TurboLock: increasing associativity of lock table in transactional memory | Computing Skip to main content
Log in

TurboLock: increasing associativity of lock table in transactional memory

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Transactional memory (TM) is emerging as a promising paradigm to simplify parallel programming for chip multiprocessors. Most of software transactional memory (STM) systems exploit a lock table to synchronize transactional accesses to the shared memory locations. Memory addresses map to entries of the lock table through a hash function to detect conflicts in the event of simultaneous accesses to the shared memory locations. In the current implementation of the lock table, if two distinct addresses map to the same entry of the table, they are treated as a conflict even though there is no true conflict between the two addresses. This is called false conflict. In the event of a false conflict, transactions are aborted conservatively which reduces concurrency level in programs. In this paper, we study false conflicts in STMs and propose TurboLock to reduce frequency of false conflicts. Inspired by set associative caches, TurboLock increases associativity of the lock table to reduce likelihood of aliasing-induced conflicts. While TurboLock is effective in reducing the false conflicts, it may degrade performance due to overhead of the associative lock table in software. To improve performance of TurboLock, we propose HW-TurboLock which exploits hardware to reduce overhead of the associative lock table. We have evaluated our optimization techniques using Gem5 full-system simulator and compared the performance of the new implementation with the baseline scheme. Our simulation results reveal that HW-TurboLock is highly effective and significantly improves performance of TM systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Herlihy M, Moss JEB (1993) Transactional memory: architectural support for lock-free data structures. In: Proceedings of the twentieth, annual international symposium on computer architecture, 1993

  2. Herlihy M, Wing J (1990) Linearizability: a correctness condition for concurrent objects. ACM Trans Program Lang Syst 12(3):463–492

    Article  Google Scholar 

  3. Dice D, Shalev O, Shavit N (2006) Transactional locking II. In: Proceedings of the 20th international symposium on distributed computing, pp 194–208, Sept 2006

  4. Minh CC, Trautmann M, Chung J, McDonald A, Bronson N, Casper J, Kozyrakis C, Olukotun K (2007) An effective hybrid transactional memory system with strong isolation guarantees. In: Proceedings of international symposium on computer architecture, June 2007

  5. Intel Corp. (2012) Intel Architecture Instruction Set Extensions Programming Reference, 319433–012a edition

  6. Chung J, Yen L, Diestelhorst S, Pohlack M, Hohmuth M, Grossman D, Christie D (2010) ASF: AMD64 extension for lock-free data structures and transactional memory. In: Proceedings of MICRO, Atlanta, Dec 2010

  7. Dragojevi’c A, Guerraoui R, Kapalka M (2009) Stretching transactional memory. In: Proceedings of the 2009 ACM SIGPLAN conference on programming language design and implementation, June 2009

  8. Adl-Tabatabai AR, Lewis BT, Menon V, Murphy BR, Saha B, Shpeisman T (2006) Compiler and runtime support for efficient software transactional memory. In: Proceedings of the 2006 ACM SIGPLAN conference on programming language design and implementation (PLDI ’06). ACM Press, New York, pp 26–37

  9. Felber P, Riegel T, Fetzer C (2008) Dynamic performance tuning of word-based software transactional memory. In: Proceedings of the 13th ACM SIGPLAN symposium on principles and practice of parallel programming, Feb 2008

  10. Litwin W (1980) Linear hashing : a new tool for file and table addressing. In: Proceedings of the sixth international conference on very large data bases, pp 212–223, 1980

  11. Pagh Rasmus, Rodler Flemming Friche (2004) Cuckoo hashing. J Algorithms 51(2):122–144

    Article  MATH  MathSciNet  Google Scholar 

  12. Culler DE, Singh JP, Gupta A (1998) Parallel computer architecture: a hardware/software approach. Morgan Kaufmann Publishers, San Francisco

  13. Binkert Nathan, Dreslinski Ronald, Hsu Lisa, Lim Kevin, Saidi Ali, Reinhardt Steven (2006) The M5 simulator: modeling networked systems. IEEE Micro 26(4):52–60

    Article  Google Scholar 

  14. Zilles C, Rajwar R (2007) Transactional memory and the birthday paradox. In: Proceedings of the nineteenth ACM symposium on parallel algorithms and architectures, June 2007

  15. Atoofian E (2011) Set associative lock in software transactional memory. In: The 2nd workshop on applications for multi and many core processors, San Jose, 2011

  16. Yoo RM, Ni Y, Welc A, Saha B, Adl-Tabatabai AR, Lee HS (2008) Kicking the tires of software transactional memory: Why the going gets tough. In: Proceeding of 20th ACM symposium on parallelism in algorithms and architectures, pp 265–274, June 2008

  17. Natarajan A, Mittal N (2010) False conflict reduction in the Swiss Transactional Memory (SwissTM) system. In: Proceedings of 2010 IEEE international symposium on parallel and distributed processing, April 2010

  18. Damron P, Fedorova A, Lev Y, Luchangco V, Moir M, Nussbaum D (2006) Hybrid transactional memory. In: Proceedings of the 12th international conference on architectural support for programming languages and operating systems, pp 336–346, 2006

Download references

Acknowledgments

This work was supported by the Natural Sciences and Engineering Research Council of Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ehsan Atoofian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bavarsad, A.G., Atoofian, E. TurboLock: increasing associativity of lock table in transactional memory. Computing 97, 649–661 (2015). https://doi.org/10.1007/s00607-013-0375-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-013-0375-4

Keywords

Mathematics Subject Classification