Synchronizing access to resources in a hybrid computing environment
First Claim
1. A method of synchronizing access to resources in a hybrid computing environment, the hybrid computing environment comprising a host computer having a host computer architecture, and a plurality of accelerators having an accelerator architecture, wherein the host computer architecture and the accelerator architecture are different architectures such that computer program instructions compiled for execution on the host computer cannot be executed natively by the plurality of accelerators of the hybrid computing environment, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, the method comprising:
- attempting, by a process, to access a resource including determining whether a current value of a key in a registry represents an unlocked state for the resource, wherein the registry is accessible by computer program instructions that execute on the host computer architecture and computer program instructions that execute on the accelerator architecture;
if the current value of the key in the registry represents an unlocked state for the resource, attempting, by the process, to lock access to the resource including setting the value of the key to a unique identification of the process attempting to access the resource;
determining, by the process, whether the current value of the key is the unique identification of the process attempting to access the resource; and
if the current value of the key is the unique identification of the process attempting to access the resource, accessing the resource by the process.
0 Assignments
0 Petitions
Accused Products
Abstract
Synchronizing access to resources in a hybrid computing environment that includes a host computer, a plurality of accelerators, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, where synchronizing access to resources includes providing in a registry, to processes executing on the accelerators and the host computer, a key associated with a resource, the key having a value; attempting, by a process, to access the resource including determining whether a current value of the key represents an unlocked state for the resource; if the current value represents an unlocked state, attempting to lock access to the resource including setting the value to a unique identification of the process; determining whether the current value is the unique identification of the process; if the current value is the unique identification accessing the resource by the process.
-
Citations
18 Claims
-
1. A method of synchronizing access to resources in a hybrid computing environment, the hybrid computing environment comprising a host computer having a host computer architecture, and a plurality of accelerators having an accelerator architecture, wherein the host computer architecture and the accelerator architecture are different architectures such that computer program instructions compiled for execution on the host computer cannot be executed natively by the plurality of accelerators of the hybrid computing environment, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, the method comprising:
-
attempting, by a process, to access a resource including determining whether a current value of a key in a registry represents an unlocked state for the resource, wherein the registry is accessible by computer program instructions that execute on the host computer architecture and computer program instructions that execute on the accelerator architecture; if the current value of the key in the registry represents an unlocked state for the resource, attempting, by the process, to lock access to the resource including setting the value of the key to a unique identification of the process attempting to access the resource; determining, by the process, whether the current value of the key is the unique identification of the process attempting to access the resource; and if the current value of the key is the unique identification of the process attempting to access the resource, accessing the resource by the process. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A hybrid computing environment for synchronizing access to resources, the hybrid computing environment comprising a host computer having a host computer architecture, and a plurality of accelerators having an accelerator architecture, wherein the host computer architecture and the accelerator architecture are different architectures such that computer program instructions compiled for execution on the host computer cannot be executed natively by the plurality of accelerators of the hybrid computing environment, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, the hybrid computing environment further comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions capable of:
-
attempting, by a process, to access a resource including determining whether a current value of a key in a registry represents an unlocked state for the resource, wherein the registry is accessible by computer program instructions that execute on the host computer architecture and computer program instructions that execute on the accelerator architecture; if the current value of the key in the registry represents an unlocked state for the resource, attempting, by the process, to lock access to the resource including setting the value of the key to a unique identification of the process attempting to access the resource; determining, by the process, whether the current value of the key is the unique identification of the process attempting to access the resource; and if the current value of the key is the unique identification of the process attempting to access the resource, accessing the resource by the process. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for synchronizing access to resources in a hybrid computing environment, the hybrid computing environment comprising a host computer having a host computer architecture, and a plurality of accelerators having an accelerator architecture, wherein the host computer architecture and the accelerator architecture are different architectures such that computer program instructions compiled for execution on the host computer cannot be executed natively by the plurality of accelerators of the hybrid computing environment, the host computer and the accelerators adapted to one another for data communications by a system level message passing module, the computer program product disposed in a recordable computer readable medium, wherein the recordable computer readable medium is not a signal, the computer program product comprising computer program instructions capable of:
-
attempting, by a process, to access a resource including determining whether a current value of a key in a registry represents an unlocked state for the resource, wherein the registry is accessible by computer program instructions that execute on the host computer architecture and computer program instructions that execute on the accelerator architecture; if the current value of the key in the registry represents an unlocked state for the resource, attempting, by the process, to lock access to the resource including setting the value of the key to a unique identification of the process attempting to access the resource; determining, by the process, whether the current value of the key is the unique identification of the process attempting to access the resource; and if the current value of the key is the unique identification of the process attempting to access the resource, accessing the resource by the process. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification