Forgoing Hypervisor Fidelity for Measuring Virtual Machine Performance

Total Page:16

File Type:pdf, Size:1020Kb

Forgoing Hypervisor Fidelity for Measuring Virtual Machine Performance Forgoing hypervisor fidelity for measuring virtual machine performance Oliver R. A. Chick Gonville and Caius College This dissertation is submitted for the degree of Doctor of Philosophy FORGOING HYPERVISOR FIDELITY FOR MEASURING VIRTUAL MACHINE PERFORMANCE OLIVER R. A. CHICK For the last ten years there has been rapid growth in cloud computing, which has largely been powered by virtual machines. Understanding the performance of a virtual machine is hard: There is limited access to hardware counters, tech- niques for probing have higher probe effect than on physical machines, and per- formance is tightly coupled with the hypervisor’s scheduling decisions. Yet, the need for measuring virtual machine performance is high as virtual machines are slower than physical machines and have highly-variable performance. Current performance-measurement techniques demand hypervisor fidelity: They execute the same instructions on a virtual machine and physical machine. Whilst fidelity has historically been considered an advantage as it allows the hy- pervisor to be transparent to virtual machines, the use case of hypervisors has changed from multiplexing access to a single mainframe across an institution to forming a building block of the cloud. In this dissertation I reconsider the argument for hypervisor fidelity and show the advantages of software that co-operates with the hypervisor. I focus on pro- ducing software that explains the performance of virtual machines by forgoing hypervisor fidelity. To this end, I develop three methods of exposing the hy- pervisor interface to performance measurement tools: (i) Kamprobes is a tech- nique for probing virtual machines that uses unprivileged instructions rather than interrupt-based techniques. I show that this brings the time requires to fire a probe in a virtual machine to within twelve cycles of native performance. (ii) Shadow Kernels is a technique that uses the hypervisor’s memory manage- ment unit so that an operating system kernel can have per-process specialisation, which can be used to selectively fire probes, with low overheads (835 354 cycles ± per page) and minimal operating system changes (340 LoC). (iii) Soroban uses machine learning on the hypervisor’s scheduling activity to report the virtualisa- tion overhead in servicing requests and can distinguish between latency caused by high virtual machine load and latency caused by the hypervisor. Understanding the performance of a machine is particularly difficult when executing in the cloud due to the combination of the hypervisor and other virtual machines. This dissertation shows that it is worthwhile forgoing hypervisor fidelity to improve the visibility of virtual machine performance. DECLARATION This dissertation is my own work and contains nothing which is the outcome of work done in collaboration with others, except where specified in the text. This dissertation is not substantially the same as any that I have submitted for a degree or diploma or other qualification at any other university. This dissertation does not exceed the prescribed limit of 60 000 words. Oliver R. A. Chick November 30, 2015 ACKNOWLEDGEMENTS This work was principally supported by the Engineering and Physical Sciences Research Council [grant number EP/K503009/1] and by internal funds from the University of Cambridge Computer Laboratory. I should like to pay personal thanks to Dr Andrew Rice and Dr Ripduman So- han for their countless hours of supervision and technical expertise, without which I would have been unable to conduct my research. Further thanks to Dr Ramsey M. Faragher for encouragement and help in wide-ranging areas. Special thanks to Lucian Carata and James Snee for their efforts in cod- ing reviews and being prudent collaborators, as well as Dr Jeunese A. Payne, Daniel R. Thomas, and Diana A. Vasile for proof reading this dissertation. My gratitude goes to Prof. Andy Hopper for his support for the Resourceful project. All members of the DTG, especially Daniel R. Thomas and other inhabitants of SN14 have provided me with both wonderful friendships and technical assis- tance, which has been invaluable throughout my Ph.D. Final thanks naturally go to my parents for their perpetual support. CONTENTS 1 Introduction 15 1.1 Defining ‘forgoing hypervisor fidelity’ . 