities. Preemptive priority driven schedulers are used to schedule tasks to meet the timing requirements. Priority inversion is the term used to describe the situation when a higher priority task's execution is delayed by lower priority tasks. Priority inversion can occur when there is contention for resources among tasks of different priorities. The duration of priority inversion could be long enough to cause tasks to miss their deadlines. Priority inversion cannot be completely eliminated. However, it is important to identify sources of priority inversion and minimize the duration of priority inversion. IN the paper we present a comprehensive review of the problem of and solutions to unbounded priority inversion.

References

[1]
[1] C.L. Liu and J.W. Layland, "Scheduling Algorithms for Multiprogramming in Hard Real Time Environments," J. ACM, Vol. 20, No. 1, 1973, pp. 46-61.
[2]
[2] L. Sha and J.B. Goodenough, "Real-Time Scheduling Theory and Ada," IEEE Computer, April 1990, pp. 53-62.
[3]
[3] L. Sha, R. Rajkumar, and J.P. Lehoczky, "Real-Time Computing Using IEEE Future Bus+," IEEE Micro, June 1991.
[4]
[4] L. Sha, R. Rajkumar, and J.P. Lehoczky, "Priority Inheritance Protocol: An Approach to Real-Time Synchronization," IEEE Transaction on Computer, Sept. 1990.
[5]
[5] J.B. Goodenough and L. Sha, "The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High priority Ada Tasks," Ada Letters, Special Issue: Proc. 2nd Int'l Workshop in Real-Time Ada Issues VIII, Vol. 7, Fall 1988, pp. 20-31.
[6]
[6] R. Rajkumar, L. Sha, and J.P. Lehoczky, "Real-Time Synchronization Protocols for Multiprocessors," Proc. IEEE Real-Time Systems Symposium, 1988, pp. 259-269.
[7]
[7] T. Baker, "Stack Based Scheduling of Real-Time Resources", Technical Report, Department of Computer Science, Florida State University, Tallahassee, FL 32306, April 1990.
[8]
[8] M.I. Chen and K.J. Lin, "Dynamic Priority Ceilings: A Concurrency Control Protocol for Real-Time Systems.", Technical Report, Department of Computer Science, University of Illinoise at Urbana-Champaign, 1989.
[9]
[9] Draft Ada 9x Project Report: Ada 9x Mapping Document Vol. II, December 1991.
[10]
[10] Tread Extension to Portable Operating System Standard, IEEE P1003.4a, Draft 5, IEEE 1990.

Cited By

View all
  • (2020)Transaction scheduling protocols for controlling priority inversion: A reviewComputer Science Review10.1016/j.cosrev.2019.10021535(100215)Online publication date: Feb-2020
  • (2018)Priority inversion in DRTDBSProceedings of the ACM India Joint International Conference on Data Science and Management of Data10.1145/3152494.3167976(305-309)Online publication date: 11-Jan-2018
  • (2011)A Research on Dynamic Scheduling Algorithm of Real-Time Operating Systems on UniprocessorAdvanced Materials Research10.4028/www.scientific.net/AMR.219-220.40219-220(40-44)Online publication date: Mar-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 26, Issue 2
April 1992
114 pages
ISSN:0163-5980
DOI:10.1145/142111
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1992
Published in SIGOPS Volume 26, Issue 2

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)146
  • Downloads (Last 6 weeks)12
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Transaction scheduling protocols for controlling priority inversion: A reviewComputer Science Review10.1016/j.cosrev.2019.10021535(100215)Online publication date: Feb-2020
  • (2018)Priority inversion in DRTDBSProceedings of the ACM India Joint International Conference on Data Science and Management of Data10.1145/3152494.3167976(305-309)Online publication date: 11-Jan-2018
  • (2011)A Research on Dynamic Scheduling Algorithm of Real-Time Operating Systems on UniprocessorAdvanced Materials Research10.4028/www.scientific.net/AMR.219-220.40219-220(40-44)Online publication date: Mar-2011
  • (2010)Research and realization of the mechanism of embedded linux kernel semaphore2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)10.1109/ICACTE.2010.5579027(V1-224-V1-227)Online publication date: Aug-2010
  • (2009)Avoiding unbounded priority inversion in barrier protocols using gang priority managementProceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems10.1145/1620405.1620416(70-79)Online publication date: 23-Sep-2009
  • (2008)Formal modeling and analysis of real-time resource-sharing protocols in Real-Time Maude2008 IEEE International Symposium on Parallel and Distributed Processing10.1109/IPDPS.2008.4536574(1-8)Online publication date: Apr-2008
  • (2006)Study of Priority Inversion in Embedded LinuxProceedings of the First International Conference on Innovative Computing, Information and Control - Volume 310.1109/ICICIC.2006.528(217-219)Online publication date: 30-Aug-2006
  • (2005)Priority inversion in multi processor systems due to protected actionsACM SIGAda Ada Letters10.1145/1064303.1064304XXV:1(43-47)Online publication date: 1-Mar-2005
  • (2005)A new algorithm for discrete timed symbolic model checkingHybrid and Real-Time Systems10.1007/BFb0014710(18-32)Online publication date: 9-Jun-2005
  • (2003)Symbolic Verification and Analysis of Discrete Timed SystemsFormal Methods in System Design10.1023/A:102443721407123:1(67-108)Online publication date: 1-Jul-2003
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media