Inspection of I/O operations from system call traces using Directly-Follows-Graph
2024 (English)In: SC24-W: workshops of the international conference for high performance computing, networking, storage and analysis, IEEE, 2024, p. 1562-1575Conference paper, Published paper (Refereed)
Abstract [en]
We aim to identify the differences in Input/Output (I/O) behavior between multiple user programs through the inspection of system calls (i.e., requests made to the operating system). A typical program issues a large number of I/O requests to the operating system, thereby making the process of inspection challenging. In this paper, we address this challenge by presenting a methodology to synthesize I/O system call traces into a specific type of directed graph, known as the Directly-Follows-Graph (DFG). Based on the DFG, we present a technique to compare the traces from multiple programs or different configurations of the same program, such that it is possible to identify the differences in the I/O behavior. We apply our methodology to the IOR benchmark, and compare the contentions for file accesses when the benchmark is run with different options for file output and software interface.
Place, publisher, year, edition, pages
IEEE, 2024. p. 1562-1575
Keywords [en]
Directly-Follows Graph, High-Performance Computing, Input/Output, Performance Analysis, Process Mining, strace
National Category
Computer Sciences Computer Systems
Identifiers
URN: urn:nbn:se:umu:diva-235656DOI: 10.1109/SCW63240.2024.00196Scopus ID: 2-s2.0-85217181573ISBN: 9798350355543 (electronic)ISBN: 9798350355550 (print)OAI: oai:DiVA.org:umu-235656DiVA, id: diva2:1940474
Conference
2024 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, SC Workshops 2024, Atlanta, USA, November 17-22, 2024
2025-02-262025-02-262025-02-26Bibliographically approved