16 1.2 Limitations of hypervisor fidelity in performance measurement tools 17 1.3 The case for forgoing hypervisor fidelity in performance measure- ment tools . 18 1.4 Kamprobes . 20 1.5 Shadow Kernels . 21 1.6 Soroban . 22 1.7 Scope of thesis . 23 1.7.1 Xen hypervisor . 23 1.7.2 GNU/Linux operating system . 23 1.7.3 Paravirtualised guests . 24 1.7.4 x86-64 . 24 1.8 Overview . 25 2 Background 27 2.1 Historical justification for hypervisor fidelity . 28 2.2 Contemporary uses for virtualisation . 29 2.3 Virtualisation performance problems . 33 2.3.1 Privileged instructions . 33 2.3.2 I/O . 33 2.3.3 Networking . 34 2.3.4 Increased contention . 34 2.3.5 Locking . 34 2.3.6 Unpredictable timing . 35 2.3.7 Summary . 35 2.4 The changing state of hypervisor fidelity . 35 2.4.1 Historical changes to hypervisor fidelity . 35 2.4.2 Recent changes to hypervisor fidelity . 36 2.4.3 Current state of hypervisor fidelity . 38 2.4.3.1 Installing guest additions . 38 2.4.3.2 Moving services into dedicated domains . 38 2.4.3.3 Lack of transparency of HVM containers . 39 2.4.3.4 Hypervisor/operating system semantic gap . 39 2.4.4 Summary . 39 2.5 Rethinking operating system design for hypervisors . 40 2.6 Virtual machine performance measurement . 41 2.6.1 Kernel probing . 41 2.6.2 Kernel specialisation . 42 2.6.3 Performance interference . 43 2.6.3.1 Measurement . 43 2.6.3.2 Modelling . 44 2.6.3.3 Summary . 45 2.7 Application to a broader context . 46 2.7.1 Containers . 46 2.7.2 Microkernels . 47 2.8 Summary . 47 3 Kamprobes: Probing designed for virtualised operating systems 49 3.1 Introduction . 50 3.2 Current probing techniques . 51 3.2.1 Linux: Kprobes . 51 3.2.2 Windows: Detours . 52 3.2.3 FreeBSD, NetBSD, OS X: DTrace function boundary tracers 53 3.2.4 Summary . 53 3.3 Experimental evidence against virtualising current probing tech- niques . 54 3.3.1 Cost of virtualising Kprobes . 54 3.3.2 Cost of virtualised interrupts . 57 3.3.3 Other causes of slower performance when virtualised . 58 3.4 Kamprobes design . 59 3.5 Implementation . 60 3.5.1 Kamprobes API . 60 3.5.2 Kernel module . 61 3.5.3 Changes to the x86-64 instruction stream . 61 3.5.3.1 Inserting Kamprobes into an instruction stream . 61 3.5.3.2 Kamprobe wrappers . 62 3.6 Evaluation . 69 3.6.1 Inserting probes . 69 3.6.2 Firing probes . 71 3.6.3 Kamprobes executing on bare metal . 74 3.7 Evaluation summary . 75 3.8 Discussion . 76 3.8.1 Backtraces . 76 3.8.2 FTrace compatibility . 76 3.8.3 Instruction limitations . 76 3.8.4 Applicability to other instruction sets and ABIs . 76 3.9 Conclusion . 77 4 Shadow kernels: A general mechanism for kernel specialisation in exist- ing operating systems 79 4.1 Introduction . 80 4.2 Motivation . 82 4.2.1 Shadow Kernels for probing . 82 4.2.2 Per-process kernel profile-guided optimisation . 84 4.2.3 Kernel optimisation and fast-paths . 84 4.2.4 Kernel updates . 85 4.3 Design and implementation . 86 4.3.1 User space API . 86 4.3.2 Linux kernel module . 87 4.3.2.1 Module insertion . 88 4.3.2.2 Initialisation of a shadow kernel . 88 4.3.2.3 Adding pages to the shadow kernel . 89 4.3.2.4 Switching shadow kernel . 89 4.3.2.5 Interaction with other kernel modules . 90 4.4 Evaluation . 91 4.4.1 Creating a shadow kernel . 91 4.4.2 Switching shadow kernel . 93 4.4.2.1 Switching time . 93 4.4.2.2 Effects on caching . 95 4.4.3 Kamprobes and Shadow Kernels . 97 4.4.4 Application to web workload . 102 4.4.5 Evaluation summary . 103 4.5 Alternative approaches . 103 4.6 Discussion . 105 4.6.1 Modifications required to kernel debuggers . 105 4.6.2 Software guard extensions . 105 4.7 Conclusion . 106 5 Soroban: Attributing latency in virtualised environments 107 5.1 Introduction . 108 5.2 Motivation . 109 5.2.1 Performance monitoring . 110 5.2.2 Virtualisation-aware timeouts . 110 5.2.3 Dynamic allocation . 111 5.2.4 QoS-based, fine-grained charging . 111 5.2.5 Diagnosing performance anomalies . 112 5.3 Sources of virtualisation overhead . 112 5.4 Effect of virtualisation overhead on end-to-end latency . 116 5.5 Attributing latency . 118 5.5.1 Justification of Gaussian processes . 121 5.5.2 Alternative approaches . 122 5.6 Choice of feature vector elements . 123 5.7 Implementation . 126 5.7.1 Xen modifications . 126 5.7.1.1 Exposing scheduler data . 126 5.7.1.2 Sharing scheduler data between Xen and its vir- tual machines . 127 5.7.2 Linux kernel module . 127 5.7.3 Application modifications . 128 5.7.3.1 Soroban API . ..
