Verifying Cache Coherence in ACL2. Ben Selfridge Oracle / UT Austin

Size: px
Start display at page:

Download "Verifying Cache Coherence in ACL2. Ben Selfridge Oracle / UT Austin"

Transcription

1 erifying Cache Coherence in ACL Ben Selfridge Oracle / UT Austin

2

3 Goals of this talk Define cache coherence Present a cache coherence protocol designed Present an ACL proof that the protocol is safe (whatever that means) Discuss how we might use ACL to verify more complicated protocols s it worth it? (Why not just use a model checker?) s it possible? (nductive invariants are hard )

4 Goals of this talk Define cache coherence Present a cache coherence protocol designed Present an ACL proof that the protocol is safe (whatever that means) Discuss how we might use ACL to verify more complicated protocols s it worth it? (Why not just use a model checker?) s it possible? (nductive invariants are hard )

5 What are caches? Small, quick-access memory on a chip Used for repeated accesses to the same locations To read/write, the processor must obtain the line from memory, copy it to cache When it s done writing, the cache line is copied back to main memory (at some point)

6 Cache Coherence With + processors, this gets complicated We can allow multiple processors to read simultaneously But write simultaneously? Hmm

7 Cache Coherence 0 0

8 Cache Coherence 3 0

9 Cache Coherence 3 4

10 Cache Coherence 3 4 BAD!!! Both caches believe they have up-to-date copies of the memory location, but they see different values!

11 Cache Coherence To prevent this from happening, add state to each cache line (invalid, read-only, read-write) Two in read-only? Allowed Two in read-write? Not Allowed One in read-only, one in read-write? Not Allowed These guarantees are commonly called cache coherence.

12 Cache Coherence Protocols To ensure coherence, cache coherence protocols are used to manage the state across caches Cores send messages to communicate f want a cache line, must request it f hold a cache line, must send my data back at some point Network properties vary widely between protocols Protocols must be designed ERY CAREFULLY to maintain coherence

13 Example Protocol: designed a simple cache coherence protocol called. Cache lines can be in one of two states: = valid (read/write) = invalid There is no read-only state!

14 Example Protocol: There are n caches along with an additional agent, the directory, residing in the main memory The directory keeps track of who currently owns each cache line (either a cache, or the main memory) For the remainder of this talk, assume there is only one cache line that can be shared between memory and caches. (This avoids confusion.)

15 Caveat: state is interpreted differently The ectory has two states, and in state means has the data, and no one else does in state means does not have the data; either someone else has it in state, or it s currently in transit Remember this, otherwise you ll get confused

16 Transition Tables load/ store Cache Controller evict Fwd-Get Put-Ack Send Get to / D LLEGAL LLEGAL LLEGAL LLEGAL D stall stall Copy to cache / stall perform load/ store Send Put to / A LLEGAL Send to Req / LLEGAL A stall stall LLEGAL Send to Req / A -/ A stall stall LLEGAL LLEGAL -/

17 Transition Tables load/ store Cache Controller evict Fwd-Get Put-Ack Send Get to / D LLEGAL LLEGAL LLEGAL LLEGAL stable states D stall stall Copy to cache / stall perform load/ store Send Put to / A LLEGAL Send to Req / LLEGAL A stall stall LLEGAL Send to Req / A -/ A stall stall LLEGAL LLEGAL -/

18 Transition Tables load/ store Cache Controller evict Fwd-Get Put-Ack Send Get to / D LLEGAL LLEGAL LLEGAL LLEGAL D stall stall Copy to cache / stall transient states perform load/ store Send Put to / A LLEGAL A stall stall LLEGAL Send to Req / Send to Req / A LLEGAL -/ A stall stall LLEGAL LLEGAL -/

19 Transition Tables ectory Controller Get Put (from owner) Put (from non-owner) (Cache line in main mem only) Send to Req, set Owner to Req / LLEGAL Send Put-Ack to Req / - (some cache has cache line in state ) Send Fwd-Get to Owner, set Owner to Req / Copy data to memory, send Put- Ack to Owner, clear Owner / Send Put-Ack to Req / -

