Reducing Logging Overhead for Deterministic Execution
نویسندگان
چکیده
Deterministic execution of parallel applications can be enforced by logging speculative memory accesses and restoring saved state in the event of a conflict. However, logging all accesses has a prohibitive overhead. We propose three techniques to reduce logging in an always-on transactional memory system. The first, Threaded Section Analysis, statically determines when only a single thread is running, so instrumentation is unnecessary. The second, Loop Invariant Log Motion, reduces logging requirements for loops by moving logging operations outside loops. The third, Multi-Threaded Read Only Memory, reduces instrumentation significantly using simple programmer inserted directives. When combined, these techniques reduced logging requirements by an average of 63% in the benchmarks we evaluted.
منابع مشابه
USENIX Association Proceedings of the 5 th Symposium on Operating Systems
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine. This allows ReVirt to replay the sy...
متن کاملWhy Optimistic Message Logging Has Not Been UsedIn
Much of the literature on message logging and checkpointing in the past decade has been based on a so-called optimistic approach 1] that places more emphasis on failure-free overhead than recovery ee-ciency. Our experience has shown that most telecommunications systems use a pessimistic approach because the main purpose of using message logging and checkpointing is to achieve fast and localized...
متن کاملReduced Overhead Logging for Rollback Recovery in Distributed Shared Memory
Rollback techniques that use message logging and deterministic replay can be used in parallel systems to recover a failed node without involving other nodes. Distributed shared memory (DSM) systems cannot directly apply message-passing logging techniques because they use inherently nondeterministic asynchronous communication. This paper presents new logging schemes that reduce the typically hig...
متن کاملAlgorithm for Reducing Overhead of Message Purging in Large-Scale Sender-Based Logging
When attempting to apply sender-based message logging with checkpointing into large-scale and geographically distributed systems, two important things should be reconsidered: reducing the number of messages passing on core networks during its fully message logging and recovery procedures and purging effectively logged messages from their senders' volatile memories. This paper presents a novel m...
متن کاملEmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote veri...
متن کامل