Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Syst 2019
DOI: 10.1145/3297858.3304046
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grain Checkpointing with In-Cache-Line Logging

Abstract: Non-Volatile Memory offers the possibility of implementing high-performance, durable data structures. However, achieving performance comparable to well-designed data structures in non-persistent (transient) memory is difficult, primarily because of the cost of ensuring the order in which memory writes reach NVM. Often, this requires flushing data to NVM and waiting a full memory round-trip time.In this paper, we introduce two new techniques: Fine-Grained Checkpointing, which ensures a consistent, quickly recov… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Persistent buffering reduces the excessive flush and fence overhead by allowing flushes between independent cache lines to be reordered. Persistent coalescing facilitates batching multiple cache line flushes to the same cache line [12,13]. Recipe-based conversion inserts a flush and fence operation after each store.…”
Section: Discussionmentioning
confidence: 99%
“…Persistent buffering reduces the excessive flush and fence overhead by allowing flushes between independent cache lines to be reordered. Persistent coalescing facilitates batching multiple cache line flushes to the same cache line [12,13]. Recipe-based conversion inserts a flush and fence operation after each store.…”
Section: Discussionmentioning
confidence: 99%
“…In future work, we try to integrate other state of the art concurrency control protocols with modern recovery protocols including some write ahead logging techniques [17,22], write behind logging [1], and checkpointing [3]. We also try to use novel NVRAM emulators to improve the quality of the emulation of NVRAM accesses.…”
Section: Discussionmentioning
confidence: 99%
“…Once the system crashes, all or none of the data modifications in the interval become visible. The existing studies determine the interval length based on either a user-defined value [10,40] or application semantics [7]. 1 We distinguish cache line and cache block in the paper.…”
Section: Optimization Of Cache Line Flushingmentioning
confidence: 99%
“…They propose to decouple tree leaves from internal nodes and only maintain the persistency of leaf nodes. In-cacheline log [10] supports finegrained checkpointing that writes the cache hierarchy to PM at the beginning of each epoch. They place undo log and its logged data structure in the same cache line to reduce CLF.…”
Section: Related Workmentioning
confidence: 99%