Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
A = ൦ ൪
1 1 0 0 Algorithm 1. The simple sequential breadth-first search algorithm for
0 1 1 0 marking vertex distances from the source s. Alternatively, a shortest-
1 0 1 1 C = [0,1,1,2,0,2,3,1,3]
paths search tree can be constructed by marking i as j’s predecessor in
0 1 0 1 R = [0,2,4,7,9]
line 11.
Input: Vertex set V, row-offsets array R, column-indices array C, source
vertex s
Fig. 1. Example CSR representation: column-indices array C and row- Output: Array dist[0..n-1] with dist[v] holding the distance from s to v
offsets array R comprise the adjacency matrix A. Functions: Enqueue(val) inserts val at the end of the queue instance.
Dequeue() returns the front element of the queue instance.
2. BACKGROUND 1 Q := {}
2 for i in V:
Modern NVIDIA GPU processors consist of tens of processor 3 dist[i] := ∞
cores, each of which manages on the order of a thousand 4 dist[s] := 0
hardware-scheduled threads. Each processor core employs 5 Q.Enqueue(s)
data parallel SIMD (single instruction, multiple data) 6 while (Q != {}) :
7 i = Q.Dequeue()
techniques in which a single instruction stream is executed by
8 for offset in R[i] .. R[i+1]-1 :
a fixed-size grouping of threads called a warp. A cooperative 9 j := C[offset]
thread array (or CTA) is a group of threads that will be co- 10 if (dist[j] == ∞)
located on the same multiprocessor and share a local scratch 11 dist[j] := dist[i] + 1;
memory. Parallel threads are used to execute a single 12 Q.Enqueue(j)
program, or kernel. A sequence of kernel invocations is bulk-
synchronous: each kernel is initially presented with a
consistent view of the results from the previous. We represent the graph using an adjacency matrix A,
The efficiency of GPU architecture stems from the bulk- whose rows are the adjacency lists Ai. The number of edges
synchronous and SIMD aspects of the machine model. They within sparse graphs is typically only a constant factor larger
facilitate excellent processor utilization on uniform workloads than n. We use the well-known compressed sparse row
having regularly-structured computation. When the (CSR) sparse matrix format to store the graph in memory
computation becomes dynamic and varied, mismatches with consisting of two arrays. As illustrated in Fig. 1, the column-
the underlying architecture can result in significant indices array C is formed from the set of the adjacency lists
performance penalties. For example, performance can be concatenated into a single array of m integers. The row-
degraded by irregular memory access patterns that cannot be offsets R array contains n + 1 integers, and entry R[i] is the
coalesced or that result in arbitrarily-bad bank conflicts; index in C of the adjacency list Ai.
control flow divergences between SIMD warp threads that We store graphs in the order they are defined. We do not
result in thread serialization; and load imbalances between perform any offline preprocessing in order to improve locality
barrier synchronization points that result in resource of reference, improve load balance, or eliminate sparse
underutilization [12]. In this work, we make extensive use of memory references. Such strategies might include sorting
local prefix sum as a foundation for reorganizing sparse and neighbors within their adjacency lists; sorting vertices into a
uneven workloads into dense and uniform ones. space-filling curve and remapping their corresponding vertex
identifiers; splitting up vertices having large adjacency lists;
2.1 Breadth First Search
encoding adjacency row offset and length information into
We consider graphs of the form G = (V, E) with a set V of n vertex identifiers; removing duplicate edges, singleton
vertices and a set E of m directed edges. Given a source vertices, and self-loops; etc.
vertex vs, our goal is to traverse the vertices of G in breadth- Algorithm 1 describes the standard sequential BFS
first order starting at vs. Each newly-discovered vertex vi will method for circulating the vertices of the input graph through
be labeled by (a) its distance di from vs and/or (b) the a FIFO queue that is initialized with vs [13]. As vertices are
predecessor vertex pi immediately preceding it on the shortest dequeued, their neighbors are examined. Unvisited
path to vs. neighbors are labeled with their distance and/or predecessor
Fundamental uses of BFS include: identifying all of the and are enqueued for later processing. This algorithm
connected components within a graph; finding the diameter of performs linear O(m+n) work since each vertex is labeled
tree; and testing a graph for bipartiteness [13]. More exactly once and each edge is traversed exactly once.
sophisticated problems incorporating BFS include: identifying
the reachable set of heap items during garbage collection [14]; 2.2 Parallel Breadth-First Search
belief propagation in statistical inference [15], finding The FIFO ordering of the sequential algorithm forces it to
community structure in networks [16], and computing the label vertices in increasing order of depth. Each depth level is
maximum-flow/minimum-cut for a given graph [17]. fully explored before the next. Most parallel BFS algorithms
For simplicity, we identify the vertices v0 .. vn-1 using are level-synchronous: each level may be processed in parallel
integer indices. The pair (vi, vj) indicates a directed edge in as long as the sequential ordering of levels is preserved. An
the graph from vi → vj, and the adjacency list Ai = {vj | (vi, vj) implicit race condition can exist where multiple tasks may
∈ E} is the set of neighboring vertices adjacent from vertex vi. concurrently discover a vertex vj. This is generally
We treat undirected graphs as symmetric directed graphs considered benign since all such contending tasks would
containing both (vi, vj) and (vj, vi) for each undirected edge. In apply the same dj and give a valid value of pj.
this paper, all graph sizes and traversal rates are measured in Structurally different methods may be more suitable for
terms of directed edge counts. graphs with very large diameters, e.g., algorithms based on
2
Algorithm 2. A simple quadratic-work, vertex-oriented BFS Algorithm 3. A linear-work BFS parallelization constructed using a
parallelization global vertex-frontier queue.