20 Example Protocol: Before we go any further, let s take a look at how this protocol works in practice.

21 Get transaction

22 Get transaction Cache wishes to obtain the cache line. is in state, indicating no other cache currently has the data.

23 Get transaction

24 Get transaction D Get

25 Get transaction D Get

26 Get transaction D Get

27 Get transaction

28 Get transaction Cache has successfully obtained the cache line.

29 Get transaction

30 Get transaction

31 Get transaction Cache wants to obtain the cache line, and Cache already has it.

32 Get transaction D Get

33 Get transaction Fwd-Get D Get

34 Get transaction Fwd-Get D Get

35 Get transaction Fwd-Get D Get

36 Get transaction

37 Get transaction Cache has successfully obtained the cache line.

38 Put transaction

39 Put transaction Cache has the cache line, and wishes to evict (transition to ).

40 Put transaction A Put Cache sends a Put to, but does not evict the cache line yet.

41 Put transaction A Put Put-Ack When Cache receives Put-Ack from, it is safe to evict the cache line.

42 Put transaction A Put Put-Ack When Cache receives Put-Ack from, it is safe to evict the cache line.

43 Put transaction Cache has successfully evicted, and now owns the data.

44 Put/Get race What if Cache Puts, and Cache Gets at the same time?

45 A Put/Get race Put

46 A Put/Get race Put Get D

47 A Put/Get race Put??? Get D Which message arrives first?

48 A Put/Get race Put Get D Suppose the Put from Cache arrives first. (We will explore the other case in a moment.)

49 A Put/Get race Put Put-Ack Get D

50 A Put/Get race Put Put-Ack Get D

51 Put/Get race A Put Put-Ack Get D

52 Put/Get race A Put Put-Ack Get D

53 Put/Get race A Put Put-Ack Get D Since received the Put first, there is no need for the two Caches to communicate directly.

54 Put/Get race

55 Put/Get race Cache has evicted successfully, and Cache has obtained the cache line successfully.

56 Put/Get race A Put??? Get D

57 Put/Get race A Put Get D Now, suppose received the Get first.

58 Put/Get race A Put Fwd-Get Get D First, forwards the Get request to Cache, since Cache is still the owner.

59 Put/Get race A Put Fwd-Get Put-Ack Get D Then, receives Cache s Put. Since Cache is no longer the owner, simply responds with a Put-Ack, and throws out the incoming.

60 Put/Get race A Put Fwd-Get??? Put-Ack Get D Which message arrives first?

61 Put/Get race A Put Fwd-Get Put-Ack Get D Suppose the Fwd-Get arrives first.

62 Put/Get race A A Put Fwd-Get Put-Ack Get D Because Cache hasn t evicted yet, he still has the data. He sends it along to Cache and evicts (although he still awaits a Put-Ack from ).

63 Put/Get race A A Put Fwd-Get Put-Ack Get D Cache receives the Put-Ack, and transitions to.

64 Put/Get race A A Put Fwd-Get Put-Ack Get D Cache receives the, and transitions to.

65 Put/Get race

66 Put/Get race Cache has upgraded successfully. Cache s attempt to evict was effectively aborted since the Get request was serviced before the Put request arrived.

67 Put/Get race A Put Fwd-Get??? Put-Ack Get D

68 Put/Get race A Put Fwd-Get Put-Ack Get D Now, suppose Cache receives the Put-Ack first.

69 Put/Get race A Put Fwd-Get Put-Ack Get D Cache, having received Put-Ack, evicts the cache line. (Um. where s the data?)

70 Put/Get race A Put Fwd-Get Put-Ack BAD!!!! Get D Then, Cache receives a Fwd-Get. He can t forward the data, because he already evicted!

71 Put/Get race A Put Fwd-Get Put-Ack BAD!!!! Get D Solution: use the same channel for Fwd-Get and Put-Ack, and require point-to-point ordering.

72 Put/Get race Lesson: A cache coherence protocol may seem relatively simple, but concurrency and data races can lead to some odd behavior. We need to be ERY careful when designing these protocols in order to ensure bad things don t happen.

73 Correctness of We wish to demonstrate that the cache coherence protocol is correct. For our protocol, this means that no two caches can have the cache line in state simultaneously. We believe we have designed our protocol well, but it s actually deceptively complicated We used ACL to construct an invariant-style proof of this property

74 Proof strategy. Let P = property we want to prove is an invariant. Let Props = {P } 3. for each P i in Props: A. Try to prove: Props(m) -> P i (step m) B. For each failed subgoal, create new P j that lets us prove that subgoal, and add it to Props until A is proved by ACL C. Repeat until we have proved everything in Props is preserved by step 4. We have shown Props(m) -> Props(step m). Since P is in Props, we have shown that if we start from a state where Props(m) is true, then we can run the protocol as long as we want, and P will always be true.

75 Next time ll present the correctness proof in some detail. ll talk about some ideas ve had for using ACL both to design AND verify complex, scary cache protocols.

76 Proving correctness n industry, model checkers are usually used to verify coherence for these protocols. For complicated protocols, model checkers can fail to terminate fast enough. Even if you manage to get model checker to finish the proof, you may need to make so many simplifications in the encoding that the proof won t actually convince too many people. m interested how a theorem prover like ACL can be used to aid in these verification efforts.

