Proceedings of the 27th ACM Symposium on Operating Systems Principles 2019
DOI: 10.1145/3341301.3359640
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of performance evolution of Linux's core operations

Abstract: This paper presents an analysis of how Linux's performance has evolved over the past seven years. Unlike recent works that focus on OS performance in terms of scalability or service of a particular workload, this study goes back to basics: the latency of core kernel operations (e.g., system calls, context switching, etc.). To our surprise, the study shows that the performance of many core operations has worsened or fluctuated significantly over the years. For example, the select system call is 100% slower than… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 12 publications
1
12
0
Order By: Relevance
“…A general kernel (lupine-general) that supports 20 applications in Section 3 does not sacrifice application performance. We note that, as a unikernel-like system with a single trust domain, Lupine does not require the use of many recent security enhancements that have been shown to incur significant slowdowns, oftentimes more than 100% [52]. We attribute much of Lupine's 20% (or greater) application performance improvement (when compared to baseline) to disabling these enhancements.…”
Section: Application Performancementioning
confidence: 95%
“…A general kernel (lupine-general) that supports 20 applications in Section 3 does not sacrifice application performance. We note that, as a unikernel-like system with a single trust domain, Lupine does not require the use of many recent security enhancements that have been shown to incur significant slowdowns, oftentimes more than 100% [52]. We attribute much of Lupine's 20% (or greater) application performance improvement (when compared to baseline) to disabling these enhancements.…”
Section: Application Performancementioning
confidence: 95%
“…In this paper, this method is followed. Previous standard filesystem benchmarks are using Intel lkp-tests suite [5] and previous papers [24,31,42]: (1) filebench [21], (2) lmbench (2.5 and [22] (3) FS-Mark [29] and (4) unix-bench [39]. lmbench3 [22] adds scalability test to lm-bench2.5 [22], however it misses chmod/rename etc., which are essential for security performance tests.…”
Section: Related Workmentioning
confidence: 99%
“…According to the related work [145], the main reason of performance decline caused by the CPU vulnerability patches is the flushing of buffers after context-switching. Specifically, the flushing occurs in order to clean stale data from buffers to avoid data leakage through sidechannel attacks.…”
Section: Cpu Vulnerability Patches and Gcc Safeguardsmentioning
confidence: 99%
“…The Meltdown vulnerability patch is flushing the Translation Lookaside Buffers (TLBs) for each switching between the kernel-and user-space. Note that flushing TLBs, increases the number of TLB load misses [145,28]. This, in turn, leads to a severe performance degradation due to expensive memory accesses, which result in an additional energy and run-time performance overhead.…”
Section: Cpu Vulnerability Patches and Gcc Safeguardsmentioning
confidence: 99%
See 1 more Smart Citation