Input: Vertex set V, row-offsets array R, column-indices array C, source Input: Vertex set V, row-offsets array R, column-indices array C, source
vertex s vertex s, queues
Output: Array dist[0..n-1] with dist[v] holding the distance from s to v Output: Array dist[0..n-1] with dist[v] holding the distance from s to v
Functions: LockedEnqueue(val) safely inserts val at the end of the queue
1 parallel for (i in V) : instance
2 dist[i] := ∞
3 dist[s] := 0 1 parallel for (i in V) :
4 iteration := 0 2 dist[i] := ∞
5 do : 3 dist[s] := 0
6 done := true 4 iteration := 0
7 parallel for (i in V) : 5 inQ := {}
8 if (dist[i] == iteration) 6 inQ.LockedEnqueue(s)
9 done := false 7 while (inQ != {}) :
10 for (offset in R[i] .. R[i+1]-1) : 8 outQ := {}
11 j := C[offset] 9 parallel for (i in inQ) :
12 dist[j] = iteration + 1 10 for (offset in R[i] .. R[i+1]-1) :
13 iteration++ 11 j := C[offset]
14 while (!done) 12 if (dist[j] == ∞)
13 dist[j] = iteration + 1
14 outQ.LockedEnqueue(j)
15 iteration++
16 inQ := outQ
the method of Ullman and Yannakakis [18]. Such alternatives These quadratic methods are isomorphic to iterative
are beyond the scope of this paper. SpMV in the algebraic semi-ring where the usual (+, ×)
Each iteration of a level-synchronous method identifies operations are replaced with (min, +), and thus can also be
both an edge and vertex frontier. The edge-frontier is the set realized using generic implementations of SpMV [23].
of all edges to be traversed during that iteration or, Linear parallelizations. A work-efficient parallel BFS
equivalently, the set of all Ai where vi was marked in the algorithm should perform O(n+m) work. To achieve this,
previous iteration. The vertex-frontier is the unique subset of each iteration should examine only the edges and vertices in
such neighbors that are unmarked and which will be labeled that iteration’s logical edge and vertex-frontiers, respectively.
and expanded for the next iteration. Each iteration logically Frontiers may be maintained in core or out of core. An
expands vertices into an edge-frontier and then contracts them in-core frontier is processed online and never wholly realized.
to a vertex-frontier. On the other hand, a frontier that is managed out-of-core is
Quadratic parallelizations. The simplest parallel BFS fully produced in off-chip memory for consumption by the
algorithms inspect every edge or, at a minimum, every vertex next BFS iteration after a global synchronization step.
during every iteration. These methods perform a quadratic Implementations typically prefer to manage the vertex-
amount of work. A vertex vj is marked when a task discovers frontier out-of-core. Less global data movement is needed
an edge vi → vj where vi has been marked and vj has not. As because the average vertex-frontier is smaller by a factor of ̅
Algorithm 2 illustrates, vertex-oriented variants must (average out-degree). As described in Algorithm 3, each BFS
subsequently expand and mark the neighbors of vj. Their iteration maps tasks to unexplored vertices in the input vertex-
work complexity is O(n2+m) as there may n BFS iterations in frontier queue. Their neighbors are inspected and the
the worst case. unvisited ones are placed into the output vertex-frontier queue
Quadratic parallelization strategies have been used by for the next iteration.
almost all prior GPU implementations. The static assignment Research has traditionally focused on two aspects of this
of tasks to vertices (or edges) trivially maps to the data- scheme: (1) improving hardware utilization via intelligent
parallel GPU machine model. Each thread’s computation is task scheduling; and (2) designing shared data structures that
completely independent from that of other threads. Harish et incur minimal overhead from insertion and removal
al. [19] and Hussein et al. [17] describe vertex-oriented operations.
versions of this method. Deng et al. present an edge-oriented The typical approach for improving utilization is to
implementation [20]. reduce the task granularity to a homogenous size and then
Hong et al. [21] describe a vectorized version of the evenly distribute these smaller tasks among threads. This is
vertex-oriented method that is similar to the CSR sparse done by expanding and inspecting neighbors in parallel.
matrix-vector (SpMV) multiplication approach by Bell and Logically, the sequential-for loop in line 10 of Algorithm 3 is
Garland [22]. Rather than threads, warps are mapped to replaced with a parallel-for loop. The implementation can
vertices. During neighbor expansion, the SIMD lanes of an either: (a) spawn all edge-inspection tasks before processing
entire warp are used to strip-mine1 the corresponding any, wholly realizing the edge-frontier out-of-core; or (b)
adjacency list. carefully throttle the parallel expansion and processing of
adjacency lists, producing and consuming these tasks in-core.
In recent BFS research, Leiserson and Schardl [6]
1 designed an implementation for multi-socket CPU systems
Strip mining entails the sequential processing of parallel
batches, where the batch size is typically the number of that incorporates a novel multi-set data structure for tracking
hardware SIMD vector lanes. the vertex-frontier. They implement concurrent neighbor
3
Algorithm 4. A linear-work, vertex-oriented BFS parallelization for a Table 1. Suite of benchmark graphs
graph that has been partitioned across multiple processors. The scheme Avg.