77 Other stuff

78 Correctness of : nitial At first, we started the proof by specifying correctness as no two caches are in state We then asked ACL to prove that this property was preserved by all transitions Each failed subgoal suggested a new property we needed to assume The hope: at some point, these invariants will become closed Attempt

79 Correctness of : nitial Attempt discovered after a lengthy, time-consuming proof attempt, that had ended needing to assume an invariant that couldn t prove couldn t prove it because the property blew up - in order to prove it, needed to assume something more complicated, and then to prove the more complicated property, needed to assume something even MORE complicated, etc. still can t figure out exactly where went wrong; if anyone has any intuition, or is interested enough to discuss it, let me know

80 needed to prove that this could never happen: t s clear why - both Cache and are in. The thinks is the owner.

81 needed to prove that this could never happen: Let s backtrack and see how this could have happened

82 needed to prove that this could never happen: Let s backtrack and see how this could have happened

83 needed to prove that this could never happen: 3 Let s backtrack and see how this could have happened

84 needed to prove that this could never happen: D 3 Let s backtrack and see how this could have happened

85 needed to prove that this could never happen: D Fwd-Get 3 Let s backtrack and see how this could have happened

86 needed to prove that this could never happen: Fwd-Get D 3 4 Let s backtrack and see how this could have happened

87 needed to prove that this could never happen: Fwd-Get D 3 4 Let s backtrack and see how this could have happened

Module 9: Addendum to Module 6: Shared Memory Multiprocessors Lecture 17: Multiprocessor Organizations and Cache Coherence. The Lecture Contains:

Module 9: Addendum to Module 6: Shared Memory Multiprocessors Lecture 17: Multiprocessor Organizations and Cache Coherence. The Lecture Contains: The Lecture Contains: Shared Memory Multiprocessors Shared Cache Private Cache/Dancehall Distributed Shared Memory Shared vs. Private in CMPs Cache Coherence Cache Coherence: Example What Went Wrong? Implementations

More information

Module 9: "Introduction to Shared Memory Multiprocessors" Lecture 16: "Multiprocessor Organizations and Cache Coherence" Shared Memory Multiprocessors

Module 9: Introduction to Shared Memory Multiprocessors Lecture 16: Multiprocessor Organizations and Cache Coherence Shared Memory Multiprocessors Shared Memory Multiprocessors Shared memory multiprocessors Shared cache Private cache/dancehall Distributed shared memory Shared vs. private in CMPs Cache coherence Cache coherence: Example What went

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 20 Concurrency Control Part -1 Foundations for concurrency

More information

1 Achieving IND-CPA security

1 Achieving IND-CPA security ISA 562: Information Security, Theory and Practice Lecture 2 1 Achieving IND-CPA security 1.1 Pseudorandom numbers, and stateful encryption As we saw last time, the OTP is perfectly secure, but it forces

More information

Cache Coherence Tutorial

Cache Coherence Tutorial Cache Coherence Tutorial The cache coherence protocol described in the book is not really all that difficult and yet a lot of people seem to have troubles when it comes to using it or answering an assignment

More information

Lecture 3 - Template and Vectors

Lecture 3 - Template and Vectors Lecture - Template and Vectors Homework Format and Template: We ll each develop a simple template to use to start any new homework. The idea of a template is to layout the basic structure of what goes

More information

CSc Outline. Basics. What is DHCP? Why DHCP? How does DHCP work? DHCP

CSc Outline. Basics. What is DHCP? Why DHCP? How does DHCP work? DHCP CSc72010 DHCP Outline Basics Comer: Chapter 22 (Chapter 23 in the the 4 th edition) Peterson: Section 4.1.6 RFC 2131 What is DHCP? Dynamic Host Configuration Protocol: provides for configuring hosts that

More information

CS 161 Computer Security

CS 161 Computer Security Wagner Spring 2014 CS 161 Computer Security 1/27 Reasoning About Code Often functions make certain assumptions about their arguments, and it is the caller s responsibility to make sure those assumptions

More information

Reasoning About Programs Panagiotis Manolios

Reasoning About Programs Panagiotis Manolios Reasoning About Programs Panagiotis Manolios Northeastern University March 1, 2017 Version: 101 Copyright c 2017 by Panagiotis Manolios All rights reserved. We hereby grant permission for this publication

More information

14.1 Encoding for different models of computation

14.1 Encoding for different models of computation Lecture 14 Decidable languages In the previous lecture we discussed some examples of encoding schemes, through which various objects can be represented by strings over a given alphabet. We will begin this

More information

Steven Skiena. skiena

Steven Skiena.   skiena Lecture 22: Introduction to NP-completeness (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Among n people,

More information

(Refer Slide Time: 06:01)

(Refer Slide Time: 06:01) Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 28 Applications of DFS Today we are going to be talking about

More information

A Guide to Condor. Joe Antognini. October 25, Condor is on Our Network What is an Our Network?

