Locks: Picking key methods for a scalable quantitative analysis

被引:3
|
作者
Baier, Christel [1 ]
Daum, Marcus [1 ]
Engel, Benjamin [2 ]
Haertig, Hermann [2 ]
Klein, Joachim [1 ]
Klueppelholz, Sascha [1 ]
Maercker, Steffen [1 ]
Tews, Hendrik [2 ]
Voelp, Marcus [2 ]
机构
[1] Tech Univ Dresden, Inst Theoret Comp Sci, D-01062 Dresden, Germany
[2] Tech Univ Dresden, Operating Syst Grp, D-01062 Dresden, Germany
基金
欧盟第七框架计划;
关键词
Probabilistic model checking; Measure-based quantitative analysis; Low-level operating system code; Test-and-test-and-set spinlock; Conditional long-run probabilities; Quantile-based queries; Symmetry reduction; PROBABILISTIC MODEL CHECKING; SYMMETRY REDUCTION; SYSTEMS;
D O I
10.1016/j.jcss.2014.06.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Functional correctness of low-level operating-system (OS) code is an indispensable requirement. However, many applications rely also on quantitative aspects such as speed, energy efficiency, resilience with regards to errors and other cost factors. We report on our experiences of applying probabilistic model-checking techniques for analysing the quantitative long-run behaviour of low-level OS-code. Our approach, illustrated in a case study analysing a simple test-and-test-and-set (TTS) spinlock protocol, combines measure-based simulation with probabilistic model-checking to obtain high-level models of the performance of realistic systems and to tune the models to predict future system behaviour. We report how we obtained a nearly perfect match of analytic results and measurements and how we tackled the state-explosion problem to obtain model-checking results for a large number of processes where measurements are no longer feasible. These results gave us valuable insights in the delicate interplay between lock load, average spinning times and other performance measures. (c) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:258 / 287
页数:30
相关论文
共 50 条
  • [1] PICKING THE CRYPTO LOCKS
    WAYNER, P
    BYTE, 1995, 20 (10): : 77 - &
  • [2] Recovering scalable spin locks
    Bohannon, P
    Lieuwen, D
    Silberschatz, A
    EIGHTH IEEE SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 1996, : 314 - 322
  • [3] The Key to Her Locks
    Wolff, Rachel
    ARTNEWS, 2010, 109 (02): : 76 - 77
  • [4] LOCKS - A KEY TO VIOLENCE
    RALOFF, J
    SCIENCE NEWS, 1983, 124 (08) : 122 - 125
  • [5] Scalable Range Locks for Scalable Address Spaces and Beyond
    Kogan, Alex
    Dice, Dave
    Issa, Shady
    PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
  • [6] Scalable Reader-Writer Locks
    Lev, Yossi
    Luchangco, Victor
    Olszewski, Marek
    SPAA'09: PROCEEDINGS OF THE TWENTY-FIRST ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2009, : 101 - 110
  • [7] The key that locks and unlocks the architecture
    Ruiz Cabrero, Gabriel
    REVISTA DE OCCIDENTE, 2024, (518) : 31 - 37
  • [8] PICKING METHODS MAY PROVIDE KEY TO LOWER COST WAREHOUSE PLANS
    GROSS, JG
    INDUSTRIAL ENGINEERING, 1981, 13 (06): : 50 - &
  • [9] DOES KEY FIT LOCKS OF PAST
    SMITH, PJ
    NATURE, 1976, 260 (5554) : 746 - 747
  • [10] Quantitative Analysis of Scalable NoSQL Databases
    Swaminathan, Surya Narayanan
    Elmasri, Ramez
    2016 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2016, 2016, : 323 - 326