Publication | Closed Access
Featherlight on-the-fly false-sharing detection
20
Citations
36
References
2018
Year
Unknown Venue
EngineeringInformation SecurityComputer ArchitectureInformation ForensicsDetection TechniqueSide-channel AttackSoftware AnalysisParallel ToolHardware SecurityShared MemoryOffline Cache SimulatorParallel ComputingFalse SharingMemory ManagementMemory AccessesProfiling ToolComputer EngineeringData PrivacyComputer SciencePerformance Analysis ToolData SecurityCryptographyProgram AnalysisSoftware TestingInformation HidingParallel ProgrammingSystem Software
Shared-memory parallel programs routinely suffer from false sharing---a performance degradation caused by different threads accessing different variables that reside on the same CPU cacheline and at least one variable is modified. State-of-the-art tools detect false sharing via a heavyweight process of logging memory accesses and feeding the ensuing access traces to an offline cache simulator. We have developed Feather, a lightweight, on-the-fly false-sharing detection tool. Feather achieves low overhead by exploiting two hardware features ubiquitous in commodity CPUs: the performance monitoring units (PMU) and debug registers. Additionally, Feather is a first-of-its-kind tool to detect false sharing in multi-process applications that use shared memory. Feather allowed us to scale false-sharing detection to myriad codes. Feather detected several false-sharing cases in important multi-core and multi-process codes including previous PPoPP artifacts. Eliminating false sharing resulted in dramatic (up to 16x) speedups.
| Year | Citations | |
|---|---|---|
Page 1
Page 1