9 research outputs found

    Prompt Application-Transparent Transaction Revalidation in Software Transactional Memory

    Get PDF
    Software Transactional Memory (STM) allows encapsulating shared-data accesses within transactions, executed with atomicity and isolation guarantees. The assessment of the consistency of a running transaction is performed by the STM layer at specific points of its execution, such as when a read or write access to a shared object occurs, or upon a commit attempt. However, performance and energy efficiency issues may arise when no shared-data read/write operation occurs for a while along a thread running a transaction. In this scenario, the STM layer may not regain control for a considerable amount of time, thus not being able to early detect if such transaction has become inconsistent in the meantime. To tackle this problem we present an STM architecture that, thanks to a lightweight operating system support, is able to perform a fine-grain periodic (hence prompt) revalidation of running transactions. Our proposal targets Linux and x86 systems and has been integrated with the open source TinySTM package. Experimental results with a port of the TPC-C benchmark to STM environments show the effectiveness of our solution

    Model-Based Proactive Read-Validation in Transaction Processing Systems

    Get PDF
    Concurrency control protocols based on read-validation schemes allow transactions which are doomed to abort to still run until a subsequent validation check reveals them as invalid. These late aborts do not favor the reduction of wasted computation and can penalize performance. To counteract this problem, we present an analytical model that predicts the abort probability of transactions handled via read-validation schemes. Our goal is to determine what are the suited points-along a transaction lifetime-to carry out a validation check. This may lead to early aborting doomed transactions, thus saving CPU time. We show how to exploit the abort probability predictions returned by the model in combination with a threshold-based scheme to trigger read-validations. We also show how this approach can definitely improve performance-leading up to 14 % better turnaround-as demonstrated by some experiments carried out with a port of the TPC-C benchmark to Software Transactional Memory

    Preemptive Software Transactional Memory

    Get PDF
    In state-of-the-art Software Transactional Memory (STM) systems, threads carry out the execution of transactions as non-interruptible tasks. Hence, a thread can react to the injection of a higher priority transactional task and take care of its processing only at the end of the currently executed transaction. In this article we pursue a paradigm shift where the execution of an in-memory transaction is carried out as a preemptable task, so that a thread can start processing a higher priority transactional task before finalizing its current transaction. We achieve this goal in an application-transparent manner, by only relying on Operating System facilities we include in our preemptive STM architecture. With our approach we are able to re-evaluate CPU assignment across transactions along a same thread every few tens of microseconds. This is mandatory for an effective priority-aware architecture given the typically finer-grain nature of in-memory transactions compared to their counterpart in database systems. We integrated our preemptive STM architecture with the TinySTM package, and released it as open source. We also provide the results of an experimental assessment of our proposal based on running a port of the TPC-C benchmark to the STM environment

    A toolchain to verify the parallelization of OmpSs-2 applications

    Get PDF
    Programming models for task-based parallelization based on compile-time directives are very effective at uncovering the parallelism available in HPC applications. Despite that, the process of correctly annotating complex applications is error-prone and may hinder the general adoption of these models. In this paper, we target the OmpSs-2 programming model and present a novel toolchain able to detect parallelization errors coming from non-compliant OmpSs-2 applications. Our toolchain verifies the compliance with the OmpSs-2 programming model using local task analysis to deal with each task separately, and structural induction to extend the analysis to the whole program. To improve the effectiveness of our tools, we also introduce some ad-hoc verification annotations, which can be used manually or automatically to disable the analysis of specific code regions. Experiments run on a sample of representative kernels and applications show that our toolchain can be successfully used to verify the parallelization of complex real-world applications.This project is supported by the European Union’s Horizon 2021 research and innovation programme under grant agreement No 754304 (DEEP-EST), by the European Union’s Horizon 2020 research and innovation programme under grant agreement No 871669 (AMPERE) and the Project HPCEUROPA3 (INFRAIA-2016-1-730897), by the Ministry of Economy of Spain through the Severo Ochoa Center of Excellence Program (SEV-2015-0493), by the Spanish Ministry of Science and Innovation (contract TIN2015-65316-P), and by the Generalitat de Catalunya (2017-SGR-1481).Peer ReviewedPostprint (author's final draft

    Model-Based Proactive Read-Validation in Transaction Processing Systems

    No full text
    Concurrency control protocols based on read-validation schemes allow transactions which are doomed to abort to still run until a subsequent validation check reveals them as invalid. These late aborts do not favor the reduction of wasted computation and can penalize performance. To counteract this problem, we present an analytical model that predicts the abort probability of transactions handled via read-validation schemes. Our goal is to determine what are the suited points-along a transaction lifetime-to carry out a validation check. This may lead to early aborting doomed transactions, thus saving CPU time. We show how to exploit the abort probability predictions returned by the model in combination with a threshold-based scheme to trigger read-validations. We also show how this approach can definitely improve performance-leading up to 14 % better turnaround-as demonstrated by some experiments carried out with a port of the TPC-C benchmark to Software Transactional Memory