Recommended publications
  • Hardware Configuration with Dynamically-Queried Formal Models
    Master’s Thesis Nr. 180 Systems Group, Department of Computer Science, ETH Zurich Hardware Configuration With Dynamically-Queried Formal Models by Daniel Schwyn Supervised by Reto Acherman Dr. David Cock Prof. Dr. Timothy Roscoe April 2017 – October 2017 Abstract Hardware is getting increasingly complex and heterogeneous. With different compo- nents having different views of the system, the traditional assumption of unique phys- ical addresses has become an illusion. To adapt to such hardware, an operating system (OS) needs to understand the complex address translation chains and be able to handle the presence of multiple address spaces. This thesis takes a recently proposed model that formally captures these aspects and applies it to hardware configuration in the Barrelfish OS. To this end, I present Sockeye, a domain specific language that uses the model to de- scribe hardware. I then show, that code relying on knowledge about the address spaces in a system can be statically generated from these specifications. Furthermore, the model is successfully applied to device management, showing that it can also be used to configure hardware at runtime. The implementation presented here does not rely on any platform specific code and it reduced the amount of such code in Barrelfish’s device manager by over 30%. Applying the model to further hardware configuration tasks is expected to have similar effects. i Acknowledgements First of all, I want to thank my advisers Timothy Roscoe, David Cock and Reto Acher- mann for their guidance and support. Their feedback and critical questions were a valuable contribution to this thesis. I’d also like to thank the rest of the Barrelfish team and other members of the Systems Group at ETH for the interesting discussions during meetings and coffee breaks.
    [Show full text]
  • Message Passing for Programming Languages and Operating Systems
    Master’s Thesis Nr. 141 Systems Group, Department of Computer Science, ETH Zurich Message Passing for Programming Languages and Operating Systems by Martynas Pumputis Supervised by Prof. Dr. Timothy Roscoe, Dr. Antonios Kornilios Kourtis, Dr. David Cock October 7, 2015 Abstract Message passing as a mean of communication has been gaining popu- larity within domains of concurrent programming languages and oper- ating systems. In this thesis, we discuss how message passing languages can be ap- plied in the context of operating systems which are heavily based on this form of communication. In particular, we port the Go program- ming language to the Barrelfish OS and integrate the Go communi- cation channels with the messaging infrastructure of Barrelfish. We show that the outcome of the porting and the integration allows us to implement OS services that can take advantage of the easy-to-use concurrency model of Go. Our evaluation based on LevelDB benchmarks shows comparable per- formance to the Linux port. Meanwhile, the overhead of the messag- ing integration causes the poor performance when compared to the native messaging of Barrelfish, but exposes an easier to use interface, as shown by the example code. i Acknowledgments First of all, I would like to thank Timothy Roscoe, Antonios Kornilios Kourtis and David Cock for giving the opportunity to work on the Barrelfish OS project, their supervision, inspirational thoughts and critique. Next, I would like to thank the Barrelfish team for the discussions and the help. In addition, I would like to thank Sebastian Wicki for the conversations we had during the entire period of my Master’s studies.
