Efficient Logging in Non-Volatile Memory by Exploiting Coherency Protocols

09/08/2017
by   Nachshon Cohen, et al.
0

Non-volatile memory (NVM) technologies such as PCM, ReRAM and STT-RAM allow processors to directly write values to persistent storage at speeds that are significantly faster than previous durable media such as hard drives or SSDs. Many applications of NVM are constructed on a logging subsystem, which enables operations to appear to execute atomically and facilitates recovery from failures. Writes to NVM, however, pass through a processor's memory system, which can delay and reorder them and can impair the correctness and cost of logging algorithms. Reordering arises because of out-of-order execution in a CPU and the inter-processor cache coherence protocol. By carefully considering the properties of these reorderings, this paper develops a logging protocol that requires only one round trip to non-volatile memory while avoiding expensive computations. We show how to extend the logging protocol to building a persistent set (hash map) that also requires only a single round trip to non-volatile memory for insertion, updating, or deletion.

READ FULL TEXT
research
05/22/2018

Hardware Transactional Persistent Memory

Emerging Persistent Memory technologies (also PM, Non-Volatile DIMMs, St...
research
05/15/2018

The Parallel Persistent Memory Model

We consider a parallel computational model that consists of P processors...
research
02/02/2019

Fine-Grain Checkpointing with In-Cache-Line Logging

Non-Volatile Memory offers the possibility of implementing high-performa...
research
06/10/2017

LazyPIM: Efficient Support for Cache Coherence in Processing-in-Memory Architectures

Processing-in-memory (PIM) architectures have seen an increase in popula...
research
01/03/2019

A Secure and Persistent Memory System for Non-volatile Memory

In the non-volatile memory, ensuring the security and correctness of per...
research
11/20/2017

Schlegel Diagram and Optimizable Immediate Snapshot Protocol

In the topological study of distributed systems, the immediate snapshot ...
research
01/31/2018

Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in ...

Please sign up or login with your details

Forgot password? Click here to reset