Sparsity n m
uses a set of distributed edge-frontier queues, one per processor. Name Description 6 6 d Search
Plot (10 ) (10 )
Input: Vertex set V, row-offsets array R, column-indices array C, source Depth
vertex s, queues European road
europe.osm 50.9 108.1 2.1 19314
Output: Array dist[0..n-1] with dist[v] holding the distance from s to v network
Functions: LockedEnqueue(val) safely inserts val at the end of the queue 5-point Poisson
instance grid5pt.5000 stencil (2D grid 25.0 125.0 5.0 7500
lattice)
1 parallel for i in V : Adaptive numerical
hugebubbles-00020 21.2 63.6 3.0 6151
2 distproc[i] := ∞ simulation mesh
3 iteration := 0 7-point Poisson
4 parallel for (proc in 0 .. processors-1) : grid7pt.300 stencil (3D grid 27.0 188.5 7.0 679
5 inQproc := {} lattice)
6 outQproc := {} 3D PDE-constrained
nlpkkt160 8.3 221.2 26.5 142
7 if (proc == Owner(s)) optimization
8 inQproc.LockedEnqueue(s)
Automotive finite
9 distproc[s] := 0 audikw1 0.9 76.7 81.3 62
element analysis
10 do :
Electrophoresis
11 done := true; cage15 transition 5.2 94.0 18.2 37
12 parallel for (proc in 0 .. processors-1) : probabilities
13 parallel for (i in inQproc) : Nonlinear
14 if (distproc[i] == ∞) kkt_power 2.1 13.0 6.3 37
optimization (KKT)
15 done := false
16 distproc[i] := iteration coPapersCiteseer Citation network 0.4 32.1 73.9 26
17 for (offset in R[i] .. R[i+1]-1) :
18 j := C[offset] Links between
wikipedia-20070206 3.6 45.0 12.6 20
Wikipedia pages
19 dest := owner(j)
20 outQdest.LockedEnqueue(j) Graph500 RMAT
21 parallel for (proc in 0 .. processors-1) : kron_g500-logn20 (A=0.57, B=0.19, 1.0 100.7 96.0 6
C=0.19)
22 inQproc := outQproc
23 iteration++ G(n, M) uniform
random.2Mv.128Me 2.0 128.0 64.0 6
random
24 while (!done)
RMAT (A=0.45,
rmat.2Mv.128Me 2.0 128.0 64.0 6
B=0.15, C=0.15)
inspection, using the Cilk++ runtime to manage the edge- Distributed, out-of-core edge queues are used for
processing tasks in-core. communicating neighbors to remote processors. Algorithm 4
For the Cray MTA-2, Bader and Madduri [7] describe an describes the general method. Incoming neighbors that are
implementation using the hardware’s full-empty bits for unvisited have their labels marked and their adjacency lists
efficient queuing into an out-of-core vertex frontier. They expanded. As adjacency lists are expanded, neighbors are
also perform adjacency-list expansion in parallel, relying on enqueued to the processor that owns them. The
the parallelizing compiler and fine-grained thread-scheduling synchronization between BFS levels occurs after the
hardware to manage edge-processing tasks in-core. expansion phase.
Luo et al. [24] present an implementation for GPUs that It is important to note that distributed BFS
relies upon a hierarchical scheme for producing an out-of-core implementations that construct predecessor trees will impose
vertex-frontier. To our knowledge, theirs is the only prior twice the queuing I/O as those that construct depth-rankings.
attempt at designing a work-efficient BFS algorithm for These variants must forward the full edge pairing (vi, vj) to the
GPUs. Their GPU kernels logically correspond to lines 10-13 remote processor so that it might properly label vj’s
of Algorithm 3. Threads perform serial adjacency list predecessor as vi.
expansion and use an upward propagation tree of child-queue Yoo et al. [25] present a variation for BlueGene/L that
structures in an effort to mitigate the contention overhead on implements a two-dimensional partitioning strategy for
any given atomically-incremented queue pointer. reducing the number of remote peers each processor must
Distributed parallelizations. It is often desirable to communicate with. Xia and Prasanna [4] propose a variant
partition the graph structure amongst multiple processors, for multi-socket nodes that provisions more out-of-core edge-
particularly for datasets too large to fit within the physical frontier queues than active threads, reducing the contention at
memory of a single machine. Even for shared-memory SMP any given queue and flexibly lowering barrier overhead.
platforms, recent research has shown it to be advantageous to Agarwal et al. [5] describe a two-phase implementation
partition the graph amongst the different CPU sockets; a for multi-socket systems that implements both out-of-core
given socket will have higher throughput to the specific vertex and edge-frontier queues for each socket. As a hybrid
memory managed by its local DDR channels [5]. of Algorithm 3 and Algorithm 4, only remote edges are
The typical partitioning approach is to assign each queued out-of-core. Edges that are local are inspected and
processing element a disjoint subset of V and the filtered in-core. After a global synchronization, a second
corresponding adjacency lists in E. For a given vertex vi, the phase is performed to filter edges from remote sockets. Their
inspection and marking of vi as well as the expansion of vi’s implementation uses a single, global, atomically-updated
adjacency list must occur on the processor that owns vi.
4
25 Edge-frontier 0.030 Edge-frontier 0.5 Edge-frontier
Unique neighbors Unique neighbors Unique neighbors
20 0.025 0.4
Vertex-frontier Vertex-frontier
Vertices (millions)
Vertices (millions)
Vertices (millions)
Vertex-frontier
0.020
15 0.3
0.015
10 0.2
0.010
5 0.1
0.005
0 0.000 0.0
0 2 4 6 8 10 12 14 16 18 0 4000 8000 12000 16000 0 100 200 300 400 500 600 700 800
BFS Iteration BFS Iteration BFS Iteration
Vertices (millions)
3.0 Vertices (millions) 100
3.0
2.5 80 2.5
2.0 2.0
60
1.5 1.5
40
1.0 1.0
0.5 20 0.5
0.0 0.0
0
0 20 40 60 80 100 120 140 160 0 5 10 15 20 25 30 35 40 45 50
0 1 2 3 4
BFS Iteration BFS Iteration
BFS Iteration
(d) nlpkkt60 (e) rmat.2Mv.128Me (f) audikw1
Fig. 2. Sample frontier plots of logical vertex and edge-frontier sizes during graph traversal.
5
Algorithm 5. GPU pseudo-code for a warp-based, strip-mined Algorithm 6. GPU pseudo-code for a fine-grained, scan-based
neighbor-gathering approach. neighbor-gathering approach.
Input: Vertex-frontier Qvfront, column-indices array C, and the offset cta_offset Input: Vertex-frontier Qvfront, column-indices array C, and the offset
for the current tile within Qvfront cta_offset for the current tile within Qvfront
Functions: WarpAny(predi) returns true if any predi is set for any thread ti Functions: CtaPrefixSum(vali) performs a CTA-wide prefix sum where
்_்ுோாௌିଵ
within the warp. each thread ti is returned the pair {∑ିଵ ୀ , ∑ୀ }.
CtaBarrier() performs a barrier across all threads within the CTA.