    [Show full text]
  • The Barrelfish Multi- Kernel: an Interview with Timothy Roscoe
    INCREASING CPU PERFORMANCE WITH faster clock speeds and ever more complex RIK FARROW hardware for pipelining and memory ac- cess has hit the brick walls of power and the Barrelfish multi- bandwidth. Multicore CPUs provide the way forward but also present obstacles to using kernel: an interview existing operating systems design as they with Timothy Roscoe scale upwards. Barrelfish represents an ex- perimental operating system design where Timothy Roscoe is part of the ETH Zürich Computer early versions run faster than Linux on the Science Department’s Systems Group. His main research areas are operating systems, distributed same hardware, with a design that should systems, and networking, with some critical theory on the side. scale well to systems with many cores and [email protected] even different CPU architectures. Barrelfish explores the design of a multikernel Rik Farrow is the Editor of ;login:. operating system, one designed to run non-shared [email protected] copies of key kernel data structures. Popular cur- rent operating systems, such as Windows and Linux, use a single, shared operating system image even when running on multiple-core CPUs as well as on motherboard designs with multiple CPUs. These monolithic kernels rely on cache coherency to protect shared data. Multikernels each have their own copy of key data structures and use message passing to maintain the correctness of each copy. In their SOSP 2009 paper [1], Baumann et al. describe their experiences in building and bench- marking Barrelfish on a variety of Intel and AMD systems ranging from four to 32 cores. When these systems run Linux or Windows, they rely on cache coherency mechanisms to maintain a single image of the operating system.
    [Show full text]
  • Message Passing and Bulk Transport on Heterogeneous Multiprocessors
    Master’s Thesis Nr. 118 Systems Group, Department of Computer Science, ETH Zurich Message Passing and Bulk Transport on Heterogeneous Multiprocessors by Reto Achermann Supervised by Prof. Timothy Roscoe, Dr. Kornilios Kourtis October 17, 2014 Abstract The decade of symmetric multiprocessors is about to end. Due to physical limitations, individual cores cannot be made any faster and adding cores won’t work anymore (dark silicon). Operating systems face the next big paradigm shift: systems are getting faster by exploiting specialized hardware leading to the era of asymmetric processors and heterogeneous systems. An ever growing count and the diversity of cores yields new challenges regarding scheduling and resource management. Multiple physical address spaces within single machines let them appear as a cluster-like system. Today’s commodity operating systems are not well designed to deal with het- erogeneity and asymmetric processors. Many attempts have been made to tackle the challenges of heterogeneous hardware, most of which treat avail- able co-processors like devices or independent execution environments rather than equivalent processors. Thus, true support of a multi-architecture system is rarely seen, despite the fact that such hardware already exists. Examples are, systems like the OMAP44xx SoC or Intel’s Xeon Phi co-processor. In this thesis we will elaborate the arising challenges introduced by heteroge- neous system architectures. We ported the Barrelfish research operating system to the Xeon Phi execution environment and explored the impact on perfor- mance and system design imposed by the emerging hardware characteristics such as different instruction set architectures, multiple physical address spaces and asymmetric cores.
