ABSTRACT
We introduce Sky, an extension to the VMM that gathers insights and information by intercepting system calls made by guest applications. We show how Sky gains three specific insights -- guest file-size information, metadata-data distinction, and file-content hints -- and uses said information to enhance virtualized-storage performance. By caching small files and metadata with higher priority, Sky reduces the runtime by 2.3 to 8.8 times for certain workloads. Sky also achieves 4.5 to 18.7 times reduction in the runtime of an open-source block-layer deduplication system by exploiting hints about file contents. Sky works underneath both Linux and FreeBSD guests, as well as under a range of file systems, thus enabling portable and general VMM-level optimization underneath a wide range of storage stacks.
- Libvmi: Virtual machine introspection library, 2016. http://libvmi.com/ https://github.com/libvmi/libvmi.Google Scholar
- Agrawal, N., Arulraj, L., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Emulating Goliath Storage Systems with David. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (2011).Google ScholarDigital Library
- AMD Technology. AMD64 Architecture Programmers Manual Volume 2: System Programming. http://developer.amd.com/wordpress/media/2012/10/24593_APM_v21.pdf.Google Scholar
- Arpaci-Dusseau, R. H., and Arpaci-Dusseau, A. C. Operating Systems: Three Easy Pieces, 0.91 ed. Arpaci-Dusseau Books, May 2015.Google Scholar
- Bellard, F. QEMU, a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference, FREENIX Track (2005), pp. 41--46.Google ScholarDigital Library
- Bressoud, T. C., and Schneider, F. B. Hypervisor-based Fault Tolerance. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 1995), SOSP '95, ACM, pp. 1--11. Google ScholarDigital Library
- Bugnion, E., Devine, S., and Rosenblum, M. Disco: Running Commodity Operating Systems on Scalable Multiprocessors. In SOSP '97 (Saint-Malo, France, October 1997), pp. 143--156.Google ScholarDigital Library
- Chen, P., and Noble, B. When virtual is better than real [operating system relocation to virtual machines]. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on (2001), pp. 133--138.Google ScholarCross Ref
- Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., and Warfield, A. Remus: High Availability via Asynchronous Virtual Machine Replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (Berkeley, CA, USA, 2008), NSDI'08, USENIX Association, pp. 161--174.Google ScholarDigital Library
- Dinaburg, A., Royal, P., Sharif, M., and Lee, W. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security (New York, NY, USA, 2008), CCS '08, ACM, pp. 51--62. Google ScholarDigital Library
- Ding, X., Jiang, S., Chen, F., Davis, K., and Zhang, X. DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch. In Proc. of USENIX07 (2007).Google Scholar
- Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., and Lee, W. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In Security and Privacy (SP), 2011 IEEE Symposium on (2011), pp. 297--312.Google ScholarDigital Library
- Fowler, G., Noll, L. C., and Vo, P. Fowler / Noll / Vo (FNV) Hash, 1991.Google Scholar
- Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. Terra: A Virtual Machine-based Platform for Trusted Computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2003), SOSP '03, ACM, pp. 193--206. Google ScholarDigital Library
- Garfinkel, T., Rosenblum, M., et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS (2003), vol. 3, pp. 191--206.Google Scholar
- Gibson, G. A., Rochberg, D., Zelenka, J., Nagle, D. F., Amiri, K., Chang, F. W., Feinberg, E. M., Gobioff, H., Lee, C., Ozceri, B., and Riedel, E. File server scaling with network-attached secure disks. In SIGMETRICS '97 (Seattle, WA, June 1997), pp. 272--284. Google ScholarDigital Library
- Gu, Z., Deng, Z., Xu, D., and Jiang, X. Process Implanting: A New Active Introspection Framework for Virtualization. In Proceedings of the 2011 IEEE 30th International Symposium on Reliable Distributed Systems (Washington, DC, USA, 2011), SRDS '11, IEEE Computer Society, pp. 147--156. Google ScholarDigital Library
- Hebbal, Y., Laniepce, S., and Menaud, J. M. Virtual machine introspection: Techniques and applications. In 2015 10th International Conference on Availability, Reliability and Security (Aug 2015), pp. 676--685.Google ScholarDigital Library
- Huang, H., Hung, A., and Shin, K. G. FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. In Proceedings of 20th ACM Symposium on Operating System Principles (2005), ACM Press, pp. 263--276. Google ScholarDigital Library
- Intel. Intel 64 and IA-32 Architectures Software Developers Manual Combined Volumes: 1, 2ABC, 3ABCD. https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf.Google Scholar