1 GatherWarp(cta_offset, Qvfront, C) {
2 volatile shared comm[WARPS][3]; 1 GatherScan(cta_offset, Qvfront, C) {
3 {r, r_end} = Qvfront[cta_offset + thread_id]; 2 shared comm[CTA_THREADS];
4 while (WarpAny(r_end – r)) { 3 {r, r_end} = Qvfront[cta_offset + thread_id];
5 4 // reserve gather offsets
6 // vie for control of warp 5 {rsv_rank, total} = CtaPrefixSum(r_end – r);
7 if (r_end – r) 6 // process fine-grained batches of adjlists
8 comm[warp_id][0] = lane_id; 7 cta_progress = 0;
9 8 while ((remain = total - cta_progress) > 0) {
10 // winner describes adjlist 9 // share batch of gather offsets
11 if (comm[warp_id][0] == lane_id) { 10 while((rsv_rank < cta_progress + CTA_THREADS)
12 comm[warp_id][1] = r; 11 && (r < r_end))
13 comm[warp_id][2] = r_end; 12 {
14 r = r_end; 13 comm[rsv_rank – cta_progress] = r;
15 } 14 rsv_rank++;
16 15 r++;
17 // strip-mine winner’s adjlist 16 }
18 r_gather = comm[warp_id][1] + lane_id; 17 CtaBarrier();
19 r_gather_end = comm[warp_id][2]; 18 // gather batch of adjlist(s)
20 while (r_gather < r_gather_end) { 19 if (thread_id < Min(remain, CTA_THREADS) {
21 volatile neighbor = C[r_gather]; 20 volatile neighbor = C[comm[thread_id]];
22 r_gather += WARP_SIZE; 21 }
23 } 22 cta_progress += CTA_THREADS;
24 } 23 CtaBarrier();
25 } 24 }
25 }
6
Label Lookup Bitmask+Label Lookup
32 Serial Warp Scan Scan+Warp+CTA 3.5 14 1.3
12
109 edges / sec (log)
16 3.0
normalized
8 2.5
normalized
4 8
2.0 1.1
2 6
1.5
1 4
1.0 1.0
0.5 2
0.25 0.5
0 0.9
0.125 0.0
100 1.0
30
bytes / edge
normalized
0.8
normalized
80 0.8
20 0.6
60 0.6
0.4
40 0.4 10
0.2
20 0.2
0 0.0
0 0.0
7
Bitmask+Label Lookup Scan+Warp+CTA Gather 7 1.5
20 1.5 Isolated Gather+Lookup Fused Gather+Lookup
6
15 5
normalized
1.0
normalized
1.3 4
10 3
1.2
2 0.5
5 1.1
1
0 1.0 0 0.0
Fig. 5. Comparison of lookup vs. gathering. Fig. 6. Comparison of isolated vs. fused lookup and gathering.
Actual Actual
BFS
Vertex- Edge-
Iteration
frontier frontier
1 0 1,3
2 1,3 2,4,4,6
3 2,4,4,6 5,5,7,5,7,7
4 5,5,7,5,7,7 8,8,8,8,8,8,8
Our strategy for status-lookup incorporates a bitmask to fusion with a derivation of our scan+warp+cta gathering
reduce the size of status data from a 32-bit label to a single bit kernel that immediately inspects every gathered neighbor
per vertex. CPU parallelizations have used atomically- using our bitmap-assisted lookup strategy. The coupled
updated bitmask structures to reduce memory traffic via kernel requires O(m) less overall data movement than the
improved cache coverage [5], [26]. Because we avoid atomic other two put together (which effectively read all edges
operations, our bitmask is only a conservative approximation twice).
of visitation status. Bits for visited vertices may appear unset Fig. 6 compares this fused kernel with the aggregate
or may be “clobbered” due to false-sharing within a single throughput of the isolated gathering and lookup workloads
byte. If a status bit is unset, we must then perform a second performed separately. Despite the additional data movement,
read to check the corresponding label to ensure the vertex is the separate kernels outperform the fused kernel for the
safe for marking. This scheme relies upon capacity and majority of the benchmarks. Their extra data movement
conflict misses to update stale bitmask data within the read- results in net slowdown, however, for the latency-bound
only texture caches. datasets on the left-hand side having limited bulk
Similar to the neighbor-gathering analysis, we isolate the concurrency. The implication is that fused approaches are
status-lookup workload using a test-kernel that consumes the preferable for fleeting BFS iterations having edge-frontiers
logical edge-frontier at each BFS iteration. Despite having smaller than the number of resident threads.
much smaller and more transient last-level caches, Fig. 3 The fused kernel likely suffers from TLB misses
confirms the technique can reduce global DRAM overhead experienced by the neighbor-gathering workload. The
and accelerate status-lookup for GPU architectures as well. column-indices arrays occupy substantial portions of GPU
The exceptions are the datasets on the left having a hundred physical memory. Sparse gathers from them are apt to cause
or more BFS iterations. The bitmask is less effective for these TLB misses. The fusion of these two workloads inherits the
datasets because texture caches are flushed between kernel worst aspects of both: TLB turnover during uncoalesced
invocations. Without coverage, the inspection often requires status lookups.
a second label lookup which further adds delay to latency-
bound BFS iterations. As a result, we skip bitmask lookup for 4.3 Concurrent Discovery
fleeting iterations having edge-frontiers smaller than the Duplicate vertex identifiers within the edge-frontier are
number of resident threads. representative of different edges incident to the same vertex.
Fig. 5 compares the throughputs of lookup versus This can pose a problem for implementations that allow the
gathering workloads. We observe that status-lookup is benign race condition. Adjacency lists will be expanded
generally the more expensive of the two. This is particularly multiple times when multiple threads concurrently discover
true for the datasets on the right-hand side having high the same vertices via these duplicates. Without atomic
average vertex out-degree. The ability for neighbor-gathering updates to visitation status, we show the SIMD nature of the
to coalesce accesses to adjacency lists increases with ̅ , GPU machine model can introduce a significant amount of
whereas accesses for status-lookup have arbitrary locality. redundant work.
