2011
DOI: 10.1145/2007477.1952695
|View full text |Cite
|
Sign up to set email alerts
|

Fast restore of checkpointed memory using working set estimation

Abstract: In order to make save and restore features practical, saved virtual machines (VMs) must be able to quickly restore to normal operation. Unfortunately, fetching a saved memory image from persistent storage can be slow, especially as VMs grow in memory size. One possible solution for reducing this time is to lazily restore memory after the VM starts. However, accesses to unrestored memory after the VM starts can degrade performance, sometimes rendering the VM unusable for even longer. Existing performance metric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Snowflock extends the idea of VM cloning to instantiating VMs across entire clusters, relying on lazy guest memory loading to avoid large transfers of guest memory contents across network [38]. To minimize the time spent in serving the series of lazy page faults during guest memory loading, the researchers explore a variety of working set prediction and prefetching techniques [35,[66][67][68]. These techniques rely on profiling of the memory accesses after the moment a checkpoint was taken and inspecting the locality characteristics of the guest OS' virtual address space.…”
Section: Virtual Machine Snapshotsmentioning
confidence: 99%
“…Snowflock extends the idea of VM cloning to instantiating VMs across entire clusters, relying on lazy guest memory loading to avoid large transfers of guest memory contents across network [38]. To minimize the time spent in serving the series of lazy page faults during guest memory loading, the researchers explore a variety of working set prediction and prefetching techniques [35,[66][67][68]. These techniques rely on profiling of the memory accesses after the moment a checkpoint was taken and inspecting the locality characteristics of the guest OS' virtual address space.…”
Section: Virtual Machine Snapshotsmentioning
confidence: 99%
“…Some perform prefetching by predicting a program's future accesses based on earlier memory accesses, often from within the same execution [4,17,22,42]. Others perform targeted prefetching based on measurements of a program's working sets from prior executions [47,52]. Some prior works have even used machine learning to predict future memory accesses based on prior ones [21,26,41].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, we use our staged approach ( §6) to find a good approximation. Some systems use observations of past memory accesses or past working sets (e.g., from prior invocations of a program) to perform targeted prefetching [33,35,56,77,92] and approx-imate Belady's algorithm (MIN) [72]. SC's obliviousness and our memory programming approach allow MAGE to compute the memory access pattern without first running the program, and then apply these techniques using the access pattern itself.…”
Section: Related Workmentioning
confidence: 99%