The Community for Technology Leaders
20th Annual International Conference on High Performance Computing (2011)
Bengaluru, India
Dec. 18, 2011 to Dec. 21, 2011
ISBN: 978-1-4577-1951-6
pp: 1-10
Salman Khan , School of Computer Science, University of Manchester
Nikolas Ioannou , School of Informatics, University of Edinburgh
Polychronis Xekalakis , Intel Labs Barcelona - UPC
Marcelo Cintra , School of Informatics, University of Edinburgh
With the advent of Chip Multiprocessors (CMPs), improving performance relies on the programmers/compilers to expose thread level parallelism to the underlying hardware. However, this is a difficult and error-prone process for the programmers, while state of the art compiler techniques are unable to provide significant benefits for many classes of applications. An alternative is offered by systems that support Thread Level Speculation (TLS), which relieve the programmer and compiler from checking for thread dependences and instead use the hardware to enforce them. Unfortunately, TLS suffers from power inefficency because data misspeculations cause threads to roll back to the beginning of the speculative task. For this reason intermediate check-pointing of TLS threads has been proposed. When a violation does occur, we now have to roll back to a checkpoint before the violating instruction and not to the start of the task. However, previous work omits study of the microarchitectural details and implementation issues that are essential for effective checkpointing. In this paper we study checkpointing on a state-of-the art TLS system. We systematically study the costs associated with checkpointing and analyze the tradeoffs. We also propose changes to the TLS mechanism to allow effective checkpointing. Further, we establish the need for accurately identifying points in execution that are appropriate for checkpointing and analyze various techniques for doing so in terms of both effectiveness and viability. We propose program counter based and hybrid predictors and show that they outperform previous proposals. Placing checkpoints based on dependence predictors results in power improvements while maintaining the performance advantage of TLS. The checkpointing system proposed achieves an energy saving of up to 14%, with an average of 7% over normal TLS execution.

M. Cintra, P. Xekalakis, N. Ioannou and S. Khan, "Increasing the energy efficiency of TLS systems using intermediate checkpointing," 2011 18th International Conference on High Performance Computing (HiPC)(HIPC), Bangalore, 2011, pp. 1-10.
279 ms
(Ver 3.3 (11022016))