skip to main content
10.1145/3050748.3050755acmconferencesArticle/Chapter ViewAbstractPublication PagesveeConference Proceedingsconference-collections
research-article

Improving Virtualized Storage Performance with Sky

Authors Info & Claims
Published:08 April 2017Publication History

ABSTRACT

We introduce Sky, an extension to the VMM that gathers insights and information by intercepting system calls made by guest applications. We show how Sky gains three specific insights -- guest file-size information, metadata-data distinction, and file-content hints -- and uses said information to enhance virtualized-storage performance. By caching small files and metadata with higher priority, Sky reduces the runtime by 2.3 to 8.8 times for certain workloads. Sky also achieves 4.5 to 18.7 times reduction in the runtime of an open-source block-layer deduplication system by exploiting hints about file contents. Sky works underneath both Linux and FreeBSD guests, as well as under a range of file systems, thus enabling portable and general VMM-level optimization underneath a wide range of storage stacks.

References

  1. Libvmi: Virtual machine introspection library, 2016. http://libvmi.com/ https://github.com/libvmi/libvmi.Google ScholarGoogle Scholar
  2. Agrawal, N., Arulraj, L., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Emulating Goliath Storage Systems with David. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. AMD Technology. AMD64 Architecture Programmers Manual Volume 2: System Programming. http://developer.amd.com/wordpress/media/2012/10/24593_APM_v21.pdf.Google ScholarGoogle Scholar
  4. Arpaci-Dusseau, R. H., and Arpaci-Dusseau, A. C. Operating Systems: Three Easy Pieces, 0.91 ed. Arpaci-Dusseau Books, May 2015.Google ScholarGoogle Scholar
  5. Bellard, F. QEMU, a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference, FREENIX Track (2005), pp. 41--46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bressoud, T. C., and Schneider, F. B. Hypervisor-based Fault Tolerance. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 1995), SOSP '95, ACM, pp. 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bugnion, E., Devine, S., and Rosenblum, M. Disco: Running Commodity Operating Systems on Scalable Multiprocessors. In SOSP '97 (Saint-Malo, France, October 1997), pp. 143--156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chen, P., and Noble, B. When virtual is better than real [operating system relocation to virtual machines]. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on (2001), pp. 133--138.Google ScholarGoogle ScholarCross RefCross Ref
  9. Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., and Warfield, A. Remus: High Availability via Asynchronous Virtual Machine Replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (Berkeley, CA, USA, 2008), NSDI'08, USENIX Association, pp. 161--174.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dinaburg, A., Royal, P., Sharif, M., and Lee, W. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security (New York, NY, USA, 2008), CCS '08, ACM, pp. 51--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ding, X., Jiang, S., Chen, F., Davis, K., and Zhang, X. DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch. In Proc. of USENIX07 (2007).Google ScholarGoogle Scholar
  12. Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., and Lee, W. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In Security and Privacy (SP), 2011 IEEE Symposium on (2011), pp. 297--312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Fowler, G., Noll, L. C., and Vo, P. Fowler / Noll / Vo (FNV) Hash, 1991.Google ScholarGoogle Scholar
  14. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. Terra: A Virtual Machine-based Platform for Trusted Computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2003), SOSP '03, ACM, pp. 193--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Garfinkel, T., Rosenblum, M., et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS (2003), vol. 3, pp. 191--206.Google ScholarGoogle Scholar
  16. Gibson, G. A., Rochberg, D., Zelenka, J., Nagle, D. F., Amiri, K., Chang, F. W., Feinberg, E. M., Gobioff, H., Lee, C., Ozceri, B., and Riedel, E. File server scaling with network-attached secure disks. In SIGMETRICS '97 (Seattle, WA, June 1997), pp. 272--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gu, Z., Deng, Z., Xu, D., and Jiang, X. Process Implanting: A New Active Introspection Framework for Virtualization. In Proceedings of the 2011 IEEE 30th International Symposium on Reliable Distributed Systems (Washington, DC, USA, 2011), SRDS '11, IEEE Computer Society, pp. 147--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hebbal, Y., Laniepce, S., and Menaud, J. M. Virtual machine introspection: Techniques and applications. In 2015 10th International Conference on Availability, Reliability and Security (Aug 2015), pp. 676--685.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Huang, H., Hung, A., and Shin, K. G. FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. In Proceedings of 20th ACM Symposium on Operating System Principles (2005), ACM Press, pp. 263--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Intel. Intel 64 and IA-32 Architectures Software Developers Manual Combined Volumes: 1, 2ABC, 3ABCD. https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf.Google ScholarGoogle Scholar