A Guide to Condor. Joe Antognini. October 25, Condor is on Our Network What is an Our Network? A Guide to Condor Joe Antognini October 25, 2013 1 Condor is on Our Network What is an Our Network? The computers in the OSU astronomy department are all networked together. In fact, they re networked

More information

Making a PowerPoint Accessible

Making a PowerPoint Accessible Making a PowerPoint Accessible Purpose The purpose of this document is to help you to create an accessible PowerPoint, or to take a nonaccessible PowerPoint and make it accessible. You are probably reading

More information

Recursively Enumerable Languages, Turing Machines, and Decidability

Recursively Enumerable Languages, Turing Machines, and Decidability Recursively Enumerable Languages, Turing Machines, and Decidability 1 Problem Reduction: Basic Concepts and Analogies The concept of problem reduction is simple at a high level. You simply take an algorithm

More information

3 Nonlocal Exit. Quiz Program Revisited

3 Nonlocal Exit. Quiz Program Revisited 3 Nonlocal Exit This chapter is about the commands catch and throw. These commands work together as a kind of super-stop command, which you can use to stop several levels of procedure invocation at once.

More information

A Coq Framework For Verified Property-Based Testing (part of QuickChick)

A Coq Framework For Verified Property-Based Testing (part of QuickChick) A Coq Framework For Verified Property-Based Testing (part of QuickChick) Cătălin Hrițcu INRIA Paris-Rocquencourt (Prosecco team, Place d Italie office) Problem: proving in Coq is very costly My proofs

More information

Cache Coherence and Atomic Operations in Hardware

Cache Coherence and Atomic Operations in Hardware Cache Coherence and Atomic Operations in Hardware Previously, we introduced multi-core parallelism. Today we ll look at 2 things: 1. Cache coherence 2. Instruction support for synchronization. And some

More information

5 R1 The one green in the same place so either of these could be green.

5 R1 The one green in the same place so either of these could be green. Page: 1 of 20 1 R1 Now. Maybe what we should do is write out the cases that work. We wrote out one of them really very clearly here. [R1 takes out some papers.] Right? You did the one here um where you

More information

Intro. Scheme Basics. scm> 5 5. scm>

Intro. Scheme Basics. scm> 5 5. scm> Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if

More information

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read)

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read) 1 For the remainder of the class today, I want to introduce you to a topic we will spend one or two more classes discussing and that is source code control or version control. What is version control?

More information

Cache Coherence. (Architectural Supports for Efficient Shared Memory) Mainak Chaudhuri

Cache Coherence. (Architectural Supports for Efficient Shared Memory) Mainak Chaudhuri Cache Coherence (Architectural Supports for Efficient Shared Memory) Mainak Chaudhuri mainakc@cse.iitk.ac.in 1 Setting Agenda Software: shared address space Hardware: shared memory multiprocessors Cache

More information

Understanding Recursion

Understanding Recursion Understanding Recursion sk, rob and dbtucker (modified for CS 536 by kfisler) 2002-09-20 Writing a Recursive Function Can we write the factorial function in AFunExp? Well, we currently don t have multiplication,

More information

Kuratowski Notes , Fall 2005, Prof. Peter Shor Revised Fall 2007

Kuratowski Notes , Fall 2005, Prof. Peter Shor Revised Fall 2007 Kuratowski Notes 8.30, Fall 005, Prof. Peter Shor Revised Fall 007 Unfortunately, the OCW notes on Kuratowski s theorem seem to have several things substantially wrong with the proof, and the notes from

More information

Cache Coherence. CMU : Parallel Computer Architecture and Programming (Spring 2012)

Cache Coherence. CMU : Parallel Computer Architecture and Programming (Spring 2012) Cache Coherence CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012) Shared memory multi-processor Processors read and write to shared variables - More precisely: processors issues

More information

(Refer Slide Time: 01:25)

(Refer Slide Time: 01:25) Computer Architecture Prof. Anshul Kumar Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture - 32 Memory Hierarchy: Virtual Memory (contd.) We have discussed virtual

More information

1.7 Limit of a Function

1.7 Limit of a Function 1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:

More information

Thread Synchronization: Too Much Milk

Thread Synchronization: Too Much Milk Thread Synchronization: Too Much Milk 1 Implementing Critical Sections in Software Hard The following example will demonstrate the difficulty of providing mutual exclusion with memory reads and writes

More information

Introduction to Programming

Introduction to Programming CHAPTER 1 Introduction to Programming Begin at the beginning, and go on till you come to the end: then stop. This method of telling a story is as good today as it was when the King of Hearts prescribed

More information

Project 1 Balanced binary

Project 1 Balanced binary CMSC262 DS/Alg Applied Blaheta Project 1 Balanced binary Due: 7 September 2017 You saw basic binary search trees in 162, and may remember that their weakness is that in the worst case they behave like

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)

More information

Computer Architecture

Computer Architecture 18-447 Computer Architecture CSCI-564 Advanced Computer Architecture Lecture 29: Consistency & Coherence Lecture 20: Consistency and Coherence Bo Wu Prof. Onur Mutlu Colorado Carnegie School Mellon University

