Establishing a base of trust with performance counters for enterprise workloads

Andrzej Nowak, Ahmad Yasin, Avi Mendelson, Willy Zwaenepoel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Understanding the performance of large, complex enterprise-class applications is an important, yet nontrivial task. Methods using hardware performance counters, such as profiling through event-based sampling, are often favored over instrumentation for analyzing such large codes, but rarely provide good accuracy at the instruction level. This work evaluates the accuracy of multiple eventbased sampling techniques and quantifies the impact of a range of improvements suggested in recent years. The evaluation is performed on instances of three modern CPU architectures, using designated kernels and full applications. We conclude that precisely distributed events considerably improve accuracy, with further improvements possible when using Last Branch Records. We also present practical recommendations for hardware architects, tool developers and performance engineers, aimed at improving the quality of results.

Original languageEnglish
Title of host publicationProceedings of the 2015 USENIX Annual Technical Conference, USENIX ATC 2015
PublisherUSENIX Association
Pages541-548
Number of pages8
ISBN (Electronic)9781931971225
StatePublished - 2015
Externally publishedYes
Event2015 USENIX Annual Technical Conference, USENIX ATC 2015 - Santa Clara, United States
Duration: 8 Jul 201510 Jul 2015

Publication series

NameProceedings of the 2015 USENIX Annual Technical Conference, USENIX ATC 2015

Conference

Conference2015 USENIX Annual Technical Conference, USENIX ATC 2015
Country/TerritoryUnited States
CitySanta Clara
Period8/07/1510/07/15

Bibliographical note

Publisher Copyright:
© 2015 USENIX Annual Technical Conference.

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Establishing a base of trust with performance counters for enterprise workloads'. Together they form a unique fingerprint.

Cite this