Operating System Tutorial

Operating System Tutorial Types of Operating System Evolution of Operating System Functions of Operating System Operating System Properties Operating System Services Components of Operating System Needs of the Operating System

Operating Systems

Linux Operating System Unix Operating System Ubuntu Operating System Chrome Operating Systems Fedora Operating System MAC Operating System MS Windows Operating System Solaris Operating System Cooperative Operating System CorelDRAW Operating System CentOS FreeBSD Operating Systems Batch Operating System MS-DOS Operating System Commercial Mobile Operating Systems

Differences

Difference Between Multi-programming and Multitasking Difference between C-LOOK and C-SCAN Difference between Rotational Latency and Disk Assess Time Trap vs Interrupt Difference between C-SCAN and SSTF Difference between SCAN and FCFS Difference between Seek Time and Disk Access Time Difference between SSTF and LOOK Difference between Process and Program in the Operating System Difference between Protection and Security in Operating System

How To

How to implement Monitors using Semaphores How to Install a Different Operating System on a PC

Questions

What is Kernel and Types of Kernel What is DOS Operating System What is Thread and Types of Thread What is Process Scheduler and Process Queue What is Context Switching What is CPU Scheduling What is Producer-Consumer Problem What is Semaphore in Operating System Monitors in Operating System What is Deadlock What is Paging and Segmentation What is Demand Paging What is Virtual Memory What is a Long term Scheduler What is Page Replacement in Operating System What is BSR Mode What is Convoy Effect What is Job Sequencing in Operating System Why is it critical for the Scheduler to distinguish between I/O-bound and CPU-bound programs Why is there a Need for an Operating System

Misc

Process Management Process State Scheduling Algorithm FCFS (First-come-First-Serve) Scheduling SJF (Shortest Job First) Scheduling Round-Robin CPU Scheduling Priority Based Scheduling HRRN (Highest Response Ratio Next) Scheduling Process Synchronization Lock Variable Mechanism TSL Mechanism Turn Variable Mechanism Interested Variable Mechanism Deadlock Avoidance Strategies for Handling Deadlock Deadlock Prevention Deadlock Detection and Recovery Resource Allocation Graph Banker’s Algorithm in Operating System Fixed Partitioning and Dynamic Partitioning Partitioning Algorithms Disk Scheduling Algorithms FCFS and SSTF Disk Scheduling Algorithm SCAN and C-SCAN Disk Scheduling Algorithm Look and C-Look Disk Scheduling Algorithm File in Operating System File Access Methods in Operating System File Allocation Method Directory Structure in Operating System N-Step-SCAN Disk Scheduling Feedback Queue in Operating System Contiguous Memory Allocation in Operating System Real-time Operating System Starvation in Operating System Thrashing in Operating System 5 Goals of Operating System Advantages of Operating System Advantages of UNIX Operating System Bit Vector in Operating System Booting Process in Operating System Can a Computer Run Without the Operating System Dining Philosophers Problem in Operating System Free Space Management in Operating System Inter Process Communication in Operating System Swapping in Operating System Memory Management in Operating System Multiprogramming Operating System Multitasking Operating Systems Multi-user Operating Systems Non-Contiguous Memory Allocation in Operating System Page Table in Operating System Process Scheduling in Operating System Segmentation in Operating System Simple Structure in Operating System Single-User Operating System Two Phase Locking Protocol Advantages and Disadvantages of Operating System Arithmetic operations in binary number system Assemblers in the operating system Bakery Algorithm in Operating System Benefits of Ubuntu Operating System CPU Scheduling Criteria in Operating System Critical Section in Operating System Device Management in Operating System Linux Scheduler in Operating System Long Term Scheduler in Operating System Mutex in Operating System Operating System Failure Peterson's Solution in Operating System Privileged and Non-Privileged Instructions in Operating System Swapping in Operating System Types of Operating System Zombie and Orphan Process in Operating System 62-bit operating system Advantages and Disadvantages of Batch Operating System Boot Block and Bad Block in Operating System Contiguous and Non - Contiguous Memory Allocation in Operating System Control and Distribution Systems in Operations Management Control Program in Operating System Convergent Technologies in Operating System Convoy Effect in Operating System Copy Operating Systems to SSD Core Components of Operating System Core of UNIX Operating System Correct Value to return to the Operating System Corrupted Operating System Cos is Smart Card Operating System Cosmos Operating Systems Examples Generation of Operating System Hardware Solution in Operating System Process Control Block in Operating System Function of Kernel in Operating System Operating System Layers History of Debian Operating Systems Branches and Architecture of Debian Operating Systems Features and Packages of Debian Operating Systems Installation of Operating System on a New PC Organizational Structure and Development in Debian Operating Systems User Interface in Operating System Types Of Memory in OS Operating System in Nokia Multilevel Paging in OS Memory Mapping Techniques in OS Memory Layout of a Process in Operating System Hardware Protection in Operating System Functions of File Management in Operating System Core of Linux Operating System Cache Replacement Policy in Operating System Cache Line and Cache Size in Operating System What is Memory Mapping? Difference Between Network Operating System And Distributed Operating System What is the difference between a Hard link and a Soft Link? Principles of Preemptive Scheduling Process Scheduling Algorithms What is NOS? What is the Interrupt I/O Process? What is Time Sharing OS What is process termination? What is Time-Sharing Operating System What is Batch File File system manipulation

