2017
DOI: 10.1145/3093337.3037730
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Persistent Memory Use with WHISPER

Abstract: Emerging non-volatile memory (NVM) technologies promise durability with read and write latencies comparable to volatile memory (DRAM). We define Persistent Memory (PM) as NVM accessed with byte addressability at low latency via normal memory instructions. Persistent-memory applications ensure the consistency of persistent data by inserting ordering points between writes to PM allowing the construction of higher-level transaction mechanisms. An epoch is a set of writes to PM between ordering points. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…However, epoch barriers incur non-trivial overhead to the cache hierarchy. Furthermore, system performance can be sub-optimal with small epoch sizes, which is observed in many persistent memory workloads [11]. Our design uses lightweight hardware changes on existing processor designs without expensive non-volatile on-chip transaction buffering components.…”
Section: B Whisper Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, epoch barriers incur non-trivial overhead to the cache hierarchy. Furthermore, system performance can be sub-optimal with small epoch sizes, which is observed in many persistent memory workloads [11]. Our design uses lightweight hardware changes on existing processor designs without expensive non-volatile on-chip transaction buffering components.…”
Section: B Whisper Resultsmentioning
confidence: 99%
“…We evaluate both singlethreaded and multithreaded versions of each benchmark. In addition, we evaluate the set of real workload benchmarks from the WHISPER persistent memory benchmark suite [11]. The benchmark suite incorporates various workloads, such as key-value stores, in-memory databases, and persistent data caching, which are likely to benefit from future persistent memory techniques.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Software Cache [36] implements a resizable cache to combine writebacks and reduce CLF. Hardware modifications in the cache hierarchy and new instructions [39,49] are also proposed to reduce the latency of CLF. Also, some cache designs use (relaxed) non-volatile memories [44,50,51], which naturally eliminates CLF.…”
Section: Related Workmentioning
confidence: 99%
“…Software logging uses flush instructions such as clwb to write the logs to PM before any in-place data updates become persistent [5,6,13,15,17,22,25,30,42,43]. Kamino-TX [27] instead maintains a replica of the dataset to serve as an undo log, thus removing logging from the critical path.…”
Section: Atomic Durabilitymentioning
confidence: 99%