Leveraging irrevocability to deal with signature saturation in hardware transactional memory

被引:0
作者
Ricardo Quislant
Eladio Gutierrez
Emilio L. Zapata
Oscar Plata
机构
[1] University of Malaga,Department of Computer Architecture
来源
The Journal of Supercomputing | 2017年 / 73卷
关键词
Hardware transactional memory; Signatures; Bloom filters; Irrevocability;
D O I
暂无
中图分类号
学科分类号
摘要
In hardware transactional memory, signatures have been proposed to keep track of memory locations accessed in a transaction to help conflict detection. Generally, signatures are implemented as Bloom filters that suffer from aliasing, that is, they can give rise to false conflicts. Such conflicts are more likely as signature fills (saturation), and they can lead a parallel application to perform worse than its serial version. Irrevocability is analyzed to address the signature saturation problem. When a transaction reaches a saturation threshold, the transaction enters an irrevocable state that prevents it from being aborted. Hence, such a transaction keeps running while the others are either stalled or allowed to run concurrently. We propose an analytical model that shows this is a good solution to overcome a high contention scenario. In addition, experimental evaluation shows the benefits in performance and power consumption of the proposed irrevocability mechanisms. Different saturation metrics are considered and a fixed threshold is found that yields maximum performance for the benchmarks evaluated.
引用
收藏
页码:2525 / 2557
页数:32
相关论文
共 40 条
[1]  
Bloom B(1970)Space/time trade-offs in hash coding with allowable errors Commun ACM 13 422-426
[2]  
Didona D(2015)Identifying the optimal level of parallelism in transactional memory applications Computing 97 939-959
[3]  
Felber P(2002)Simics: a full system simulation platform IEEE Comput 35 50-58
[4]  
Harmanci D(2005)Multifacet’s general execution-driven multiprocessor simulator GEMS toolset ACM SIGARCH Comput Archit News 33 92-99
[5]  
Romano P(1983)A second look at bloom filters Commun ACM 26 570-571
[6]  
Schenker J(2013)Hardware signature designs to deal with asymmetry in transactional data sets IEEE Trans Parallel Distrib Syst 24 506-519
[7]  
Magnusson P(2013)LS-Sig: locality-sensitive signatures for transactional memory IEEE Trans Comput 62 322-335
[8]  
Christensson M(2002)Specifying and verifying a broadcast and a multicast snooping cache coherence protocol IEEE Trans Parallel Distrib Syst 13 556-578
[9]  
Eskilson J(undefined)undefined undefined undefined undefined-undefined
[10]  
Forsgren D(undefined)undefined undefined undefined undefined-undefined