Lottery scheduler for the Linux kernel
نویسندگان
چکیده
منابع مشابه
Chip Multi Processing aware Linux Kernel Scheduler
Recent advances in semiconductor manufacturing and engineering technologies have led to the inclusion of more than one CPU core in a single physical processor package. This, popularly known as Chip Multi Processing (CMP), allows multiple instruction streams to execute at the same time. CMP is in addition to today’s Simultaneous Multi Threading (SMT) capabilities, like Intel R © Hyper-Threading ...
متن کاملEnhancing Linux Scheduler Scalability
This paper examines the scalability of the Linux 2.4.x scheduler as the load and number of CPUs increases. We show that the current scheduler design involving a single runqueue and lock can suffer from lock contention problems which limits its scalability. We present alternate designs using multiple runqueues and priority levels that can reduce lock contention while maintaining the same functio...
متن کاملLinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, this is no easy task, particularly for someone new to Linux kernel development. Virtual machines and hardware simulators can help make the task easier; however, they introduce their own problems. Motivated by these obs...
متن کاملLinux Scheduler Performance for Beowulf Compute Nodes
In the last decade, the use of the Beowulf Cluster concept for High Performance Computing and Cloud Computing has exploded. In addition, the Linux operating system used by many of these computing platforms has also greatly advanced. Understanding the effects of the underlying kernel scheduler on the computational performance of compute nodes is one of the main concerns in customizing a Linux op...
متن کاملHijacking the Linux Kernel
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DYNA
سال: 2015
ISSN: 2346-2183,0012-7353
DOI: 10.15446/dyna.v82n189.43068