A complete BFS implementation might choose to fuse Effect on overall workload. Prior CPU parallelizations
these workloads within the same kernel in order to process have noted the potential for redundant work, but concluded its
one of the frontiers online and in-core. We evaluate this manifestation to be negligible [6]. Concurrent discovery on
8
2.0 Edge Frontier 10 Edge Frontier 20 Edge Frontier
Vertex Frontier 9 Vertex Frontier Vertex Frontier
Expanded Expanded Expanded
Contracted 8 Contracted Contracted
1.5 15
Vertices (millions)
Vertices (millions)
Vertices (millions)
7
6
1.0 5 10
4
0.5 3
5
2
1
0.0 0
0
0 100 200 300 400 500 600 700 800 0 4 8 12 16 20 24
0 20 40 60 80 100 120 140 160
BFS Iteraiton BFS Iteration
BFS Iteration
(a) grid7pt.300 (b) nlpkkt160 (c) coPapersCiteseer
Fig. 8. Actual expanded and contracted queue sizes without local duplicate culling, superimposed over logical frontier sizes.
4.2x
Algorithm 7. GPU pseudo-code for a localized, warp-based
duplicate-detection heuristic.
2.4x 2.6x
Input: Vertex identifier neighbor
1.7x
1.4x 1.3x Output: True if neighbor is a conclusive duplicate within the warp’s
1.1x 1.2x 1.1x 1.1x working set.
n/a
1
1 WarpCull(neighbor) {
2 volatile shared scratch[WARPS][128];
3 hash = neighbor & 127;
4 scratch[warp_id][hash] = neighbor;
5 retrieved = scratch[warp_id][hash];
Fig. 9 Redundant work expansion incurred by variants of our two-
6 if (retrieved == neighbor) {
phase BFS implementation. Unlabeled columns are < 1.05x.
7 // vie to be the “unique” item
8 scratch[warp_id][hash] = thread_id;
9 if (scratch[warp_id][hash] != thread_id) {
CPU platforms is rare due to a combination of relatively low 10 // someone else is unique
parallelism (~8 hardware threads) and coherent L1 caches that 11 return true;
provide only a small window of opportunity around status- 12 }
inspections that are immediately followed by status updates. 13 }
The GPU machine model, however, is much more 14 return false;
15 }
vulnerable. If multiple threads within the same warp are
simultaneously inspecting same vertex identifier, the SIMD
nature of the warp-read ensures that all will obtain the same
status value. If unvisited, the adjacency list for this vertex We define the redundant expansion factor as the ratio of
will be expanded for every thread. neighbors actually enqueued versus the number of edges
Fig. 7 demonstrates an acute case of concurrent discovery. logically traversed. Fig. 9 plots the redundant expansion
In this example, we traverse a small single-source, single-sink factors measured for our two-phase implementation, both with
lattice using fine-grained cooperative expansion (e.g., and without extra measures to mitigate concurrent discovery.
Algorithm 6). For each BFS iteration, the cooperative The problem is severe for spatially-descriptive datasets.
behavior ensures that all neighbors are gathered before any These datasets exhibit nearby duplicates within the edge-
are inspected. No duplicates are culled from the edge frontier frontier due to their high frequency of convergent exploration.
because SIMD lookups reveal every neighbor as being For example, simple two-phase traversal incurs 4.2x
unvisited. The actual edge and vertex-frontiers diverge from redundant expansion for the 2D lattice grid5pt.5000 dataset.
ideal because no contraction occurs. This is cause for Even worse, the implementation altogether fails to traverse
concern: the excess work grows geometrically, only slowing the kron_g500-logn20 dataset which encodes sorted
when the frontier exceeds the width of the machine or the adjacency lists. The improved locality enables the redundant
graph ceases to expand. expansion of ultra-popular vertices, ultimately exhausting
We measure the effects of redundant expansion upon physical memory when filling the edge queue.
overall workload using a simplified version of the two-phase This issue of redundant expansion appears to be unique to
BFS implementation described in Section 5. These expansion GPU BFS implementations having two properties: (1) a work-
and contraction kernels make no special effort to curtail efficient traversal algorithm; and (2) concurrent adjacency list
concurrent discovery. For several sample traversals, Fig. 8 expansion. Quadratic implementations do not suffer
illustrates compounded redundancy by plotting the actual redundant work because vertices are never expanded by more
numbers of vertex identifiers expanded and contracted for than one thread. In our evaluation of linear-work serial-
each BFS iteration alongside the corresponding logical expansion, we observed negligible concurrent SIMD
frontiers. The deltas between these pairs reflect the discovery during serial inspection due to the independent
generation of unnecessary work. nature of thread activity.
9
% of false-negatives
Bitmask
100
Bitmask+Label Bitmask+Label+WarpCull Bitmask+Label+WarpCull+HistoryCull
5. SINGLE-GPU PARALLELIZATIONS
10 A complete solution must couple expansion and contraction
1
0.1 activities. In this section, we evaluate the design space of
0.01 coupling alternatives:
0.001
0.0001 1. Expand-contract. A single kernel consumes the current
vertex-frontier and produces the vertex-frontier for the
next BFS iteration.
2. Contract-expand. The converse. A single kernel
contracts the current edge-frontier, expanding unvisited
Fig. 10 Percentages of false-negatives incurred by status-lookup
strategies.
vertices into the edge-frontier for the next iteration.
3. Two-phase. A given BFS iteration is processed by two
kernels that separately implement out-of-core expansion
In general, the issue of concurrent discovery is a result of and contraction.
false-negatives during status-lookup, i.e., failure to detect
previously-visited and duplicate vertex identifiers within the 4. Hybrid. This implementation invokes the contract-
edge-frontier. Atomic read-modify-write updates to visitation expand kernel for small, fleeting BFS iterations,
status yield zero false-negatives. As alternatives, we otherwise the two-phase kernels.
introduce two localized mechanisms for reducing false- We describe and evaluate BFS kernels for each strategy. We
negatives: (1) warp culling and (2) history culling. show the hybrid approach to be on-par-with or better-than the
Warp culling. Algorithm 7 describes this heuristic for other three for every dataset in our benchmark suite.
preventing concurrent SIMD discovery by detecting the
presence of duplicates within the warp’s immediate working 5.1 Expand-contract (out-of-core vertex queue)
set. Using shared-memory per warp, each thread hashes in Our expand-contract kernel is loosely based upon the fused
the neighbor it is currently inspecting. If a collision occurs gather-lookup benchmark kernel from Section 4.2. It
and a different value is extracted, nothing can be determined consumes the vertex queue for the current BFS iteration and
regarding duplicate status. Otherwise threads then write their produces the vertex queue for the next. It performs parallel
thread-identifier into the same hash location. Only one write expansion and filtering of adjacency lists online and in-core
will succeed. Threads that subsequently retrieve a different using local scratch memory.