Test Set Lock Mechanism | Operating System

Modification in the Assembly Code

The problem in the lock variable is that, in some cases, the process reads the previous or old value of the lock variable and enters into the critical section. Because of this, sometimes, more than one process can enter into the critical section. Instead of this, the code given in the first section can be simply replaced with another code that is already present in the section. By doing this, the algorithm will not affect, but with the help of this, we can handle to offer mutual exclusion to a little bit but not entirely.

We can easily see that in the updated version of code. First, the lock variable value is loaded into the R0 register, which is the local register, and after loading the value, we set the value of the lock variable to 1.

In the 3rd step, we compared the value of the previous lock variable with 0. And then, we checked the value of the lock variable if the value is 0, then the process gets to enter into the critical section, but if the value is not 0. Then we have to wait for the process execution endlessly in the loop.

The advantage of setting the value of lock variable as 1, instantly with the help of process, is that if the process wants to enter into the critical section, then the process also holds the updated value of the lock variable, which is 1.

In the case, if the process is preempted and wants to schedule further, then in this case, the process will not enter into the critical section because the process already knows the current value of the lock variable means the updated value of the lock variable.   

Test Set Lock Mechanism

TSL Instruction

The solution discussed in the above sections offers the facility of mutual exclusions but not completely, and there may be a chance that more than one process can enter into the critical section.

What will happen when the process is preempted after executing the instruction, which is mentioned in the first step of section 2 written in assembly code?  In that situation, there may be a possibility that a process brings the previous lock variable value, and without knowing the current value of the lock variable, the process enters into the critical section. Due to this, there may be a chance that at the same time, more than two processes enter the critical section.

To remove such type of problems, we take care of one thing that is ‘no preemption’ takes place after loading the earlier lock variable value, and before setting the value of lock variable to 1. We can solve this problem by combining the first two instructions, which are mentioned in the above two sections.

To solve this type of problem, some special instructions are given by the operating system named Test Set Lock (TSL) instruction. With the help of Test Set Lock (TSL) instruction at the same time, we can easily load the lock variable value into the local register R0,  and after loading the value into the register, we set the value of lock variable to 1. And the process that first executes the Test Set Lock(TSL) instruction always enters into the critical section first, and the other processes are not allowed to enter into the critical section until the first process, which is already present in the critical section will come out. If there is a preemption in the process first, then, in this case, the process also cannot execute in the critical section.                       

Test Set Lock Mechanism

Now, based on the four conditions, we discuss TSL:

  1. Mutual Exclusion: - TSL (Test Set Lock) Mechanism provides mutual exclusion because, in TSL, there occurs no preemption before we set the value of the lock variable. In this at a specific time, only a single process can see the value of the lock variable that is 0. That’s why the TSL mechanism offers mutual exclusion.
  2. Progress: - Based on Progress definition, if there is a process which doesn’t want to enter into the critical section then due to such process, other process doesn’t allow to enter into the critical section. In the TSL mechanism, a process executes TSL instruction in case, if any process needs to enter into the critical section. If there is no process to enter into the critical section, then the value of the lock variable will be 0 always. That’s why the TSL mechanism offers Progress.
  3. Bounded Waiting: - In TSL Mechanism, sometimes, there may be a chance that a process waits for a long time to enter into the critical section, and there is no guarantee that a process will get a chance to enter into a critical section. That’s the reason that the TSL mechanism does not offer bounded waiting.
  4. Architectural Neutrality: - TSL (Test Set Lock) mechanism depends on the Hardware Platform, and the instruction of TSL is offered with the help of the Operating System. That’s why the TSL (Test Case Lock) mechanism does not offer Architectural Neutrality.