  21. Johnson, T., and Shasha, D. 2Q: A Low Overhead High Performance Buffer Management Replacement Algorithm. In Proceedings of the 20th International Conference on Very Large Data Bases (San Francisco, CA, USA, 1994), VLDB '94, Morgan Kaufmann Publishers Inc., pp. 439--450.Google ScholarGoogle Scholar
  22. Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. VMM-based Hidden Process Detection and Identification Using Lycosid. In Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (New York, NY, USA, 2008), VEE '08, ACM, pp. 91--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jujjuri, V., Van Hensbergen, E., Liguori, A., and Pulavarty, B. VirtFSA virtualization aware File System pass-through. In Proceedings of the Ottawa Linux Symposium (2010).Google ScholarGoogle Scholar
  24. Kivity, A., Kamay, Y., Laor, D., Lublin, U., and Liguori, A. KVM: the Linux virtual machine monitor. In Proceedings of the Linux Symposium (2007), vol. 1, pp. 225--230.Google ScholarGoogle Scholar
  25. Lee, D., Choi, J., Kim, J. H., Noh, S. H., Min, S. L., Cho, Y., and Kim, C. S. LRFU: A Spectrum of Policies That Subsumes the Least Recently Used and Least Frequently Used Policies. IEEE Trans. Comput. 50, 12 (Dec. 2001), 1352--1361. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Lee, S., Panigrahy, R., Prabhakaran, V., Ramasubramanian, V., Talwar, K., Uyeda, L., and Wieder, U. Validating Heuristics for Virtual Machines Consolidation. Tech. Rep. MSR-TR-2011-9, Microsoft Research, January 2011.Google ScholarGoogle Scholar
  27. LeVasseur, J., Uhlig, V., Stoess, J., and Götz, S. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (Berkeley, CA, USA, 2004), OSDI'04, USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Mandal, S., Kuenning, G., Ok, D., Shastry, V., Shilane, P., Zhen, S., Tarasov, V., and Zadok, E. Using Hints to Improve Inline Block-layer Deduplication. In 14th USENIX Conference on File and Storage Technologies (FAST 16) (Santa Clara, CA, Feb. 2016), USENIX Association, pp. 315--322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. McDougall, R., and Mauro, J. Filebench, 2005. http://filebench.sourceforge.net/.Google ScholarGoogle Scholar
  30. Megiddo, N., and Modha, D. S. ARC: A Self-Tuning, Low Overhead Replacement Cache. In Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2003), FAST '03, USENIX Association, pp. 115--130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mesnier, M., Chen, F., Luo, T., and Akers, J. B. Differentiated storage services. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (New York, NY, USA, 2011), SOSP '11, ACM, pp. 57--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Mesnier, M., Ganger, G. R., and Riedel, E. Object-based storage. IEEE Communications Magazine 41, 8 (Aug 2003), 84--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Meyer, D. T., Aggarwal, G., Cully, B., Lefebvre, G., Feeley, M. J., Hutchinson, N. C., and Warfield, A. Parallax: Virtual disks for virtual machines. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008 (New York, NY, USA, 2008), Eurosys '08, ACM, pp. 41--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Nelson, M., Lim, B.-H., and Hutchins, G. Fast Transparent Migration for Virtual Machines. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2005), ATEC '05, USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. O'Neil, E. J., O'Neil, P. E., and Weikum, G. The LRU-K Page Replacement Algorithm for Database Disk Buffering. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data (New York, NY, USA, 1993), SIGMOD '93, ACM, pp. 297--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Oracle Corporation. MySQL White Papers. https://www.mysql.com/why-mysql/white-papers/.Google ScholarGoogle Scholar
  37. Payne, B. D., Carbone, M. D. P. D. A., and Lee, W. Secure and flexible monitoring of virtual machines. In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) (Dec 2007), pp. 385--397. Google ScholarGoogle ScholarCross RefCross Ref
  38. Pfaff, B., Garfinkel, T., and Rosenblum, M. Virtualization aware file systems: Getting beyond the limitations of virtual disks. In Proceedings of the 3rd Conference on Networked Systems Design and Implementation - Volume 3 (Berkeley, CA, USA, 2006), NSDI'06, USENIX Association.Google ScholarGoogle Scholar
  39. Pfoh, J., Schneider, C., and Eckert, C. Nitro: Hardware-Based System Call Tracing for Virtual Machines. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 96--112.Google ScholarGoogle ScholarCross RefCross Ref
  40. Rodeh, O., and Teperman, A. zFS: A Scalable Distributed File System Using Object Disks. In Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03) (Washington, DC, USA, 2003), MSS '03, IEEE Computer Society.Google ScholarGoogle Scholar