thread-identifier can safely classify their neighbors as A CTA performs the following steps when processing a
duplicates to be culled. tile of input from the incoming vertex-frontier queue:
History culling. This heuristic complements the 1. Threads perform local warp-culling and history-culling
instantaneous coverage of warp culling by maintaining a to determine if their dequeued vertex is a duplicate.
cache of recently-inspected vertex identifiers in local shared
memory. If a given thread observes its neighbor to have been 2. If still valid, the corresponding row-range is loaded from
previously recorded, it can classify that neighbor as safe for the row-offsets array R.
culling. 3. Threads perform coarse-grained, CTA-based neighbor-
Analysis. We augment our isolated lookup tests to gathering. Large adjacency lists are cooperatively strip-
evaluate these heuristics. Kernels simply read vertex mined from the column-indices array C at the full width
identifiers from the edge-frontier and determine which should of the CTA. These strips of neighbors are filtered in-
not be allowed into the vertex-frontier. For each dataset, we core and the unvisited vertices are enqueued into the
record the average percentage of false negatives with respect output queue as described below.
to m – n, the ideal number of culled vertex identifiers. 4. Threads perform fine-grained, scan-based neighbor-
Fig. 10 illustrates the progressive application of lookup
gathering. These batches of neighbors are filtered and
mechanisms. The bitmask heuristic alone incurs an average enqueued into the output queue as described below.
false-negative rate of 6.4% across our benchmark suite. The
addition of label-lookup (which makes status-lookup safe) For each strip or batch of gathered neighbors:
improves this to 4.0%. Without further measure, the i. Threads perform status-lookup to invalidate the vast
compounding nature of redundant expansion allows even majority of previously-visited and duplicate neighbors.
small percentages to accrue sizeable amounts of extra work.
For example, a false-negative rate of 3.5% for traversing ii. Threads with a valid neighbor ni update the
kkt_power results in a 40% redundant expansion overhead. corresponding label.
The addition of warp-based culling induces a tenfold iii. Threads then perform a CTA-wide prefix sum where
reduction in false-negatives for spatially descriptive graphs each contributes a 1 if ni is valid, 0 otherwise. This
(left-hand side). The history-based culling heuristic further provides each thread with the scatter offset for ni and the
reduces culling inefficiency by a factor of five for the total count of all valid neighbors.
remainder of high-risk datasets (middle-third). The iv. Thread0 obtains the base enqueue offset for valid
application of both heuristics allows us to reduce the overall neighbors by performing an atomic-add operation on a
redundant expansion factor to less than 1.05x for every graph global queue counter using the total valid count. The
in our benchmark suite. returned value is shared to all other threads in the CTA.
10
v. Finally, all valid ni are written to the global output 3.5 Expand-Contract Contract-Expand 2-Phase Hybrid 1.4
3.0 1.2
queue. The enqueue index for ni is the sum of the base
normalized
enqueue offset and the scatter offset. 2.0 0.8
1.5 0.6
This kernel requires 2n global storage for input and output 1.0 0.4
vertex queues. The roles of these two arrays are reversed for 0.5 0.2
0.0 0.0
alternating BFS iterations. A traversal will generate 5n+2m
explicit data movement through global memory. All m edges
will be streamed into registers once. All n vertices will be
streamed twice: out into global frontier queues and
subsequently back in. The bitmask bits will be inspected m (a) Average traversal throughput
times and updated n times along with the labels. Each of the
n row-offsets is loaded twice. 140
Expand-Contract Contract-Expand 2-Phase Hybrid
2.0
120
Each CTA performs two or more local prefix-sums per 100 1.5
Bytes / edge
normalized
tile. One is used for allocating room for gather offsets during 80
1.0
scan-based gathering. We also need prefix sums to compute 60
40
global enqueue offsets for every strip or batch of gathered 20
0.5
normalized
600
and copied out into the edge queue for the next iteration. 1.0
A CTA performs the following steps when processing a 400
0.5
tile of input from the incoming edge-frontier queue: 200
0 0.0
1. Threads progressively test their neighbor vertex
identifier ni for validity using (i) status-lookup; (ii)
warp-based duplicate culling; and (iii) history-based
duplicate culling.
2. Threads update labels for valid ni and obtain the (c) Average computational workload
corresponding row-ranges from R.
Fig. 11 BFS traversal performance and workloads. Harmonic means
3. Threads then perform two concurrent CTA-wide prefix are normalized with respect to the expand-contract implementation.
sums: the first for computing enqueue offsets for coarse-
grained warp and CTA neighbor-gathering, the second
for fine-grained scan-based gathering. |Ai| is contributed This kernel requires 2m global storage for input and
to the first prefix sum if greater than WARP_SIZE, output edge queues. Variants that label predecessors,
otherwise to the second. however, require an additional pair of “parent” queues to
4. Thread0 obtains a base enqueue offset for valid track both origin and destination identifiers within the edge-
neighbors within the entire tile by performing an atomic- frontier. A traversal will generate 3n+4m explicit global data
add operation on a global queue counter using the movement. All m edges will be streamed through global
combined totals of the two prefix sums. The returned memory three times: into registers from C, out to the edge
value is shared to all other threads in the CTA. queue, and back in again the next iteration. The bitmask,
label, and row-offset traffic remain the same as for expand-
5. Threads then perform coarse-grained CTA and warp-
contract.
based gathering. When a thread commandeers its CTA
Despite a much larger queuing workload, the contract-
or warp, it also communicates the base scatter offset for
expand strategy is often better suited for processing small,
ni to its peers. After gathering neighbors from C,
fleeting BFS iterations. It incurs lower latency because CTAs
enlisted threads enqueue them to the global output
only perform local two prefix sums per block. We overlap
queue. The enqueue index for each thread is the sum of
these prefix-sums to further reduce latency. By operating on
the base enqueue offset, the shared scatter offset, and
the larger edge-frontier, the contract-expand kernel also
thread-rank.
