Skip to main content

Java: Cost of Volatile Variables

Introduction

Use of volatile variables is common among Java developers as a way of implicit synchronization. JIT compilers may reorder program execution to increase performance. Java memory model[1] constraints reordering of volatile variables. Thus volatile variable access should has a cost which is different than a non-volatile variable access.

This article will not discuss technical details on use of volatile variables. Performance impact of volatile variables is explored by using a test application.

Objective

Exploring volatile variable costs and comparing with alternative approaches.

Audience

This article is written for developers who seek to have a view about cost of volatile variables.

Test Configuration

Test application runs read and write actions on java variables. A non volatile primitive integer, a volatile primitive integer and an AtomicInteger is tested. Non-volatile primitive integer access is controlled with ReentrantLock and ReentrantReadWriteLock  to compare with explicit locking schemes.

A single test result is produced by doing 1 million read or write operations. Read and Write operations are conducted simultaneously. In some tests writing is excluded. In some tests 2 threads are used to read simultaneously.

For reliable results, each test is repeated 100 times for each variable type. Tests are run in the following order:
  • Non-volatile Primitive Integer (Shared read/write)
  • Non-volatile Primitive Integer with Reentrant Lock (Synch Read/Write)
  • Non-volatile Primitive Integer with Reentrant ReadWrite Lock (RW Synch Read/Write)
  • Volatile primitive integer (Volatile read/write)
  • AtomicInteger (Atomic read/write)
During test JIT compiler my compile some code sections. Later executions may benefit from optimizations. To eliminate any JIT compiler affect, tests are repeated 5 times in the same order.

At the and for each variable type 500 test results are generated.

Results

Average duration values are shown in y-axis. All values are in milliseconds. Please note that 500 test results are used for each variable and in each test a single thread made 1 million read or write operations. Results should be interpreted by considering thread counts and variable counts.

1- No writer, single reader.

2- No writer, 2 readers.

3- 1 Writer, 1 Readers.

4- 1 Writer, 2 Readers.

5- 1 Reader, 2 Variables

Interpreting Results

Test 1 uses 1 thread to make read operations. No concurrent write is done. Access to volatile and non volatile variables have similar costs. Using locks to constraint access is very costly.

Test 2 uses 2 threads to make concurrent reads. Results are not averaged by thread count. If we consider thread count, and divide results by 2, non volatile variable access is similar to  Test 1, which is expected.

However, volatile and atomic variables have somewhat increased costs. Reentrant Lock cost increases, which is not surprising.

ReentrantReadWrite Lock cost  increases much more than Reentrant Lock which is not expected. Expected results were close to the results of Test 1. Cost of ReentrantReadWrite Lock in all tests is not understandable. Curies readers my inspect test application code [2].

Test 3 uses 1 reader and 1 writer to inspect affect of changes. Non volatile variable access cost is similar to Test 2. Writing cost is slightly more costly compared to reading cost.Volatile reads still similar to non-volatile reads. Volatile writes however, now more than 2 times costlier than non-volatile writes. Atomic variables read cost is similar to volatile read costs. Atomic write cost is similar to volatile write cost.

If read and write costs are summed, Reentrant lock cost is found to be similar to test 2 costs. ReentrantReadWrite Lock costs are again high and not reasonable.

Test 4 adds one more reader to Test 3. Since there are two readers, divide results by 2 while interpreting. Non volatile and atomic operations are similar to results of Test 3.

Test 5 is the same setup with Test 1. Only difference is instead of 1 variable, 2 variables are used. This test aims to see if using two memory barrier is more costly than using single memory barrier through use of Locks. According to results, using locks is still more costly.

Conclusion

Volatile variables and Atomic variables are cheap ways of implicit synchronization.
Use of locks should be avoided when possible.

References

1- Java Memory Model
2- Test Application Source Code

Comments

Popular posts from this blog

Obfuscating Spring Boot Projects Using Maven Proguard Plugin

Introduction Obfuscation is the act of reorganizing bytecode such that it becomes hard to decompile. Many developers rely on obfuscation to save their sensitive code from undesired eyes. Publishing jars without obfuscation may hinder competitiveness because rivals may take advantage of easily decompilable nature of java binaries. Objective Spring Boot applications make use of public interfaces, annotations which makes applications harder to obfuscate. Additionally, maven Spring Boot plugin creates a fat jar which contains all dependent jars. It is not viable to obfuscate the whole fat jar. Thus obfuscating Spring Boot applications is different than obfuscating regular java applications and requires a suitable strategy. Audience Those who use Spring Boot and Maven and wish to obfuscate their application using Proguard are the target audience for this article. Sample Application As the sample application, I will use elastic search synch application from my GitHub repository.

Hadoop Installation Document - Standalone Mode

This document shows my experience on following apache document titled “Hadoop:Setting up a Single Node Cluster”[1] which is for Hadoop version 3.0.0-Alpha2 [2]. A. Prepare the guest environment Install VirtualBox. Create a virtual 64 bit Linux machine. Name it “ubuntul_hadoop_master”. Give it 500MB memory. Create a VMDK disc which is dynamically allocated up to 30GB. In network settings in first tab you should see Adapter 1 enabled and attached to “NAT”. In second table enable adapter 2 and attach to “Host Only Adaptor”. First adapter is required for internet connection. Second one is required for letting outside connect to a guest service. In storage settings, attach a Linux iso file to IDE channel. Use any distribution you like. Because of small installation size, I choose minimal Ubuntu iso [1]. In package selection menu, I only left standard packages selected.  Login to system.  Setup JDK. $ sudo apt-get install openjdk-8-jdk Install ssh and pdsh, if not already i