Abstract
Priority inversion occurs when the execution of a task is unnecessarily delayed by the dispatch of a lower priority task. This anomaly can result in failure if it causes the delay of hard real-time tasks. Priority inheritance protocols have been developed to limit priority inversions during competition over shared resources. Such methods are designed for individually identifiable resource units. Other approaches are indicated when shared resources contain interchangeable resource units. Current practices with resource deadlock, a scheduling anomaly that has many characteristics in common with priority inversion, provide insight into the control of priority inversion with these fungible resources.
- Chen, Y.S., Chang, L.P., Kuo, T.W., and Mok, A.K. 2009. An anomaly prevention approach to real-time task scheduling, Journal of Systems and Software, 82, 1 (Jan. 2009), 114--154. Google Scholar
Digital Library
- Cheng, A. and Ras, J. 2007. The implementation of the priority ceiling protocol in Ada-2005, Ada Letters, 27, 1 (April 2007), 24--39. Google Scholar
Digital Library
- Cornhill, D. and Sha, L. 1987. Priority inversion in Ada, Ada Letters, 7, 7 (Nov. Dec. 1987), 30--32. Google Scholar
Digital Library
- Graham, R. L. 1976. Bounds on the performance of scheduling algorithms, Computer and Job-Shop Scheduling Theory, E.G. Coffman, ed., John Wiley and Sons, NY, 165--227.Google Scholar
- Holt, R.C. 1972. Some deadlock properties of computer systems, ACM Computing Surveys, 4, 3 (Sept. 1972) 179--195. Google Scholar
Digital Library
- Huang, J., Stankovic, A., Ramamritham, K., and Towsley, D. 1991. On using priority inheritance in real-time databases, 12th Real-Time Systems Symposium (Dec. 1991) 210--221.Google Scholar
- Kim, K. H. 2003. Basic program structure for avoiding priority inversion, IEEE Proc. Of 6th International Symposium on Object-oriented Real- time Distributed Computing (ISORC03), Hakodate, Japan (May 2003) 26--34. DOI=http://dream.eng.uci.edu/TMO/pdf/isorc2003.pdf Google Scholar
Digital Library
- Kleinrock, L. and Opderbeck, H. 1977. Throughput in the ARPANET- protocols and measurement, IEEE Transactions on Communications, COM-25, 1 (Jan. 1977) 95--104.Google Scholar
Cross Ref
- Levine, G. 1988. The control of priority inversion in Ada, Ada Letters, 8, 6 (Nov. Dec. 1988) 53--56. Google Scholar
Digital Library
- Levine, G. N. 2003. Defining deadlock, Operating Systems Review, 37, 1 (Jan. 2003) pp. 54--64. Google Scholar
Digital Library
- Levine, G. N. (2009) Defining defects, errors, and service degradations, ACM SIGSOFT Software Engineering Notes, 24, 2 (March 2009) 1--14. Google Scholar
Digital Library
- Mueller, F. 1999. Priority inheritance and ceilings for distributed mutual exclusion, 20th IEEE Proceedings on Real-Time Systems Symposium, (1999) 340--349. Google Scholar
Digital Library
- Naeser, G. 2005. Priority inversion in multi processor systems due to protected actions, Ada Letters, 25, 1 (March 2005) 43--47. Google Scholar
Digital Library
- Reeves, G. E. 1997. What really happened on Mars? (Dec. 1997). DOI= http://research.microsoft.com/enus/um/people/mbj/mars_pathfinder/authoritative_account.htmlGoogle Scholar
- Röck, H., Auerbach, J., Kirsch,C., and Bacon, D. 2009. Avoiding unbounded priority inversion in barrier protocols using gang priority management. Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (2009) 70-79. DOI= http://www.cs.unisalzburg.at/~hroeck/papers/JTRES09-GPM.pdf Google Scholar
Digital Library
- Rosenkrantz, D.J., Stearns, R. E., and Lewis, P.M. 1978. System level concurrency control for distributed database systems, ACM Trans. on Database Systems, 3, 2 (June 1978) 178--198. Google Scholar
Digital Library
- Sha, L., Rajkumar, R., and Lehoczky, J. P. 1990. Priority inheritance protocols: an approach to real-time synchronization, IEEE Transactions on Computers, 39, 9 (Sept. 1990) 1175--1185. Google Scholar
Digital Library
- Welc, A., Hosking, A. L., and Jagannathan, S. 2006. Preemption-based avoidance of priority inversion for Java, Int. Journal of Computer Science & Applications, 8, 11 (2006) 40--50. DOI=www.adamwelc.org/papers/icpp04.pdf.Google Scholar
Recommendations
Several Methods of Design and Implementation to Solve Priority Inversion Problem in uC/OS-II
ICINIS '13: Proceedings of the 2013 6th International Conference on Intelligent Networks and Intelligent SystemsMulti-task concurrent execution and resource sharing based on preemptive scheduling strategy may cause priority inversion phenomenon in real-time systems. Priority inversion phenomenon is the significant reason of unpredictable errors in real-time ...
Priority Inheritance and Ceilings for Distributed Mutual Exclusion
RTSS '99: Proceedings of the 20th IEEE Real-Time Systems SymposiumThe contributions of this paper are threefold. First, a solution to the problem of prioritized mutual exclusion in a distributed system is proved correct. This protocol is based on fewer requirements than prioritized extensions of other protocols and ...
Priority inversion handling in microkernel-based Real-Time Mike
RTCSA '96: Proceedings of the Third International Workshop on Real-Time Computing Systems ApplicationWe propose a resource management model to avoid priority inversion problem that may occur when two tasks attempt to send service requests to a server task, and then the server task sends a request to another server task in a nested fashion. In this ...






Comments