enjoys better bulk concurrency in which fewer resident CTAs
6. Finally, threads perform fine-grained scan-based sit idle.
gathering. This procedure is a variant of Algorithm 6
with the prefix sum being hoisted out and performed 5.3 Two-phase (out-of-core vertex and edge queues)
earlier in Step 4. After gathering packed neighbors from Our two-phase implementation isolates the expansion and
C, threads enqueue them to the global output. The contraction workloads into separate kernels. Our micro-
enqueue index is the sum of the base enqueue offset, the benchmark analyses suggest this design for better overall bulk
coarse-grained total, the CTA progress, and thread-rank. throughput. The expansion kernel employs the
11
2500 800
Edge Frontier
Edge Frontier 700
Thread-instructions / edge
2000 Vertex Frontier Vertex Frontier
600
109 edges / sec
Two-phase Two-phase
1500 500
Contract-Expand Contract-Expand
400
1000 300
200
500
100
0 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Fig. 12. Sample wikipedia-20070206 traversal behavior. Plots are superimposed over the shape of the logical edge and vertex-frontiers.
12
4.0 d = 256 4.0 d = 256
d = 128 d = 128
3.5 3.5
d = 64 d = 64
3.0 d = 32 3.0 d = 32
2.5 d = 16 2.5 d = 16
2.0 d=8 2.0 d=8
1.5 1.5
1.0 1.0
0.5 0.5
0.0 0.0
1 2 4 8 16 32 1 2 4 8 16 32
13
9 1.2
C2050 x1 C2050 x2 C2050 x3 C2050 x4 d = 64
8
9
1.0 d = 32
7 8 d = 16
6 0.8 7 d=8
109 edges / sec
normalized
neighbors and a third vertex queue to avoid another global Furthermore, our implementation performs an
synchronization after Step 4. asymptotically optimal amount of work. While quadratic-
work methods might be acceptable in certain very narrow
6.2 Evaluation regimes [21], [31], they suffer from high overhead and did not
Fig. 14 presents traversal throughput as we scale up the prove effective on even the lowest diameter graphs in our
number of GPUs. We experience net slowdown for datasets experimental corpus. Our linear-work method compares very
on the left having average search depth > 100. The cost of favorably to state-of-the-art multicore implementations across
global synchronization between BFS iterations is much higher our entire range of benchmarks, which spans five orders of
across multiple GPUs. magnitude in graph diameter.
We do yield notable speedups for the three rightmost Beyond graph search, our work distills several general
datasets. These graphs have small diameters and require little themes for implementing sparse and dynamic problems for
global synchronization. The large average out-degrees enable the GPU machine model:
plenty of opportunistic duplicate filtering during partitioning
• Prefix-sum can serve as an effective alternative to atomic
passes. This allows us to circumvent the PCI-e cap of
read-modify-write mechanisms for coordinating the
825x106 edges/sec per GPU. With four GPUs, we
placement of items within shared data structures by
demonstrate traversal rates of 7.4 and 8.3 billion edges/sec for
many parallel threads.
the uniform-random and RMAT datasets respectively.
As expected, this strong-scaling is not linear. For • In contrast to coarse-grained parallelism common on
example, we observe 1.5x, 2.1x, and 2.5x speedups when multicore processors, GPU kernels cannot afford to have
traversing rmat.2Mv.128Me using two, three, and four GPUs, individual threads streaming through unrelated sections
respectively. Adding more GPUs reduces the percentage of of data. Groups of GPU threads should cooperatively
duplicates per processor and increases overall PCI-e traffic. assist each other for data movement tasks.
Fig. 15 further illustrates the impact of opportunistic • Fusing heterogeneous tasks does not always produce the
duplicate culling for uniform random graphs up to 500M best results. Global redistribution and compaction of
edges and varying out out-degree ̅ . Increasing ̅ yields fine-grained tasks can significantly improve performance
significantly better performance. Other than a slight when the alternative would allow significant load
performance drop at n=8 million vertices when the bitmask imbalance or underutilization.
exceeds the L2 cache size, graph size has little impact upon • The relative I/O contribution from global task
traversal throughput. redistribution can be less costly than anticipated. The
To our knowledge, these are the fastest traversal rates data movement from reorganization may be insignificant
demonstrated by a single-node machine. The work by in comparison to the actual over-fetch traffic from
Agarwal et al. is representative of the state-of-the-art in CPU existing sparse memory accesses.
parallelizations, demonstrating up to 1.3 billion edges/sec for • It is useful to provide separate implementations for
both uniform-random and RMAT datasets using four 8-core
saturating versus fleeting workloads. Hybrid approaches
Intel Nehalem-based XEON CPUs [5]. However, we note
can leverage a shorter code-path for retiring
that the host memory on such systems can further underutilized phases as quickly as possible.
accommodate datasets having tens of billions of edges.
8. ACKNOWLEDGEMENTS
7. CONCLUSION
Duane Merrill was supported in part by a NVIDIA Graduate
This paper has demonstrated that GPUs are well-suited for
Fellowship. We would like to thank NVIDIA for supplying
sparse graph traversal and can achieve very high levels of
additional GPUs and Sungpack Hong of Stanford University
performance on a broad range of graphs. We have presented for providing us with the code for their BFS implementation.
a parallelization of BFS tailored to the GPU’s requirement for
large amounts of fine-grained, bulk-synchronous parallelism.
14
9. REFERENCES architectures - SPAA ’90, Island of Crete, Greece, 1990, pp.
200-209.
[1] “Parboil Benchmark suite.” [Online]. Available:
http://impact.crhc.illinois.edu/parboil.php. [Accessed: 11-Jul- [19] P. Harish and P. J. Narayanan, “Accelerating large graph
2011]. algorithms on the GPU using CUDA,” in Proceedings of the
14th international conference on High performance computing,
[2] S. Che et al., “Rodinia: A benchmark suite for heterogeneous Berlin, Heidelberg, 2007, pp. 197–208.
computing,” in 2009 IEEE International Symposium on
Workload Characterization (IISWC), Austin, TX, USA, 2009, [20] Y. (Steve) Deng, B. D. Wang, and S. Mu, “Taming irregular
pp. 44-54. EDA applications on GPUs,” in Proceedings of the 2009
International Conference on Computer-Aided Design, New
[3] “The Graph 500 List.” [Online]. Available: York, NY, USA, 2009, pp. 539–546.
http://www.graph500.org/. [Accessed: 11-Jul-2011].