    [Show full text]
  • A Tool for Modeling, Viewing, and Checking Distributed System
    ;login FALL 2016 VOL. 41, NO. 3 : & POSIX: The Old, the New, and the Missing Vaggelis Atlidakis, Jeremy Andrus, Roxana Geambasu, Dimitris Mitropoulos, and Jason Nieh & Runway: A Tool for Modeling, Viewing, and Checking Distributed Systems Diego Ongaro & Create a Threat Model for Your Organization Bruce Potter & Eliminating Toil Betsy Beyer, Brendan Gleason, Dave O’Connor, and Vivek Rau Columns Separating Protocol Implementations from Transport in Python David Beazley Shutting Down Go Servers with Manners Kelsey Hightower Using Consul for Distributed Key-Value Stores David N. Blank-Edelman Monitoring Paging Trauma Dave Josephsen Making Security into a Science Dan Geer Distributed Systems Robert G. Ferrell UPCOMING EVENTS OSDI ’16: 12th USENIX Symposium on Operating Enigma 2017 Systems Design and Implementation January 30–February 1, 2017, Oakland, CA, USA Sponsored by USENIX in cooperation with ACM SIGOPS enigma.usenix.org November 2–4, 2016, Savannah, GA, USA www.usenix.org/osdi16 FAST ’17: 15th USENIX Conference on File and Co-located with OSDI ’16 Storage Technologies INFLOW ’16: 4th Workshop on Interactions of NVM/Flash Sponsored by USENIX in cooperation with ACM SIGOPS with Operating Systems and Workloads February 27–March 2, 2017, Santa Clara, CA, USA November 1, 2016 Submissions due September 27, 2016 www.usenix.org/inflow16 www.usenix.org/fast17 LISA16 SREcon17 December 4–9, 2016, Boston, MA, USA March 13–14, 2017, San Francisco, CA, USA www.usenix.org/lisa16 Co-located with LISA16 NSDI ’17: 14th USENIX Symposium on Networked SESA
    [Show full text]
  • Customized OS Kernel for Data-Processing on Modern Hardware
    Imperial College London MEng Computing Individual Project Customized OS kernel for data-processing on modern hardware Author: Supervisor: Daniel Grumberg Dr. Jana Giceva An Individual Project Report submitted in fulfillment of the requirements for the degree of MEng Computing in the Department of Computing June 18, 2018 iii Abstract Daniel Grumberg Customized OS kernel for data-processing on modern hardware The end of Moore’s Law shows that traditional processor design has hit its peak and that it cannot yield new major performance improvements. As an answer, computer architecture is turning towards domain-specific solutions in which the hardware’s properties are tailored to specific workloads. An example of this new trend is the Xeon Phi accelerator card which aims to bridge the gap between modern CPUs and GPUs. Commodity operating systems are not well equipped to leverage these ad- vancements. Most systems treat accelerators as they would an I/O device, or as an entirely separate system. Developers need to craft their algorithms to target the new device and to leverage its properties. However, transferring data between compu- tational devices is very costly, so programmers must also carefully specify all the individual memory transfers between the different execution environments to avoid unnecessary costs. This proves to be a complex task and software engineers often need to specialise and complicate their code in order to implement optimal memory transfer patterns. This project analyses the features of main-memory hash join algorithms, that are used in relational databases for join operations. Specifically, we explore the relation- ship between the main hash join algorithms and the hardware properties of Xeon Phi cards.
    [Show full text]
  • Baumann: the Multikernel: a New OS Architecture for Scalable Multicore
    The Multikernel: A new OS architecture for scalable multicore systems Andrew Baumann,∗ Paul Barham,y Pierre-Evariste Dagand,z Tim Harris,y Rebecca Isaacs,y Simon Peter,∗ Timothy Roscoe,∗ Adrian Schüpbach,∗ and Akhilesh Singhania∗ ∗Systems Group, ETH Zurich yMicrosoft Research, Cambridge zENS Cachan Bretagne Abstract App App App App Commodity computer systems contain more and more OS node OS node OS node OS node processor cores and exhibit increasingly diverse archi- Agreement algorithms State State State Async messages State tectural tradeoffs, including memory hierarchies, inter- replica replica replica replica connects, instruction sets and variants, and IO configu- Arch-specific code rations. Previous high-performance computing systems have scaled in specific cases, but the dynamic nature of Heterogeneous x86 x64 ARM GPU modern client and server workloads, coupled with the cores impossibility of statically optimizing an OS for all work- Interconnect loads and hardware variants pose serious challenges for operating system structures. Figure 1: The multikernel model. We argue that the challenge of future multicore hard- ware is best met by embracing the networked nature of the machine, rethinking OS architecture using ideas from Such hardware, while in some regards similar to ear- distributed systems. We investigate a new OS structure, lier parallel systems, is new in the general-purpose com- the multikernel, that treats the machine as a network of puting domain. We increasingly find multicore systems independent cores, assumes no inter-core sharing at the in a variety of environments ranging from personal com- lowest level, and moves traditional OS functionality to puting platforms to data centers, with workloads that are a distributed system of processes that communicate via less predictable, and often more OS-intensive, than tradi- message-passing.
    [Show full text]
  • Cherios: Designing an Untrusted Single-Address-Space Capability Operating System Utilising Capability Hardware and a Minimal Hypervisor
    CheriOS: Designing an untrusted single-address-space capability operating system utilising capability hardware and a minimal hypervisor Lawrence G. Esswood University of Cambridge Computer Laboratory Churchill College July 2020 This thesis is submitted for the degree of Doctor of Philosophy Declaration This thesis is the result of my own work and includes nothing which is the outcome of work done in collaboration except as declared in the Preface and specified in the text. I further state that no substantial part of my thesis has already been submitted, or, is being concurrently submitted for any such degree, diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. It does not exceed the prescribed word limit for the relevant Degree Committee. Lawrence G. Esswood July 2020 iii Abstract CheriOS: Designing an untrusted single-address-space capability operating system utilising capability hardware and a minimal hypervisor Lawrence G. Esswood This thesis presents the design, implementation, and evaluation of a novel capability operating system: CheriOS. The guiding motivation behind CheriOS is to provide strong security guarantees to programmers, even allowing them to continue to program in fast, but typically unsafe, languages such as C. Furthermore, it does this in the presence of an extremely strong adversarial model: in CheriOS, every compartment – and even the operating system itself – is considered actively malicious. Building on top of the architecturally enforced capabilities offered by the CHERI microprocessor, I show that only a few more capability types and enforcement checks are required to provide a strong compartmentalisation model that can facilitate mutual distrust.
    [Show full text]
  • The Multikernel: a New OS Architecture for Scalable Multicore Systems
    The Multikernel: A new OS architecture for scalable multicore systems Andrew Baumann,∗ Paul Barham,y Pierre-Evariste Dagand,z Tim Harris,y Rebecca Isaacs,y Simon Peter,∗ Timothy Roscoe,∗ Adrian Schüpbach,∗ and Akhilesh Singhania∗ ∗ y z Systems Group, ETH Zurich Microsoft Research, Cambridge ENS Cachan Bretagne ABSTRACT App App App App Commodity computer systems contain more and more processor cores and exhibit increasingly diverse architectural tradeoffs, in- OS node OS node OS node OS node Agreement cluding memory hierarchies, interconnects, instruction sets and algorithms State State State Async messages State variants, and IO configurations. Previous high-performance com- replica replica replica replica puting systems have scaled in specific cases, but the dynamic nature Arch-specific of modern client and server workloads, coupled with the impossi- code bility of statically optimizing an OS for all workloads and hardware Heterogeneous variants pose serious challenges for operating system structures. x86 x64 ARM GPU cores We argue that the challenge of future multicore hardware is best met by embracing the networked nature of the machine, rethinking Interconnect OS architecture using ideas from distributed systems. We investi- gate a new OS structure, the multikernel, that treats the machine as a Figure 1: The multikernel model. network of independent cores, assumes no inter-core sharing at the lowest level, and moves traditional OS functionality to a distributed system of processes that communicate via message-passing. Such hardware, while in some regards similar to earlier paral- We have implemented a multikernel OS to show that the ap- lel systems, is new in the general-purpose computing domain.
    [Show full text]
  • Festschrift Honoring Rick Rashid on His 60Th Birthday
    estschrift for Rick Rashid F on his 60th birthday Rich Draves Pamela Ash 9 March 2012 Dan Hart illustration for School of Computer Science, © 2009 Carnegie Mellon University, used with permission. INTRODUCTION RICH DRAVES ou’re holding a Festschrift honoring Rick Rashid on his 60th birthday. You may well ask, “What is a Festschrift?” According to Wikipedia, a Festschrift “is a book Y honoring a respected person, especially an academic, and presented during his or her lifetime.” The Festschrift idea dates back to August 2011, when a group of friends and colleagues suddenly realized that Rick’s 60th birthday was rapidly approaching. In our defense, I can only point to Rick’s youthful appearance and personality. Peter Lee suggested that we organize a Festschrift. The idea was foreign, but everyone immediately recognized that it was the right way to honor Rick. The only problem was timing. Fortunately, this is a common problem and the belated Festschrift is somewhat traditional. We set a goal of holding a colloquium on March 9, 2012 (in conjunction with Microsoft Research’s annual TechFest) and producing a volume by September 2012, within a year of Rick’s birthday. This volume has content similar to the colloquium, but some authors made a different written contribution. The DVD in the back of the book contains a recording of the colloquium. I want to emphasize that we’re celebrating Rick’s career and accomplishments to date but we are also looking forward to many more great things to come. In other words, we need not fear his retirement.
    [Show full text]
  • Transactional Memory 2Nd Edition Copyright © 2010 by Morgan & Claypool
    Transactional Memory 2nd edition Copyright © 2010 by Morgan & Claypool All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopy, recording, or any other except for brief quotations in printed reviews, without the prior permission of the publisher. Transactional Memory, 2nd edition Tim Harris, James Larus, and Ravi Rajwar www.morganclaypool.com ISBN: 9781608452354 paperback ISBN: 9781608452361 ebook DOI 10.2200/S00272ED1V01Y201006CAC011 A Publication in the Morgan & Claypool Publishers series SYNTHESIS LECTURES ON COMPUTER ARCHITECTURE Lecture #11 Series Editor: Mark D. Hill, University of Wisconsin Series ISSN Synthesis Lectures on Computer Architecture Print 1935-3235 Electronic 1935-3243 Synthesis Lectures on Computer Architecture Editor Mark D. Hill, University of Wisconsin Synthesis Lectures on Computer Architecture publishes 50- to 100-page publications on topics pertaining to the science and art of designing, analyzing, selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals. The scope will largely follow the purview of premier computer architecture conferences, such as ISAC, HAPP, MICRO, and APOLLOS. Transactional Memory, 2nd edition Tim Harris, James Larus, and Ravi Rajwar 2010 Computer Architecture Performance Evaluation Models Lieven Eeckhout 2010 Introduction to Reconfigured Supercomputing Marco Lanzagorta, Stephen Bique, and Robert Rosenberg 2009
    [Show full text]
  • Operating System Support for Warehouse-Scale Computing
    Operating system support for warehouse-scale computing Malte Schwarzkopf University of Cambridge Computer Laboratory St John’s College October 2015 This dissertation is submitted for the degree of Doctor of Philosophy Declaration This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation is not substantially the same as any that I have submitted, or, is being concur- rently submitted for a degree or diploma or other qualification at the University of Cambridge or any other University or similar institution. I further state that no substantial part of my dissertation has already been submitted, or, is being concurrently submitted for any such degree, diploma or other qualification at the University of Cambridge or any other University of similar institution. This dissertation does not exceed the regulation length of 60,000 words, including tables and footnotes. Operating system support for warehouse-scale computing Malte Schwarzkopf Summary Computer technology currently pursues two divergent trends: ever smaller mobile devices bring computing to new everyday contexts, and ever larger-scale data centres remotely back the ap- plications running on these devices. These data centres pose challenges to systems software and the operating system (OS): common OS abstractions are fundamentally scoped to a single machine, while data centre applications treat thousands of machines as a “warehouse-scale computer” (WSC). I argue that making the operating system explicitly aware of their distributed operation can result in significant benefits. This dissertation presents the design of a novel distributed operating system for warehouse-scale computers.
    [Show full text]