More information

How To Get Your Word Document. Ready For Your Editor

How To Get Your Word Document. Ready For Your Editor How To Get Your Word Document Ready For Your Editor When your document is ready to send to your editor you ll want to have it set out to look as professional as possible. This isn t just to make it look

More information

Lecture 24: Board Notes: Cache Coherency

Lecture 24: Board Notes: Cache Coherency Lecture 24: Board Notes: Cache Coherency Part A: What makes a memory system coherent? Generally, 3 qualities that must be preserved (SUGGESTIONS?) (1) Preserve program order: - A read of A by P 1 will

More information

Lecture 25: Multiprocessors. Today s topics: Snooping-based cache coherence protocol Directory-based cache coherence protocol Synchronization

Lecture 25: Multiprocessors. Today s topics: Snooping-based cache coherence protocol Directory-based cache coherence protocol Synchronization Lecture 25: Multiprocessors Today s topics: Snooping-based cache coherence protocol Directory-based cache coherence protocol Synchronization 1 Snooping-Based Protocols Three states for a block: invalid,

More information

Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology

Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology Constructive Computer Architecture Cache Coherence Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology November 17, 2014 http://www.csg.csail.mit.edu/6.175 L21-1

More information

Proving Dekker with SPIN and PROMELA

Proving Dekker with SPIN and PROMELA 15-410...fairness disabled... Proving Dekker with SPIN and PROMELA Joshua Wise With help from Greg Hartman L36_SPIN 1 Synchronization Project 4 due Wednesday Everyone having fun? Kernel interviews If you

More information

Foundations, Reasoning About Algorithms, and Design By Contract CMPSC 122

Foundations, Reasoning About Algorithms, and Design By Contract CMPSC 122 Foundations, Reasoning About Algorithms, and Design By Contract CMPSC 122 I. Logic 101 In logic, a statement or proposition is a sentence that can either be true or false. A predicate is a sentence in

More information

Frequently Asked Questions about the NDIS

Frequently Asked Questions about the NDIS Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding

More information

Lecture 10: Cache Coherence: Part I. Parallel Computer Architecture and Programming CMU , Spring 2013

Lecture 10: Cache Coherence: Part I. Parallel Computer Architecture and Programming CMU , Spring 2013 Lecture 10: Cache Coherence: Part I Parallel Computer Architecture and Programming Cache design review Let s say your code executes int x = 1; (Assume for simplicity x corresponds to the address 0x12345604

More information

Lecture 2 Finite Automata

Lecture 2 Finite Automata Lecture 2 Finite Automata August 31, 2007 This lecture is intended as a kind of road map to Chapter 1 of the text just the informal examples that I ll present to motivate the ideas. 1 Expressions without

More information

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS EXPLORING THE INTERNET through HOBBIES AND INTERESTS. LEARN HOW TO KEEP IN TOUCH WITH FRIENDS AND FAMILY USING THE INTERNET In these busy times it s easy

More information

Adding content to your Blackboard 9.1 class

Adding content to your Blackboard 9.1 class Adding content to your Blackboard 9.1 class There are quite a few options listed when you click the Build Content button in your class, but you ll probably only use a couple of them most of the time. Note

More information

Rules for the General Communication Process in ILSA Prepared by: Chris Miller Version:.01 Date: 19 February, 2002

Rules for the General Communication Process in ILSA Prepared by: Chris Miller Version:.01 Date: 19 February, 2002 Rules for the General Communication Process in ILSA Prepared by: Chris Miller Version:.01 Date: 19 February, 2002 Document History Table 1 Version Prepared Description.01 2/19/02 Initial version, Purpose

More information

Tradeoffs. CSE 505: Programming Languages. Lecture 15 Subtyping. Where shall we add useful completeness? Where shall we add completeness?

Tradeoffs. CSE 505: Programming Languages. Lecture 15 Subtyping. Where shall we add useful completeness? Where shall we add completeness? Tradeoffs CSE 505: Programming Languages Lecture 15 Subtyping Zach Tatlock Autumn 2017 Desirable type system properties (desiderata): soundness - exclude all programs that get stuck completeness - include

More information

Module 5: Performance Issues in Shared Memory and Introduction to Coherence Lecture 10: Introduction to Coherence. The Lecture Contains:

Module 5: Performance Issues in Shared Memory and Introduction to Coherence Lecture 10: Introduction to Coherence. The Lecture Contains: The Lecture Contains: Four Organizations Hierarchical Design Cache Coherence Example What Went Wrong? Definitions Ordering Memory op Bus-based SMP s file:///d /...audhary,%20dr.%20sanjeev%20k%20aggrwal%20&%20dr.%20rajat%20moona/multi-core_architecture/lecture10/10_1.htm[6/14/2012

More information

Robbing the Bank with a Theorem Prover

Robbing the Bank with a Theorem Prover Robbing the Bank with a Theorem Prover (Transcript of Discussion) Jolyon Clulow Cambridge University So it s a fairly provocative title, how did we get to that? Well automated tools have been successfully

