Reducing Logging Overhead for Deterministic Execution

نویسندگان

  • Madan Das
  • Gabriel Southern
  • Jose Renau
چکیده

Deterministic execution of parallel applications can be enforced by logging speculative memory accesses and restoring saved state in the event of a conflict. However, logging all accesses has a prohibitive overhead. We propose three techniques to reduce logging in an always-on transactional memory system. The first, Threaded Section Analysis, statically determines when only a single thread is running, so instrumentation is unnecessary. The second, Loop Invariant Log Motion, reduces logging requirements for loops by moving logging operations outside loops. The third, Multi-Threaded Read Only Memory, reduces instrumentation significantly using simple programmer inserted directives. When combined, these techniques reduced logging requirements by an average of 63% in the benchmarks we evaluted.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

USENIX Association Proceedings of the 5 th Symposium on Operating Systems

Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine. This allows ReVirt to replay the sy...

متن کامل

Why Optimistic Message Logging Has Not Been UsedIn

Much of the literature on message logging and checkpointing in the past decade has been based on a so-called optimistic approach 1] that places more emphasis on failure-free overhead than recovery ee-ciency. Our experience has shown that most telecommunications systems use a pessimistic approach because the main purpose of using message logging and checkpointing is to achieve fast and localized...

متن کامل

Reduced Overhead Logging for Rollback Recovery in Distributed Shared Memory

Rollback techniques that use message logging and deterministic replay can be used in parallel systems to recover a failed node without involving other nodes. Distributed shared memory (DSM) systems cannot directly apply message-passing logging techniques because they use inherently nondeterministic asynchronous communication. This paper presents new logging schemes that reduce the typically hig...

متن کامل

Algorithm for Reducing Overhead of Message Purging in Large-Scale Sender-Based Logging

When attempting to apply sender-based message logging with checkpointing into large-scale and geographically distributed systems, two important things should be reconsidered: reducing the number of messages passing on core networks during its fully message logging and recovery procedures and purging effectively logged messages from their senders' volatile memories. This paper presents a novel m...

متن کامل

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote veri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013