Aravind Sankaran, Ilya Zhukov, Wolfgang Frings, Paolo Bientinesi
{"title":"使用 \"直接跟踪图 \"从系统调用跟踪中检查 I/O 操作","authors":"Aravind Sankaran, Ilya Zhukov, Wolfgang Frings, Paolo Bientinesi","doi":"arxiv-2408.07378","DOIUrl":null,"url":null,"abstract":"We aim to identify the differences in Input/Output(I/O) behavior between\nmultiple user programs in terms of contentions for system resources by\ninspecting the I/O requests made to the operating system. A typical program\nissues a large number of I/O requests to the operating system, thereby making\nthe process of inspection challenging. In this paper, we address this challenge\nby presenting a methodology to synthesize I/O system call traces into a\nspecific type of directed graph, known as the Directly-Follows-Graph (DFG).\nBased on the DFG, we present a technique to compare the traces from multiple\nprograms or different configurations of the same program, such that it is\npossible to identify the differences in the I/O requests made to the operating\nsystem. We apply our methodology to the IOR benchmark, and compare the\ncontentions for file accesses when the benchmark is run with different options\nfor file output and software interface.","PeriodicalId":501291,"journal":{"name":"arXiv - CS - Performance","volume":"320 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Inspection of I/O Operations from System Call Traces using Directly-Follows-Graph\",\"authors\":\"Aravind Sankaran, Ilya Zhukov, Wolfgang Frings, Paolo Bientinesi\",\"doi\":\"arxiv-2408.07378\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We aim to identify the differences in Input/Output(I/O) behavior between\\nmultiple user programs in terms of contentions for system resources by\\ninspecting the I/O requests made to the operating system. A typical program\\nissues a large number of I/O requests to the operating system, thereby making\\nthe process of inspection challenging. In this paper, we address this challenge\\nby presenting a methodology to synthesize I/O system call traces into a\\nspecific type of directed graph, known as the Directly-Follows-Graph (DFG).\\nBased on the DFG, we present a technique to compare the traces from multiple\\nprograms or different configurations of the same program, such that it is\\npossible to identify the differences in the I/O requests made to the operating\\nsystem. We apply our methodology to the IOR benchmark, and compare the\\ncontentions for file accesses when the benchmark is run with different options\\nfor file output and software interface.\",\"PeriodicalId\":501291,\"journal\":{\"name\":\"arXiv - CS - Performance\",\"volume\":\"320 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Performance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2408.07378\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Performance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.07378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Inspection of I/O Operations from System Call Traces using Directly-Follows-Graph
We aim to identify the differences in Input/Output(I/O) behavior between
multiple user programs in terms of contentions for system resources by
inspecting the I/O requests made to the operating system. A typical program
issues a large number of I/O requests to the operating system, thereby making
the process of inspection challenging. In this paper, we address this challenge
by presenting a methodology to synthesize I/O system call traces into a
specific type of directed graph, known as the Directly-Follows-Graph (DFG).
Based on the DFG, we present a technique to compare the traces from multiple
programs or different configurations of the same program, such that it is
possible to identify the differences in the I/O requests made to the operating
system. We apply our methodology to the IOR benchmark, and compare the
contentions for file accesses when the benchmark is run with different options
for file output and software interface.