- Johnson, T., and Shasha, D. 2Q: A Low Overhead High Performance Buffer Management Replacement Algorithm. In Proceedings of the 20th International Conference on Very Large Data Bases (San Francisco, CA, USA, 1994), VLDB '94, Morgan Kaufmann Publishers Inc., pp. 439--450.Google Scholar
- Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. VMM-based Hidden Process Detection and Identification Using Lycosid. In Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (New York, NY, USA, 2008), VEE '08, ACM, pp. 91--100. Google ScholarDigital Library
- Jujjuri, V., Van Hensbergen, E., Liguori, A., and Pulavarty, B. VirtFSA virtualization aware File System pass-through. In Proceedings of the Ottawa Linux Symposium (2010).Google Scholar
- Kivity, A., Kamay, Y., Laor, D., Lublin, U., and Liguori, A. KVM: the Linux virtual machine monitor. In Proceedings of the Linux Symposium (2007), vol. 1, pp. 225--230.Google Scholar
- Lee, D., Choi, J., Kim, J. H., Noh, S. H., Min, S. L., Cho, Y., and Kim, C. S. LRFU: A Spectrum of Policies That Subsumes the Least Recently Used and Least Frequently Used Policies. IEEE Trans. Comput. 50, 12 (Dec. 2001), 1352--1361. Google ScholarDigital Library
- Lee, S., Panigrahy, R., Prabhakaran, V., Ramasubramanian, V., Talwar, K., Uyeda, L., and Wieder, U. Validating Heuristics for Virtual Machines Consolidation. Tech. Rep. MSR-TR-2011-9, Microsoft Research, January 2011.Google Scholar
- LeVasseur, J., Uhlig, V., Stoess, J., and Götz, S. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (Berkeley, CA, USA, 2004), OSDI'04, USENIX Association.Google ScholarDigital Library
- Mandal, S., Kuenning, G., Ok, D., Shastry, V., Shilane, P., Zhen, S., Tarasov, V., and Zadok, E. Using Hints to Improve Inline Block-layer Deduplication. In 14th USENIX Conference on File and Storage Technologies (FAST 16) (Santa Clara, CA, Feb. 2016), USENIX Association, pp. 315--322.Google ScholarDigital Library
- McDougall, R., and Mauro, J. Filebench, 2005. http://filebench.sourceforge.net/.Google Scholar
- Megiddo, N., and Modha, D. S. ARC: A Self-Tuning, Low Overhead Replacement Cache. In Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2003), FAST '03, USENIX Association, pp. 115--130.Google ScholarDigital Library
- Mesnier, M., Chen, F., Luo, T., and Akers, J. B. Differentiated storage services. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (New York, NY, USA, 2011), SOSP '11, ACM, pp. 57--70. Google ScholarDigital Library
- Mesnier, M., Ganger, G. R., and Riedel, E. Object-based storage. IEEE Communications Magazine 41, 8 (Aug 2003), 84--90. Google ScholarDigital Library
- Meyer, D. T., Aggarwal, G., Cully, B., Lefebvre, G., Feeley, M. J., Hutchinson, N. C., and Warfield, A. Parallax: Virtual disks for virtual machines. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008 (New York, NY, USA, 2008), Eurosys '08, ACM, pp. 41--54.Google ScholarDigital Library
- Nelson, M., Lim, B.-H., and Hutchins, G. Fast Transparent Migration for Virtual Machines. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2005), ATEC '05, USENIX Association.Google ScholarDigital Library
- O'Neil, E. J., O'Neil, P. E., and Weikum, G. The LRU-K Page Replacement Algorithm for Database Disk Buffering. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data (New York, NY, USA, 1993), SIGMOD '93, ACM, pp. 297--306. Google ScholarDigital Library
- Oracle Corporation. MySQL White Papers. https://www.mysql.com/why-mysql/white-papers/.Google Scholar
- Payne, B. D., Carbone, M. D. P. D. A., and Lee, W. Secure and flexible monitoring of virtual machines. In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) (Dec 2007), pp. 385--397. Google ScholarCross Ref
- Pfaff, B., Garfinkel, T., and Rosenblum, M. Virtualization aware file systems: Getting beyond the limitations of virtual disks. In Proceedings of the 3rd Conference on Networked Systems Design and Implementation - Volume 3 (Berkeley, CA, USA, 2006), NSDI'06, USENIX Association.Google Scholar
- Pfoh, J., Schneider, C., and Eckert, C. Nitro: Hardware-Based System Call Tracing for Virtual Machines. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 96--112.Google ScholarCross Ref
- Rodeh, O., and Teperman, A. zFS: A Scalable Distributed File System Using Object Disks. In Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03) (Washington, DC, USA, 2003), MSS '03, IEEE Computer Society.Google Scholar
- Roselli, D., Lorch, J. R., and Anderson, T. E. A comparison of file system workloads. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2000), ATEC '00, USENIX Association.Google ScholarDigital Library
- Rosenblum, M. The Reincarnation of Virtual Machines. Queue 2, 5 (2004). Google ScholarDigital Library
- Rosenblum, M., and Garfinkel, T. Virtual Machine Monitors: Current Technology and Future Trends. Computer (2005), 39--47. Google ScholarDigital Library
