2008
DOI: 10.1145/1394608.1382132
|View full text |Cite
|
Sign up to set email alerts
|

Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory

Abstract: We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be made strongly atomic by using memory protection on transactionally-held state, then showing how such a strongly-atomic STM can be used with a bounded hardware TM system to build a hybrid TM system in which zero-overhead hardware transactions may safely run concurrently with potentially-conflicting software transactions. We experimentally… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(32 citation statements)
references
References 33 publications
0
32
0
Order By: Relevance
“…Pacman is also related to hardware-based mechanisms for finegrain memory protection, such as UFO [1] and iWatcher [33]. In UFO, each memory line has some bits that specify protection information.…”
Section: Other Related Workmentioning
confidence: 99%
“…Pacman is also related to hardware-based mechanisms for finegrain memory protection, such as UFO [1] and iWatcher [33]. In UFO, each memory line has some bits that specify protection information.…”
Section: Other Related Workmentioning
confidence: 99%
“…However, strong atomicity is more difficult to implement in software transactional memory systems. Most software transactional memory proposals so far have only supported weak atomicity, but recent work, e.g., [13,91,6,2], show how some of these short-comings can be addressed.…”
Section: Strong and Weak Atomicitymentioning
confidence: 99%
“…Further, Shriraman et al [92] suggest four hardware primitives to support high-performance and flexible software transactional memory implementations. Finally, researchers have also proposed to use hardware memory protection mechanisms to implement strongly atomic software transactional memory systems, e.g., [6,2].…”
Section: Hardware Supported Software Transactional Memorymentioning
confidence: 99%
See 1 more Smart Citation
“…TM has been implemented in hardware (HTM) [2][3][4][5][6][7], software (STM) [8][9][10][11][12][13], or a hybrid of the two (HyTM) [14][15][16][17]. The advantage of HTMs is a low overhead in performing transactional conflict detection, but at the cost of limiting the total accesses of each transaction to the size of the L1 or L2 cache.…”
mentioning
confidence: 99%