    Prompt Application-Transparent Transaction Revalidation in Software Transactional Memory

    No full text
    Software Transactional Memory (STM) allows encapsulating shared-data accesses within transactions, executed with atomicity and isolation guarantees. The assessment of the consistency of a running transaction is performed by the STM layer at specific points of its execution, such as when a read or write access to a shared object occurs, or upon a commit attempt. However, performance and energy efficiency issues may arise when no shared-data read/write operation occurs for a while along a thread running a transaction. In this scenario, the STM layer may not regain control for a considerable amount of time, thus not being able to early detect if such transaction has become inconsistent in the meantime. To tackle this problem we present an STM architecture that, thanks to a lightweight operating system support, is able to perform a fine-grain periodic (hence prompt) revalidation of running transactions. Our proposal targets Linux and x86 systems and has been integrated with the open source TinySTM package. Experimental results with a port of the TPC-C benchmark to STM environments show the effectiveness of our solution

    Preemptive Software Transactional Memory

    No full text
    In state-of-the-art Software Transactional Memory (STM) systems, threads carry out the execution of transactions as non-interruptible tasks. Hence, a thread can react to the injection of a higher priority transactional task and take care of its processing only at the end of the currently executed transaction. In this article we pursue a paradigm shift where the execution of an in-memory transaction is carried out as a preemptable task, so that a thread can start processing a higher priority transactional task before finalizing its current transaction. We achieve this goal in an application-transparent manner, by only relying on Operating System facilities we include in our preemptive STM architecture. With our approach we are able to re-evaluate CPU assignment across transactions along a same thread every few tens of microseconds. This is mandatory for an effective priority-aware architecture given the typically finer-grain nature of in-memory transactions compared to their counterpart in database systems. We integrated our preemptive STM architecture with the TinySTM package, and released it as open source. We also provide the results of an experimental assessment of our proposal based on running a port of the TPC-C benchmark to the STM environment

    Lockless S.r.l.

    No full text
    Lockless S.r.l. nasce dall’esperienza maturata nei passati 30 anni dal gruppo di ricerca universitario “High Performance and Dependable Computing Systems” (HPDCS) presso le università Sapienza e Tor Vergata, a Roma. Il nostro principale obiettivo è quello di offrire le nostre competenze per lo sviluppo di prodotti e soluzioni di alto profilo che ottemperino alle puntuali esigenze dei clienti, sia publici sia privati. Facciamo affidamento su una lunga esperienza nel settore della dependability, affidabilità, disaster recovery, business continuity, nonché su competenze e soluzioni che comprendono la simulazione ed il calcolo ad alte prestazioni, il calcolo parallelo e concorrente, ed i sistemi operativi. Lockless S.r.l. punta a rimanere all’avanguardia per quanto riguardano tecnologie e metodologie, contribuendo attivamente a svilupparle tramite una continua attività di ricerca e sviluppo.Lockless S.r.l. stems from the experience grown during the last 30 years by the “High Performance and Dependable Computing Systems” (HPDCS) at Sapienza university, in Rome. Lockless S.r.l. core know-how encompasses several disciplines and techniques which allow to target the design and development of large-scale, high-performance and dependable applications and solutions. We have a long experience in delivering dependability, availability, disaster recovery, simulation, high-performance computing, parallel and concurrent execution and operative systems, with ad-hoc solutions for customers and software for the general audience. Lockless S.r.l. strives to remain at the bleeding edge of technology by always pushing on high-level research activities

    Comparative anatomy of the macaque and the human frontal oculomotor domain

    No full text
    In non-human primates, at the junction of the prefrontal with the premotor cortex, there is a sector designated as frontal eye field (FEF), involved in controlling oculomotor behavior and spatial attention. Evidence for at least two FEFs in humans is at the basis of the still open issue of the possible homologies between the macaque and the human frontal oculomotor system. In this review article we address this issue suggesting a new view solidly grounded on evidence from the last decade showing that, in macaques, the FEF is at the core of an oculomotor domain in which several distinct areas, including areas 45A and 45B, provide the substrate for parallel processing of different aspects of oculomotor behavior. Based on comparative considerations, we will propose a correspondence between some of the macaque and the human oculomotor fields, thus suggesting sharing of neural substrate for oculomotor control, gaze processing, and orienting attention in space. Accordingly, this article could contribute to settle some aspects of the so-called "enigma" of the human FEF anatomy
    corecore