Lock elision for protected objects using intel transactional synchronization extensions

Seongho Jeong, Shinhyung Yang, Bernd Burgstaller

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Lock elision is a technique to replace coarse-grained locks by optimistic concurrent execution. In this paper, we introduce lock elision for protected objects (POs) in Ada. We employ Intel Transactional Synchronization Extensions (TSX) as the underlying hardware transactional memory facility. With TSX, a processor can detect dynamically whether tasks need to serialize through critical sections protected by locks. We adapt the GNU Ada run-time library (GNARL) to elide locks transparently from protected functions and procedures. We critically evaluate opportunities and difficulties of lock elision with protected entries. We demonstrate that lock elision can achieve significant performance improvements for a selection of three synthetic and one real-world benchmark. We show the scalability of our approach for up to 44 cores of a two-CPU, 44-core Intel E5-2699 v4 system.

Original languageEnglish
Title of host publicationReliable Software Technologies - Ada-Europe 2017 - 22nd Ada-Europe International Conference on Reliable Software Technologies, Proceedings
EditorsMarkus Bader, Johann Blieberger
PublisherSpringer Verlag
Pages121-136
Number of pages16
ISBN (Print)9783319605876
DOIs
Publication statusPublished - 2017 Jan 1
Event22nd International Conference on Reliable Software Technologies, Ada-Europe 2017 - Vienna, Austria
Duration: 2017 Jun 122017 Jun 16

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10300 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other22nd International Conference on Reliable Software Technologies, Ada-Europe 2017
CountryAustria
CityVienna
Period17/6/1217/6/16

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Lock elision for protected objects using intel transactional synchronization extensions'. Together they form a unique fingerprint.

  • Cite this

    Jeong, S., Yang, S., & Burgstaller, B. (2017). Lock elision for protected objects using intel transactional synchronization extensions. In M. Bader, & J. Blieberger (Eds.), Reliable Software Technologies - Ada-Europe 2017 - 22nd Ada-Europe International Conference on Reliable Software Technologies, Proceedings (pp. 121-136). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10300 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-60588-3_8