“…26,27 These works use logging hardware to generate log entries and coordinate data write-backs in the background, overlapping persistence with execution. These log procedures can be managed by the load/store unit, 25 the coherence controller, 42 the cache controller, 15,19,21,23,27,43 or the memory controller. 1,9,44 Despite being hardware, most of them 2,3,9,[14][15][16]21,23,[25][26][27]29 are non-software-transparent, depending on programming models PTM-based to indicate atomic transactions, being hardware restricted to handle logs and checkpoint metadata.…”