发明名称 Optimization for safe elimination of weak atomicity overhead
摘要 A method and apparatus for optimizing weak atomicity overhead is herein described. A state table is maintained either during static or dynamic compilation of code to track data non-transactionally accessed. Within execution of a transaction, such as at transactional memory accesses or within a commit function, it is determined if data associated with memory access within the transaction is to be conflictingly accessed outside the transaction from the state table. If the data is not accessed outside the transaction, then the transaction potentially commits without weak atomicity safety mechanisms, such as privatization. Furthermore, even if data is accessed outside the transaction, optimized safety mechanisms may be performed to ensure isolation between the potentially conflicting accesses, while eliding the mechanisms for data not accessed outside the transaction.
申请公布号 US9274855(B2) 申请公布日期 2016.03.01
申请号 US200812344147 申请日期 2008.12.24
申请人 Intel Corporation 发明人 Adl-Tabatabai Ali-Reza;Shpeisman Tatiana;Menon Vijay
分类号 G06F9/44;G06F13/00;G06F9/52;G06F9/46;G06F12/08;G06F12/10 主分类号 G06F9/44
代理机构 Grossman, Tucker, Perreault & Pfleger, PLLC 代理人 Grossman, Tucker, Perreault & Pfleger, PLLC
主权项 1. A non-transitory machine readable medium including program code which, when executed by a machine, causes the machine to: determine, before execution of a transactional access to a particular data element, determine whether a potential conflict exists between the transitional access of the particular data element and a non-transitional access of the particular data element; to be accessed within a transaction is to be potentially conflictingly accessed outside the transaction based on an entry of a state table for the data, wherein the entry of the state of the table is to hold a reference to the data for a non-transactional access state and includes a data element reference field and a state field associated with the data element; and if a potential conflict exists, perform a safety mechanism for the transactional access, wherein the safety mechanism is selected from a group consisting of a privatization safety mechanism, a publication safety mechanism, and a granular safety mechanism; and if a potential conflict does not exists, elide the safety mechanism for the transactional access in response to determining the particular data element is to be potentially conflictingly accessed outside the transaction.
地址 Santa Clara CA US