[21] S. Hong, S. K. Kim, T. Oguntebi, and K. Olukotun,
[4] Y. Xia and V. K. Prasanna, “Topologically Adaptive Parallel “Accelerating CUDA graph algorithms at maximum warp,” in
Breadth-first Search on Multicore Processors,” in 21st Proceedings of the 16th ACM symposium on Principles and
International Conference on Parallel and Distributed practice of parallel programming, New York, NY, USA, 2011,
Computing and Systems (PDCS’09), 2009. pp. 267–276.
[5] V. Agarwal, F. Petrini, D. Pasetto, and D. A. Bader, “Scalable [22] N. Bell and M. Garland, “Implementing sparse matrix-vector
Graph Exploration on Multicore Processors,” in 2010 multiplication on throughput-oriented processors,” in
ACM/IEEE International Conference for High Performance Proceedings of the Conference on High Performance
Computing, Networking, Storage and Analysis, New Orleans, Computing Networking, Storage and Analysis, New York, NY,
LA, USA, 2010, pp. 1-11. USA, 2009, pp. 18:1–18:11.
[6] C. E. Leiserson and T. B. Schardl, “A work-efficient parallel [23] M. Garland, “Sparse matrix computations on manycore
breadth-first search algorithm (or how to cope with the GPU’s,” in Proceedings of the 45th annual Design Automation
nondeterminism of reducers),” in Proceedings of the 22nd ACM Conference, New York, NY, USA, 2008, pp. 2–6.
symposium on Parallelism in algorithms and architectures,
New York, NY, USA, 2010, pp. 303–314. [24] L. Luo, M. Wong, and W.-mei Hwu, “An effective GPU
implementation of breadth-first search,” in Proceedings of the
[7] D. A. Bader and K. Madduri, “Designing Multithreaded 47th Design Automation Conference, New York, NY, USA,
Algorithms for Breadth-First Search and st-connectivity on the 2010, pp. 52–55.
Cray MTA-2,” in 2006 International Conference on Parallel
Processing (ICPP’06), Columbus, OH, USA, pp. 523-530. [25] A. Yoo, E. Chow, K. Henderson, W. McLendon, B.
Hendrickson, and U. Catalyurek, “A Scalable Distributed
[8] D. A. Bader, G. Cong, and J. Feo, “On the Architectural Parallel Breadth-First Search Algorithm on BlueGene/L,” in
Requirements for Efficient Execution of Graph Algorithms,” in ACM/IEEE SC 2005 Conference (SC’05), Seattle, WA, USA,
2005 International Conference on Parallel Processing pp. 25-25.
(ICPP’05), Oslo, Norway, pp. 547-556.
[26] D. P. Scarpazza, O. Villa, and F. Petrini, “Efficient Breadth-
[9] W. D. Hillis and G. L. Steele, “Data parallel algorithms,” First Search on the Cell/BE Processor,” IEEE Transactions on
Communications of the ACM, vol. 29, no. 12, pp. 1170-1183, Parallel and Distributed Systems, vol. 19, no. 10, pp. 1381-
Dec. 1986. 1395, Oct. 2008.
[10] G. E. Blelloch, Prefix Sums and Their Applications. Synthesis [27] K. Madduri and D. A. Bader, “GTgraph: A suite of synthetic
of Parallel Algorithms, 1990. random graph generators.” [Online]. Available:
[11] D. Merrill and A. Grimshaw, Parallel Scan for Stream https://sdm.lbl.gov/~kamesh/software/GTgraph/. [Accessed: 11-
Architectures. Department of Computer Science, University of Jul-2011].
Virginia, 2009. [28] T. Davis and Y. Hu, “University of Florida Sparse Matrix
[12] J. D. Owens, M. Houston, D. Luebke, S. Green, J. E. Stone, and Collection.” [Online]. Available:
J. C. Phillips, “GPU Computing,” Proceedings of the IEEE, vol. http://www.cise.ufl.edu/research/sparse/matrices/. [Accessed:
96, no. 5, pp. 879-899, May. 2008. 11-Jul-2011].
[13] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, [29] “10th DIMACS Implementation Challenge.” [Online].
Introduction to Algorithms, Second. Cambridge, MA: MIT Available: http://www.cc.gatech.edu/dimacs10/index.shtml.
Press, 2001. [Accessed: 11-Jul-2011].
[14] C. J. Cheney, “A nonrecursive list compacting algorithm,” [30] D. Merrill and A. Grimshaw, “High Performance and Scalable
Commun. ACM, vol. 13, pp. 677–678, Nov. 1970. Radix Sorting: A case study of implementing dynamic
parallelism for GPU computing,” Parallel Processing Letters,
[15] J. Gonzalez, Y. Low, and C. Guestrin, “Residual Splash for
vol. 21, no. 2, pp. 245-272, 2011.
Optimally Parallelizing Belief Propagation.,” Journal of
Machine Learning Research - Proceedings Track, vol. 5, pp. [31] S. Hong, T. Oguntebi, and K. Olukotun, “Efficient Parallel
177-184, 2009. Graph Exploration for Multi-Core CPU and GPU,” presented at
the Parallel Architectures and Compilation Techniques, New
[16] M. Newman and M. Girvan, “Finding and evaluating
York, NY, USA, 2011, p. to appear.
community structure in networks,” Physical Review E, vol. 69,
no. 2, Feb. 2004.
[17] M. Hussein, A. Varshney, and L. Davis, “On Implementing
Graph Cuts on CUDA,” in First Workshop on General Purpose
Processing on Graphics Processing Units, Boston, MA, 2007.
[18] J. Ullman and M. Yannakakis, “High-probability parallel
transitive closure algorithms,” in Proceedings of the second
annual ACM symposium on Parallel algorithms and
15