skip to main content
research-article

Global and Local Deadlock Freedom in BIP

Published:03 January 2018Publication History
Skip Abstract Section

Abstract

We present a criterion for checking local and global deadlock freedom of finite state systems expressed in BIP: a component-based framework for constructing complex distributed systems. Our criterion is evaluated by model-checking a set of subsystems of the overall large system. If satisfied in small subsystems, it implies deadlock-freedom of the overall system. If not satisfied, then we re-evaluate over larger subsystems, which improves the accuracy of the check. When the subsystem being checked becomes the entire system, our criterion becomes complete for deadlock-freedom. Hence our criterion only fails to decide deadlock freedom because of computational limitations: state-space explosion sets in when the subsystems become too large. Our method thus combines the possibility of fast response together with theoretical completeness. Other criteria for deadlock freedom, in contrast, are incomplete in principle, and so may fail to decide deadlock freedom even if unlimited computational resources are available. Also, our criterion certifies freedom from local deadlock, in which a subsystem is deadlocked while the rest of the system executes. Other criteria only certify freedom from global deadlock. We present experimental results for dining philosophers and for a multi-token-based resource allocation system, which subsumes several data arbiters and schedulers, including Milner’s token-based scheduler.

References

  1. Parosh Aziz Abdulla, Frédéric Haziza, and Lukás Holík. 2013. All for the price of few. In Proceedings of the International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI’13). Springer-Verlag, 476--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Aldini and Marco Bernardo. 2003. A general approach to deadlock freedom verification for software architectures. FME 2805 (2003), 658--677.Google ScholarGoogle Scholar
  3. Pedro Antonino, Thomas Gibson-Robinson, and A. W. Roscoe. 2016. Efficient deadlock-freedom checking using local analysis and SAT solving. In Proceedings of the 12th International Conference on Integrated Formal Methods (IFM’16). Springer-Verlag, 345--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Paul C. Attie. 2016. Finite-state concurrent programs can be expressed in pairwise normal form. Theor. Comp. Sci. 619 (2016), 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Paul C. Attie. 2016. Synthesis of large dynamic concurrent programs from dynamic specifications. Formal Methods in System Design 48, 1--2 (2016), 1--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Paul C. Attie, Saddek Bensalem, Marius Bozga, Mohamad Jaber, Joseph Sifakis, and Fadi A. Zaraket. 2013. An abstract framework for deadlock prevention in BIP. In Proceedings of the Formal Techniques for Distributed Systems - Joint IFIP WG 6.1 International Conference, FMOODS/FORTE 2013, held as part of the 8th International Federated Conference on Distributed Computing Techniques (DisCoTec’13). Springer-Verlag, 161--177.Google ScholarGoogle Scholar
  7. Paul C. Attie and Hana Chockler. 2005. Efficiently verifiable conditions for deadlock freedom of large concurrent programs. In VMCAI (Lecture Notes in Computer Science), Radhia Cousot (Ed.), Vol. 3385. Springer, 465--481. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Paul C. Attie and E. Allen Emerson. 1998. Synthesis of concurrent systems with many similar processes. TOPLAS 20, 1 (Jan. 1998), 51--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Paul C. Attie, Nissim Francez, and Orna Grumberg. 1993. Fairness and hyperfairness in multiparty interactions. Distrib. Comput. 6 (1993), 245--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jason Baumgartner and Andreas Kuehlmann. 2004. Enhanced diameter bounding via structural transformation. In Design, Automation and Test in Europe Conference and Exposition (DATE’04). IEEE, 36--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jason Baumgartner, Andreas Kuehlmann, and Jacob A. Abraham. 2002. Property checking via structural analysis. In Computer Aided Verification (CAV’02). Springer-Verlag, 151--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jason Baumgartner and Hari Mony. 2005. Maximal input reduction of sequential netlists via synergistic reparameterization and localization strategies. In Correct Hardware Design and Verification Methods, CHARME. Springer-Verlag, 222--237. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Saddek Bensalem, Andreas Griesmayer, Axel Legay, Thanh-Hung Nguyen, Joseph Sifakis, and Rongjie Yan. 2011. D-finder 2: Towards efficient correctness of incremental design. In NASA Formal Methods. Springer-Verlag, Pasadena, CA, 453--458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Simon Bliudze and Joseph Sifakis. 2008. The algebra of connectors—structuring interaction in BIP. IEEE Trans. Comput. 57, 10 (2008), 1315--1330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, Jean Quilbeuf, and Joseph Sifakis. 2010. From high-level component-based models to distributed implementations. In EMSOFT. ACM, 209--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Marius Bozga, Mohamad Jaber, Nikolaos Maris, and Joseph Sifakis. 2012. Modeling dynamic architectures using Dy-BIP. In Software Composition. Springer-Verlag, 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Stephen Brookes and Andrew William Roscoe. 1991. Deadlock analysis in networks of communicating processes. Distrib. Comput. 4, 4 (1991), 209--230.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Edmund M. Clarke, Robert P. Kurshan, and Helmut Veith. 2010. The localization reduction and counterexample-guided abstraction refinement. In Time for Verification, Essays in Memory of Amir Pnueli. Springer-Verlag, New York, NY, 61--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ariel Cohen and Kedar S. Namjoshi. 2009. Local proofs for global safety properties. Form. Methods Syst. Des. 34, 2 (May 2009), 104--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Brian Davey and Hilary Priestly. 2002. Introduction to Lattices and Order. Cambridge University Press, Cambridge, UK.Google ScholarGoogle Scholar
  21. Gregor Gössler and Joseph Sifakis. 2003. Component-based construction of deadlock-free systems. In FSTTCS. Springer,420--433.Google ScholarGoogle Scholar
  22. Robert P. Kurshan. 1994. Computer-Aided Verification of Coordinating Processes: The Automata-theoretic Approach. Princeton University Press, Princeton, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Moritz Martens and Mila Majster-Cederbaum. 2012. Deadlock-freedom in component systems with architectural constraints. FMSD 41, 2 (2012), 129--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jeremy Malcolm Randolph Martin. 1996. The Design and Construction of Deadlock-Free Concurrent Systems. Ph.D. Dissertation. The University of Buckingham, Buckingham MK18 1EG, United Kingdom.Google ScholarGoogle Scholar
  25. Robin Milner. 1989. Communication and Concurrency. Prentice Hall, New Jersey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Christos H. Papadimitriou. 1994. Computational Complexity. Addison-Wesley, Boston, MA.Google ScholarGoogle Scholar
  27. David Park. 1969. Fixpoint induction and proofs of program properties. Mach. Intell. 5 (1969), 59--78.Google ScholarGoogle Scholar
  28. Amir Pnueli, Sitvanit Ruah, and Lenore D. Zuck. 2001. Automatic deductive verification with invisible invariants. In Tools and Algorithms for the Construction and Analysis of Systems, TACAS. Springer-Verlag, Genova, Italy, 82--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Andrew William Roscoe and Naiem Dathi. 1987. The pursuit of deadlock freedom. Inf. Comput. 75, 3 (1987), 289--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Robert Tarjan. 1972. Depth-first search and linear graph algorithms. SIAM J. Comput. 1, 2 (1972), 146--160.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Rob J. van Glabbeek, Bas Luttik, and Nikola Trcka. 2009. Computation tree logic with deadlock detection. Log. Methods Comp. Sci. 5, 4 (Oct. 2009), 1--24.Google ScholarGoogle Scholar

Index Terms

  1. Global and Local Deadlock Freedom in BIP

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Software Engineering and Methodology
              ACM Transactions on Software Engineering and Methodology  Volume 26, Issue 3
              July 2017
              111 pages
              ISSN:1049-331X
              EISSN:1557-7392
              DOI:10.1145/3177743
              Issue’s Table of Contents

              Copyright © 2018 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 January 2018
              • Revised: 1 October 2017
              • Accepted: 1 October 2017
              • Received: 1 October 2016
              Published in tosem Volume 26, Issue 3

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader