ATUM: a new technique for capturing address traces using microcode
ISCA '86 Proceedings of the 13th annual international symposium on Computer architecture
A microcode-based environment for noninvasive performance analysis
MICRO 19 Proceedings of the 19th annual workshop on Microprogramming
SPAM: a microcode based tool for tracing operating system events
MICRO 20 Proceedings of the 20th annual workshop on Microprogramming
A microcoded tool to sample the software instruction address
MICRO 12 Proceedings of the 12th annual workshop on Microprogramming
Guest Editor's Introduction: Experimental Research in Computer Architecture
Computer - Special issue on experimental research in computer architecture
Flow Control for Limited Buffer Multicast
IEEE Transactions on Software Engineering
Fine grained kernel logging with KLogger: experience and insights
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Hi-index | 0.00 |
We have developed a tool based on microcode modifications to a VAX 8600 which allows a wide variety of operating system measurements to be taken with minimal perturbation and without the need to modify any operating system software. A trace of interrupts, exceptions, system calls and context switches is generated as a side-effect to normal execution. In this paper we describe the tool we have developed and present some results we have gathered under both UNIX 4.3 BSD and VAX/VMS V4.5. We compare the process fork behavior of two different command shells under UNIX, look at context switch rates for interactive and batch workloads and generate a histogram for network interrupt service time.