#P6928. [ICPC 2016 WF] What Really Happened on Mars?
[ICPC 2016 WF] What Really Happened on Mars?
题目描述
Real-time software in the Mars Pathfinder spacecraft suffered from an issue known as priority inversion. One technique to address this issue is to use the Priority Ceiling Protocol.
In this problem, you will simulate the execution of multiple tasks according to this protocol. The tasks share a collection of resources, each of which can be used by only one task at a time. To ensure this, resources must be locked before use and unlocked after use. Each task is defined by a start time, a unique base priority, and a sequence of instructions. Each task also has a current priority, which may change during execution. Instructions come in three types:
compute – perform a computation for one microsecond
lock – lock resource (which takes no processor time)
unlock – unlock resource (which takes no processor time)
After locking a resource, a task is said to own the resource until the task unlocks it. A task will unlock only the owned resource it most recently locked, will not lock a resource it already owns, and will complete with no owned resources.
Each resource has a fixed priority ceiling, which is the highest base priority of any task that contains an instruction to lock that resource.
There is a single processor that executes the tasks. When the processor starts, it initializes its clock to zero and then runs an infinite loop with the following steps:
Step 1.
Identify running tasks. A task is running if its start time is less than or equal to the current processor clock and not all of its instructions have been executed.
Step 2.
Determine the current priorities of the running tasks and which of the running tasks are blocked. A running task is blocked if the next instruction in is to lock resource and either resource is already owned or at least one other task owns a resource whose priority ceiling is greater than or equal to the current priority of . If is blocked, it is said to be blocked by every task owning such or . The current priority of a task is the maximum of ’s base priority and the current priorities of all tasks that blocks.
Step 3.
Execute the next instruction of the non-blocked running task (if any) with the highest current priority. If there was no such task or if a compute instruction was executed, increment the processor clock by one microsecond. If a lock or unlock instruction was executed, do not increment the clock.
The Priority Ceiling Protocol defined above has the following properties:
Current priority is defined in terms of current priority and blocking, and blocking is defined in terms of current priority. While this may appear circular, there will always be a unique set of current priorities that satisfy the definitions.
All tasks will eventually complete.
There will never be a tie in step 3.
输入格式
The first line of the input contains two integers , which is the number of tasks, and (), which is the number of resources. This is followed by lines, where the of these lines describes task . The description of a task begins with three integers: the task’s start time (), its base priority (), and an integer (). A task description is concluded by a sequence of strings describing the instructions. Each string is a letter (C or L or U) followed by an integer. The string C () indicates a sequence of compute instructions. The strings L and U () indicate instructions locking and unlocking resource respectively.
No two tasks have the same base priority.
输出格式
For each task, display the time it completes execution, in the same order that the tasks are given in the input.
3 1
50 2 5 C1 L1 C1 U1 C1
1 1 5 C1 L1 C100 U1 C1
70 3 1 C1
106
107
71
3 3
5 3 5 C1 L1 C1 U1 C1
3 2 9 C1 L2 C1 L3 C1 U3 C1 U2 C1
1 1 9 C1 L3 C3 L2 C1 U2 C1 U3 C1
8
15
16
提示
Time limit: 1000 ms, Memory limit: 1048576 kB.
International Collegiate Programming Contest (ACM-ICPC) World Finals 2016