  41. Roselli, D., Lorch, J. R., and Anderson, T. E. A comparison of file system workloads. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2000), ATEC '00, USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Rosenblum, M. The Reincarnation of Virtual Machines. Queue 2, 5 (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Rosenblum, M., and Garfinkel, T. Virtual Machine Monitors: Current Technology and Future Trends. Computer (2005), 39--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Schindler, J., Griffin, J. L., Lumb, C. R., and Ganger, G. R. Track-Aligned Extents: Matching Access Patterns to Disk Drive Characteristics. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2002), FAST '02, USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Shamma, M., Meyer, D. T., Wires, J., Ivanova, M., Hutchinson, N. C., and Warfield, A. Capo: Recapitulating storage for virtual desktops. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2011), FAST'11, USENIX Association.Google ScholarGoogle Scholar
  46. Sivathanu, G., Sundararaman, S., and Zadok, E. Type-safe Disks. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Berkeley, CA, USA, 2006), OSDI '06, USENIX Association, pp. 15--28.Google ScholarGoogle Scholar
  47. Sivathanu, M., Bairavasundaram, L. N., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Life or Death at Block-level. In Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation - Volume 6 (Berkeley, CA, USA, 2004), OSDI'04, USENIX Association.Google ScholarGoogle Scholar
  48. Sivathanu, M., Prabhakaran, V., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Improving Storage System Availability with D-GRAID. Trans. Storage 1, 2 (May 2005), 133--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Sivathanu, M., Prabhakaran, V., Popovici, F. I., Denehy, T. E., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Semantically-Smart Disk Systems. In Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2003), FAST '03, USENIX Association, pp. 73--88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Storer, M. W., Greenan, K., Long, D. D., and Miller, E. L. Secure data deduplication. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (New York, NY, USA, 2008), StorageSS '08, ACM, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Tarasov, V., Jain, D., Hildebrand, D., Tewari, R., Kuenning, G., and Zadok, E. Improving I/O Performance Using Virtual Disk Introspection. In Presented as part of the 5th USENIX Workshop on Hot Topics in Storage and File Systems (Berkeley, CA, 2013), USENIX.Google ScholarGoogle Scholar
  52. Tarasov, V., Mandal, S., Shilane, P., Jain, D., Kuenning, G., Palanisami, K., Trehan, S., and Zadok, E. Dmdedup: Device Mapper Target for Data Deduplication.Google ScholarGoogle Scholar
  53. Thereska, E., Ballani, H., O'Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R., and Zhu, T. IOFlow: A Software-defined Storage Architecture. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2013), SOSP '13, ACM, pp. 182--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Transaction Processing Council. TPC Benchmark H Standard Specification, Revision 2.17.1, 2014. http://www.tpc.org/tpc_documents_current_versions/pdf/tpc-h_v2.17.1.pdf.Google ScholarGoogle Scholar
  55. VMware Inc. VMware VMFS product datasheet. http://www.vmware.com/pdf/vmfs_datasheet.pdf.Google ScholarGoogle Scholar
  56. Vogels, W. Beyond Server Consolidation. Queue 6, 1 (2008), 20--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Waldspurger, C., and Rosenblum, M. I/O Virtualization. Commun. ACM 55, 1 (Jan. 2012), 66--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Whitaker, A., Shaw, M., and Gribble, S. D. Scale and Performance in the Denali Isolation Kernel. In OSDI '02 (Boston, MA, December 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Yalamanchili, C., Vijayasankar, K., Zadok, E., and Sivathanu, G. DHIS: Discriminating Hierarchical Storage. In Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference (New York, NY, USA, 2009), SYSTOR '09, ACM, pp. 9:1--9:12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Zhou, Y., Philbin, J., and Li, K. The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. In Proceedings of the General Track: 2001 USENIX Annual Technical Conference (Berkeley, CA, USA, 2001), USENIX Association, pp. 91--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Zhu, B., Li, K., and Patterson, H. Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2008), FAST'08, USENIX Association, pp. 18:1--18:14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Improving Virtualized Storage Performance with Sky

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      VEE '17: Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
      April 2017
      261 pages
      ISBN:9781450349482
      DOI:10.1145/3050748

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      VEE '17 Paper Acceptance Rate18of43submissions,42%Overall Acceptance Rate80of235submissions,34%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader