LogTM: Log-based transactional memory

被引:167
|
作者
Moore, Kevin E. [1 ]
Bobba, Jayararn [1 ]
Moravan, Michelle J. [1 ]
Hill, Mark D. [1 ]
Wood, David A. [1 ]
机构
[1] Univ Wisconsin, Dept Comp Sci, Madison, WI 53706 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/HPCA.2006.1598134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing data version management for the simultaneous storage of both new (visible if the transaction commits) and old (retained if the transaction aborts) values. Most (hardware) TM systems leave old values "in place" (the target memory address) and buffer new values elsewhere until commit. This makes aborts fast, but penalizes (the much more frequent) commits. In this paper we present a new implementation of transactional memory, Log-based Transactional Memory (LogTM), that makes commits fast by storing old values to a per-thread log in cacheable virtual memory and storing new values in place. LogTM makes two additional contributions. First, LogTM extends a MOESI directory protocol to enable both fast conflict detection on evicted blocks and fast commit (using lazy cleanup). Second, LogTM handles aborts in (library) software with little performance penalty. Evaluations running micro- and SPLASH-2 benchmarks on a 32-way multiprocessor support our decision to optimize for commit by showing that only 1-2% of transactions abort.
引用
收藏
页码:258 / +
页数:3
相关论文
共 50 条
  • [21] On the effectiveness of log representation for log-based anomaly detection
    Wu, Xingfang
    Li, Heng
    Khomh, Foutse
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (06)
  • [22] On the effectiveness of log representation for log-based anomaly detection
    Xingfang Wu
    Heng Li
    Foutse Khomh
    Empirical Software Engineering, 2023, 28
  • [23] Log-Based Rollback Recovery without Checkpoints of Shared Memory in Software DSM
    Soyeon Park
    Seung Ryoul Maeng
    The Journal of Supercomputing, 2006, 35 : 141 - 154
  • [24] High Throughput Log-based Replication for Many Small In-memory Objects
    Beineke, Kevin
    Nothaas, Stefan
    Schoettner, Michael
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 535 - 544
  • [25] Log-Based CRDT for Edge Applications
    Saquib, Nazmus
    Krintz, Chandra
    Wolski, Rich
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 126 - 137
  • [26] A Search Log-Based Approach to Evaluation
    Zhang, Junte
    Kamps, Jaap
    RESEARCH AND ADVANCED TECHNOLOGY FOR DIGITAL LIBRARIES, 2010, 6273 : 248 - 260
  • [27] High Throughput Log-based Replication for Many Small In-memory Objects
    Beineke, Kevin
    Nothaas, Stefan
    Schoettner, Michael
    2016 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2016, : 160 - 161
  • [28] New log-based approach to independent recovery in distributed shared memory systems
    Lin, Jenn-Wei
    Kuo, Sy-Yen
    2000, IIS, Taipei, Taiwan (16)
  • [29] Log-Based Simplification of Process Models
    De San Pedro, Javier
    Carmona, Josep
    Cortadella, Jordi
    BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 457 - 474
  • [30] Log-based Intrusion Detection for MANET
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 697 - 702