- Schindler, J., Griffin, J. L., Lumb, C. R., and Ganger, G. R. Track-Aligned Extents: Matching Access Patterns to Disk Drive Characteristics. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2002), FAST '02, USENIX Association.Google ScholarDigital Library
- Shamma, M., Meyer, D. T., Wires, J., Ivanova, M., Hutchinson, N. C., and Warfield, A. Capo: Recapitulating storage for virtual desktops. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2011), FAST'11, USENIX Association.Google Scholar
- Sivathanu, G., Sundararaman, S., and Zadok, E. Type-safe Disks. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Berkeley, CA, USA, 2006), OSDI '06, USENIX Association, pp. 15--28.Google Scholar
- Sivathanu, M., Bairavasundaram, L. N., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Life or Death at Block-level. In Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation - Volume 6 (Berkeley, CA, USA, 2004), OSDI'04, USENIX Association.Google Scholar
- Sivathanu, M., Prabhakaran, V., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Improving Storage System Availability with D-GRAID. Trans. Storage 1, 2 (May 2005), 133--170. Google ScholarDigital Library
- Sivathanu, M., Prabhakaran, V., Popovici, F. I., Denehy, T. E., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. Semantically-Smart Disk Systems. In Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2003), FAST '03, USENIX Association, pp. 73--88.Google ScholarDigital Library
- Storer, M. W., Greenan, K., Long, D. D., and Miller, E. L. Secure data deduplication. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (New York, NY, USA, 2008), StorageSS '08, ACM, pp. 1--10. Google ScholarDigital Library
- Tarasov, V., Jain, D., Hildebrand, D., Tewari, R., Kuenning, G., and Zadok, E. Improving I/O Performance Using Virtual Disk Introspection. In Presented as part of the 5th USENIX Workshop on Hot Topics in Storage and File Systems (Berkeley, CA, 2013), USENIX.Google Scholar
- Tarasov, V., Mandal, S., Shilane, P., Jain, D., Kuenning, G., Palanisami, K., Trehan, S., and Zadok, E. Dmdedup: Device Mapper Target for Data Deduplication.Google Scholar
- Thereska, E., Ballani, H., O'Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R., and Zhu, T. IOFlow: A Software-defined Storage Architecture. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2013), SOSP '13, ACM, pp. 182--196. Google ScholarDigital Library
- Transaction Processing Council. TPC Benchmark H Standard Specification, Revision 2.17.1, 2014. http://www.tpc.org/tpc_documents_current_versions/pdf/tpc-h_v2.17.1.pdf.Google Scholar
- VMware Inc. VMware VMFS product datasheet. http://www.vmware.com/pdf/vmfs_datasheet.pdf.Google Scholar
- Vogels, W. Beyond Server Consolidation. Queue 6, 1 (2008), 20--26. Google ScholarDigital Library
- Waldspurger, C., and Rosenblum, M. I/O Virtualization. Commun. ACM 55, 1 (Jan. 2012), 66--73. Google ScholarDigital Library
- Whitaker, A., Shaw, M., and Gribble, S. D. Scale and Performance in the Denali Isolation Kernel. In OSDI '02 (Boston, MA, December 2002). Google ScholarDigital Library
- Yalamanchili, C., Vijayasankar, K., Zadok, E., and Sivathanu, G. DHIS: Discriminating Hierarchical Storage. In Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference (New York, NY, USA, 2009), SYSTOR '09, ACM, pp. 9:1--9:12. Google ScholarDigital Library
- Zhou, Y., Philbin, J., and Li, K. The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. In Proceedings of the General Track: 2001 USENIX Annual Technical Conference (Berkeley, CA, USA, 2001), USENIX Association, pp. 91--104.Google ScholarDigital Library
- Zhu, B., Li, K., and Patterson, H. Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (Berkeley, CA, USA, 2008), FAST'08, USENIX Association, pp. 18:1--18:14.Google ScholarDigital Library
- Improving Virtualized Storage Performance with Sky
Recommendations
Improving Virtualized Storage Performance with Sky
VEE '17We introduce Sky, an extension to the VMM that gathers insights and information by intercepting system calls made by guest applications. We show how Sky gains three specific insights -- guest file-size information, metadata-data distinction, and file-...
Improving disk I/O performance in a virtualized system
Desktop virtualization is a general solution for providing users with various working environments on a single physical machine. It is typically based on the virtual machine (VM) technology, which can provide smart sharing policies on the scarce ...
A novel disk I/O scheduling framework of virtualized storage system
AbstractModern data centers usually use virtual machine technology to host various big data applications in a single physical machine, not only enhancing the server utilization, but also providing them with the hardware-level isolation. However, in a ...
Comments