More information

Lecture 8 - Message Authentication Codes

Lecture 8 - Message Authentication Codes Lecture 8 - Message Authentication Codes Benny Applebaum, Boaz Barak October 12, 2007 Data integrity Until now we ve only been interested in protecting secrecy of data. However, in many cases what we care

More information

T H E I N T E R A C T I V E S H E L L

T H E I N T E R A C T I V E S H E L L 3 T H E I N T E R A C T I V E S H E L L The Analytical Engine has no pretensions whatever to originate anything. It can do whatever we know how to order it to perform. Ada Lovelace, October 1842 Before

More information

Git Workbook. Self-Study Guide to Git. Lorna Mitchell. This book is for sale at

Git Workbook. Self-Study Guide to Git. Lorna Mitchell. This book is for sale at Git Workbook Self-Study Guide to Git Lorna Mitchell This book is for sale at http://leanpub.com/gitworkbook This version was published on 2018-01-15 This is a Leanpub book. Leanpub empowers authors and

More information

Rescuing Lost Files from CDs and DVDs

Rescuing Lost Files from CDs and DVDs Rescuing Lost Files from CDs and DVDs R 200 / 1 Damaged CD? No Problem Let this Clever Software Recover Your Files! CDs and DVDs are among the most reliable types of computer disk to use for storing your

More information

CMSC Computer Architecture Lecture 15: Memory Consistency and Synchronization. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 15: Memory Consistency and Synchronization. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 15: Memory Consistency and Synchronization Prof. Yanjing Li University of Chicago Administrative Stuff! Lab 5 (multi-core) " Basic requirements: out later today

More information

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change. RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go

More information

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet. Mr G s Java Jive #2: Yo! Our First Program With this handout you ll write your first program, which we ll call Yo. Programs, Classes, and Objects, Oh My! People regularly refer to Java as a language that

More information

Web Hosting. Important features to consider

Web Hosting. Important features to consider Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,

More information

Cache Coherence Protocols Are Hard Easy

Cache Coherence Protocols Are Hard Easy Cache Coherence Protocols Are Hard Easy Nicolai Oswald, Vijay Nagarajan, Daniel J. orin I A I I A I A ProtoGen I AD I I A I I AD I AD I AD I I I Directory Cache Coherence Core Core Cache X = 0 1 Cache

More information

Reducing Fair Stuttering Refinement of Transaction Systems

Reducing Fair Stuttering Refinement of Transaction Systems Reducing Fair Stuttering Refinement of Transaction Systems Rob Sumners Advanced Micro Devices robert.sumners@amd.com November 16th, 2015 Rob Sumners (AMD) Transaction Progress Checking November 16th, 2015

More information

Database management system Prof. D. Janakiram Department of Computer Science and Engineering Indian Institute of Technology, Madras

Database management system Prof. D. Janakiram Department of Computer Science and Engineering Indian Institute of Technology, Madras Database management system Prof. D. Janakiram Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 25 Basic 2-phase & 3-phase Commit protocol In the last lecture,

More information

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired? Page: 1 of 14 1 R1 And this is tell me what this is? 2 Stephanie x times y plus x times y or hm? 3 R1 What are you thinking? 4 Stephanie I don t know. 5 R1 Tell me what you re thinking. 6 Stephanie Well.

More information

Lecture 3: Directory Protocol Implementations. Topics: coherence vs. msg-passing, corner cases in directory protocols

Lecture 3: Directory Protocol Implementations. Topics: coherence vs. msg-passing, corner cases in directory protocols Lecture 3: Directory Protocol Implementations Topics: coherence vs. msg-passing, corner cases in directory protocols 1 Future Scalable Designs Intel s Single Cloud Computer (SCC): an example prototype

More information

CS Introduction to Data Structures How to Parse Arithmetic Expressions

CS Introduction to Data Structures How to Parse Arithmetic Expressions CS3901 - Introduction to Data Structures How to Parse Arithmetic Expressions Lt Col Joel Young One of the common task required in implementing programming languages, calculators, simulation systems, and

More information

Lecture 11: Snooping Cache Coherence: Part II. CMU : Parallel Computer Architecture and Programming (Spring 2012)

Lecture 11: Snooping Cache Coherence: Part II. CMU : Parallel Computer Architecture and Programming (Spring 2012) Lecture 11: Snooping Cache Coherence: Part II CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012) Announcements Assignment 2 due tonight 11:59 PM - Recall 3-late day policy Assignment

More information

Programming assignment A

Programming assignment A Programming assignment A ASCII Minesweeper Official release on Feb 14 th at 1pm (Document may change before then without notice) Due 5pm Feb 25 th Minesweeper is computer game that was first written in

More information

Formal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5

Formal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5 Formal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5 [talking head] Formal Methods of Software Engineering means the use of mathematics as an aid to writing programs. Before we can

More information

1 Algorithm and Proof for Minimum Vertex Coloring

1 Algorithm and Proof for Minimum Vertex Coloring Solutions to Homework 7, CS 173A (Fall 2018) Homework 7 asked you to show that the construction problems Maximum Independent Set, Minimum Vertex Coloring, and Maximum Clique could all be solved in polynomial

More information

Utility Maximization

Utility Maximization Utility Maximization Mark Dean Lecture Notes for Spring 2015 Behavioral Economics - Brown University 1 Lecture 1 1.1 Introduction The first topic we are going to cover in the course isn t going to seem

More information

How To Gain a Competitive Advantage

How To Gain a Competitive Advantage How To Gain a Competitive Advantage VIDEO See this video in High Definition Download this video How To Gain a Competitive Advantage - 1 Video Transcript The number one reason why people fail online is

More information

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Relations Let s talk about relations! Grade 6 Math Circles November 6 & 7 2018 Relations, Functions, and

More information

Outline More Security Protocols CS 239 Computer Security February 4, 2004

Outline More Security Protocols CS 239 Computer Security February 4, 2004 Outline More Security Protocols CS 239 Computer Security February 4, 2004 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

Page 1. Cache Coherence

Page 1. Cache Coherence Page 1 Cache Coherence 1 Page 2 Memory Consistency in SMPs CPU-1 CPU-2 A 100 cache-1 A 100 cache-2 CPU-Memory bus A 100 memory Suppose CPU-1 updates A to 200. write-back: memory and cache-2 have stale

More information

SAMLab Tip Sheet #1 Translating Mathematical Formulas Into Excel s Language

SAMLab Tip Sheet #1 Translating Mathematical Formulas Into Excel s Language Translating Mathematical Formulas Into Excel s Language Introduction Microsoft Excel is a very powerful calculator; you can use it to compute a wide variety of mathematical expressions. Before exploring

More information

Name: CS 341 Practice Final Exam. 1 a 20 b 20 c 20 d 20 e 20 f 20 g Total 207

Name: CS 341 Practice Final Exam. 1 a 20 b 20 c 20 d 20 e 20 f 20 g Total 207 Name: 1 a 20 b 20 c 20 d 20 e 20 f 20 g 20 2 10 3 30 4 12 5 15 Total 207 CS 341 Practice Final Exam 1. Please write neatly. You will lose points if we cannot figure out what you are saying. 2. Whenever

More information

Lecture 25: Multiprocessors

Lecture 25: Multiprocessors Lecture 25: Multiprocessors Today s topics: Virtual memory wrap-up Snooping-based cache coherence protocol Directory-based cache coherence protocol Synchronization 1 TLB and Cache Is the cache indexed

More information

Material from Recitation 1

Material from Recitation 1 Material from Recitation 1 Darcey Riley Frank Ferraro January 18, 2011 1 Introduction In CSC 280 we will be formalizing computation, i.e. we will be creating precise mathematical models for describing

More information

A Basic Snooping-Based Multi-Processor Implementation

A Basic Snooping-Based Multi-Processor Implementation Lecture 11: A Basic Snooping-Based Multi-Processor Implementation Parallel Computer Architecture and Programming Tsinghua has its own ice cream! Wow! CMU / 清华 大学, Summer 2017 Review: MSI state transition

More information

PVCoherence. Zhang, Bringham, Erickson, & Sorin. Amlan Nayak & Jay Zhang 1

PVCoherence. Zhang, Bringham, Erickson, & Sorin. Amlan Nayak & Jay Zhang 1 PVCoherence Zhang, Bringham, Erickson, & Sorin Amlan Nayak & Jay Zhang 1 (16) OM Overview M Motivation Background Parametric Verification Design Guidelines PV-MOESI vs OP-MOESI Results Conclusion E MI

More information

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Outline More Security Protocols CS 239 Computer Security February 6, 2006 Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

EECS150 - Digital Design Lecture 20 - Finite State Machines Revisited

EECS150 - Digital Design Lecture 20 - Finite State Machines Revisited EECS150 - Digital Design Lecture 20 - Finite State Machines Revisited April 2, 2009 John Wawrzynek Spring 2009 EECS150 - Lec20-fsm Page 1 Finite State Machines (FSMs) FSM circuits are a type of sequential

More information

How to import text files to Microsoft Excel 2016:

How to import text files to Microsoft Excel 2016: How to import text files to Microsoft Excel 2016: You would use these directions if you get a delimited text file from a government agency (or some other source). This might be tab-delimited, comma-delimited

More information

Example File Systems Using Replication CS 188 Distributed Systems February 10, 2015

Example File Systems Using Replication CS 188 Distributed Systems February 10, 2015 Example File Systems Using Replication CS 188 Distributed Systems February 10, 2015 Page 1 Example Replicated File Systems NFS Coda Ficus Page 2 NFS Originally NFS did not have any replication capability

