This paper shows how system call traces can be obtained with minimal interference to the system being characterised, and used as realistic, repeatable workloads for experiments to evaluate operating system and le system designs and conguration alternatives. Our system call trace mechanism, called Ultra, captures a complete trace of each Unix process's calls to the operating system. The performance impact is normally small, and it runs in user mode without special privileges. Traces can be rerun in two ways: the operating system activity can be reproduced by simply replaying the system calls interspersed with appropriate delays. More interestingly, we also show how the resulting traces can be used to drive full, repeatable reexecution o...
One of the most challenging problems facing today's software engineer is to understand and modify di...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
File system traces have been used in simulation of specific design techniques such as disk schedulin...
Replaying traces is a time-honored method for benchmarking, stress-testing, and debugging systems—an...
Live system call traces provide essential information in analyzing modern malware. Prior work demons...
Linux currently plays an important role in high-end computing systems, but re-cent work has shown th...
This study presents a specification for the design of file system performance metrics. Standard syst...
The ongoing trend of increasing computer hardware and software complexity has resulted in the increa...
For operating system-intensive applications, the ability of designers to understand system call perf...
We have developed a tool called SPAM (for System Performance Analysis using Mi-crocode), based on mi...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Programming, understanding, and tuning the performance of large multiprocessor systems is challengin...
We analyzed the UNIX 4.2 BSD file system by recording user-level activity in trace files and writing...
Understanding the background activity of a computer and its operating system when running an arbitra...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
One of the most challenging problems facing today's software engineer is to understand and modify di...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
File system traces have been used in simulation of specific design techniques such as disk schedulin...
Replaying traces is a time-honored method for benchmarking, stress-testing, and debugging systems—an...
Live system call traces provide essential information in analyzing modern malware. Prior work demons...
Linux currently plays an important role in high-end computing systems, but re-cent work has shown th...
This study presents a specification for the design of file system performance metrics. Standard syst...
The ongoing trend of increasing computer hardware and software complexity has resulted in the increa...
For operating system-intensive applications, the ability of designers to understand system call perf...
We have developed a tool called SPAM (for System Performance Analysis using Mi-crocode), based on mi...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Programming, understanding, and tuning the performance of large multiprocessor systems is challengin...
We analyzed the UNIX 4.2 BSD file system by recording user-level activity in trace files and writing...
Understanding the background activity of a computer and its operating system when running an arbitra...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
One of the most challenging problems facing today's software engineer is to understand and modify di...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
File system traces have been used in simulation of specific design techniques such as disk schedulin...