More information

For Volunteers An Elvanto Guide

For Volunteers An Elvanto Guide For Volunteers An Elvanto Guide www.elvanto.com Volunteers are what keep churches running! This guide is for volunteers who use Elvanto. If you re in charge of volunteers, why not check out our Volunteer

More information

Lutheran High North Technology The Finder

Lutheran High North Technology  The Finder Lutheran High North Technology shanarussell@lutheranhighnorth.org www.lutheranhighnorth.org/technology The Finder Your Mac s filing system is called the finder. In this document, we will explore different

More information

CSE502: Computer Architecture CSE 502: Computer Architecture

CSE502: Computer Architecture CSE 502: Computer Architecture CSE 502: Computer Architecture Shared-Memory Multi-Processors Shared-Memory Multiprocessors Multiple threads use shared memory (address space) SysV Shared Memory or Threads in software Communication implicit

More information

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Recitation 4: Elimination algorithm, reconstituted graph, triangulation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation

More information

Naming Angles. One complete rotation measures 360º. Half a rotation would then measure 180º. A quarter rotation would measure 90º.

Naming Angles. One complete rotation measures 360º. Half a rotation would then measure 180º. A quarter rotation would measure 90º. Naming Angles What s the secret for doing well in geometry? Knowing all the angles. An angle can be seen as a rotation of a line about a fixed point. In other words, if I were mark a point on a paper,

More information

Thread Synchronization: Foundations. Properties. Safety properties. Edsger s perspective. Nothing bad happens

Thread Synchronization: Foundations. Properties. Safety properties. Edsger s perspective. Nothing bad happens Edsger s perspective Testing can only prove the presence of bugs Thread Synchronization: Foundations Properties Property: a predicate that is evaluated over a run of the program (a trace) every message

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

Final Examination CS 111, Fall 2016 UCLA. Name:

Final Examination CS 111, Fall 2016 UCLA. Name: Final Examination CS 111, Fall 2016 UCLA Name: This is an open book, open note test. You may use electronic devices to take the test, but may not access the network during the test. You have three hours

More information

4.7 Approximate Integration

4.7 Approximate Integration 4.7 Approximate Integration Some anti-derivatives are difficult to impossible to find. For example, 1 0 e x2 dx or 1 1 1 + x3 dx We came across this situation back in calculus I when we introduced the

More information

So, you re child wants to sign up for Myspace...

So, you re child wants to sign up for Myspace... So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users

More information

Staying Safe on the Internet. Mark Schulman

Staying Safe on the Internet. Mark Schulman Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe

More information

First-Order Translation Checklist

First-Order Translation Checklist CS103 Winter 2019 First-Order Translation Checklist Cynthia Lee Keith Schwarz In this handout, we ve distilled five specific points that you should check in your first-order logic statements before submitting

More information

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes The Study of Computational Complexity Let s summarize what

More information

Using GitHub to Share with SparkFun a

Using GitHub to Share with SparkFun a Using GitHub to Share with SparkFun a learn.sparkfun.com tutorial Available online at: http://sfe.io/t52 Contents Introduction Gitting Started Forking a Repository Committing, Pushing and Pulling Syncing

More information

FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE

FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE CONTENTFAC.COM As an FYI, this document is designed to go along with our video by the same name. If you haven t checked that out yet, you

More information

A More Sophisticated Snooping-Based Multi-Processor

A More Sophisticated Snooping-Based Multi-Processor Lecture 16: A More Sophisticated Snooping-Based Multi-Processor Parallel Computer Architecture and Programming CMU 15-418/15-618, Spring 2014 Tunes The Projects Handsome Boy Modeling School (So... How

More information

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead 1 Question #1: What is the benefit to spammers for using someone elses UA code and is there a way

More information

Scalable Cache Coherence

Scalable Cache Coherence Scalable Cache Coherence [ 8.1] All of the cache-coherent systems we have talked about until now have had a bus. Not only does the bus guarantee serialization of transactions; it also serves as convenient

More information

The objective. Atomic Commit. The setup. Model. Preserve data consistency for distributed transactions in the presence of failures

The objective. Atomic Commit. The setup. Model. Preserve data consistency for distributed transactions in the presence of failures The objective Atomic Commit Preserve data consistency for distributed transactions in the presence of failures Model The setup For each distributed transaction T: one coordinator a set of participants

More information

COMMENTS. AC-1: AC-1 does not require all processes to reach a decision It does not even require all correct processes to reach a decision

COMMENTS. AC-1: AC-1 does not require all processes to reach a decision It does not even require all correct processes to reach a decision ATOMIC COMMIT Preserve data consistency for distributed transactions in the presence of failures Setup one coordinator a set of participants Each process has access to a Distributed Transaction Log (DT

More information