hijack taking control of cots systems for real time user
play

Hijack: Taking Control of COTS Systems for Real-Time User-Level - PowerPoint PPT Presentation

Hijack: Taking Control of COTS Systems for Real-Time User-Level Services Gabriel Parmer and Richard West Computer Science Deparment Boston University Boston, MA 02215 { gabep1, richwest } @cs.bu.edu April 5, 2007 COTS in RT/Embedded Systems


  1. Hijack: Taking Control of COTS Systems for Real-Time User-Level Services Gabriel Parmer and Richard West Computer Science Deparment Boston University Boston, MA 02215 { gabep1, richwest } @cs.bu.edu April 5, 2007

  2. COTS in RT/Embedded Systems Commodity Off The Shelf (COTS) general purpose systems provide many advantages for RT/Embedded systems Tested and widely deployed code-base Established development tools/environments Developer familiarity → faster time to market/smaller development costs Parmer, West, BU CS Hijack 2/33

  3. COTS in RT/Embedded Systems (2) General purpose systems have a number of disadvantages General-purpose policies are often insufficient/awkward for needs of RT applications QoS, predictability, policies absent for satisfying app-specific requirements, i.e. EDF Semantic gap between the requirements of the application and the functionality/guarantees of the system Parmer, West, BU CS Hijack 3/33

  4. Shrinking the Semantic Gap Domain-specific OSs created with a focus on one class of applications (RTOSs) Extensible systems allow the modification of system policies in an application-specific manner Generally either not COTS, or not isolation preserving Developing extensions requires skill/experience Goal : provide app-specific policies using a COTS base in a safe and predictable manner Parmer, West, BU CS Hijack 4/33

  5. Hijacking your COTS system Efficient interposition on service requests from specific applications allows the definition at user-level of application-specific policy Parmer, West, BU CS Hijack 5/33

  6. Hijack Mechanism Hijack execution environment Hijack module receives Guest Guest specific events . . . system calls Background process page faults Executive Schedule / dispatch possibly device Syscall interception interrupts Unintercepted syscalls IDT Vector guest service Host Kernel requests to executive Kernel module Interrupts Hardware (I/O devices) executive controls execution context of guests create/switch address spaces access guest registers event-triggered executive scheduler Parmer, West, BU CS Hijack 6/33

  7. Hijack Mechanism (2) Hijack execution environment Guest Guest executive isolated at . . . user-level Background process Executive executive harnesses Schedule / dispatch base system Syscall interception functionality where Unintercepted syscalls IDT appropriate Host Kernel Kernel module Interrupts Hardware (I/O devices) Does not require changes to the COTS system source-code (no kernel recompilation) One (2000 LOC) hijack module enables flexibility in the definition of user-level app-specific services Parmer, West, BU CS Hijack 7/33

  8. Case Study: Guest System Call Interposition 1 guest service request Guest Guest intercepted by Hijack module 2 executive region mapped into syscall . . . current guest address space saved guest state 3 guest registers saved into Executive executive region 4 executive registers restored executive state (to be restored) Host Kernel 5 executive executed Kernel module executive not present while guest is executing – mapped in dynamically executive isolated from guests Parmer, West, BU CS Hijack 8/33

  9. Case Study: Guest System Call Return 1 executive returns to kernel module 2 executive registers saved in Guest Guest module . . . 3 guest registers restored from executive region saved guest state (to be restored) 4 executive region unmapped Executive from guest address space saved 5 executive ’s mappings evicted executive state Host Kernel from TLB Kernel module 6 guest executed Can use global bits to avoid flushing guest pages from TLB set all guest pages as global Parmer, West, BU CS Hijack 9/33

  10. Experimental Setup All experiments conducted on a 2.4 GHz Pentium 4 processor on Linux 2.6.13 with a clock tick every 10 milliseconds Parmer, West, BU CS Hijack 10/33

  11. nanosleep Experiments A goal of Hijack is to offer the ability to enhance default system functionality in an application-specific manner nanosleep : yield for at least a specific number of nanoseconds used in multimedia apps such as mplayer Wake up time variability/unpredictability clock granularity COTS CPU scheduler Parmer, West, BU CS Hijack 11/33

  12. nanosleep Experiments (2) Hijack-provided extensions: 1 Hijack : Executive can give scheduler preference to tasks waking from nanosleep 2 Hijack Extended : Executive can busy wait for periods less than a clock tick Parmer, West, BU CS Hijack 12/33

  13. nanosleep Experiments (3) 100000 Hijack Linux Task Hijack Extended 10000 Jitter (Tens of Microseconds) 1000 100 10 1 0 1 2 3 4 Number of Background CPU Bound Tasks Parmer, West, BU CS Hijack 13/33

  14. � QoS for Packet Stream Delivery Scheduling of Tasks dependent on I/O availability with QoS constraints: models traffic shapers, QoS aware stream processing, etc. . . Four streams of 42,000 16 byte packets/second from separate hosts over GigE Single host with four tasks, each receiving a stream QoS constraints: Task 0 : 35,000 p/s higher QoS Task 1 : 20,000 p/s lower QoS Task 2 : 10,000 p/s Task 3 : best effort Start tasks every 5 seconds from Task 3 to Task 0 Parmer, West, BU CS Hijack 14/33

  15. QoS for Packet Stream Delivery (2) Three scenarios: 1 Linux, tasks with same priority 2 Linux, tasks with different priority 3 Hijack, Executive using policy similar to proportional-share Tasks assigned tokens proportional to QoS select used to probe for I/O activity Task with tokens and available I/O executed Tokens refreshed every given period When guest make system call to read data read data into guest buffer until no tokens, or no data Parmer, West, BU CS Hijack 15/33

  16. Packet Delivery QoS Results: Linux Same Priority 45000 Number of packets delivered to a task 40000 35000 30000 25000 20000 15000 10000 Task 0 Task 1 5000 Task 2 Task 3 0 0 5 10 15 20 25 30 Time (seconds) Parmer, West, BU CS Hijack 16/33

  17. Packet Delivery QoS Results: Linux Increasing Priority 45000 Number of packets delivered to a task 40000 35000 30000 25000 20000 15000 10000 Task 0 Task 1 5000 Task 2 Task 3 0 0 5 10 15 20 25 30 Time (seconds) Parmer, West, BU CS Hijack 17/33

  18. Packet Delivery QoS Results: Hijacked Linux 45000 Number of packets delivered to a task 40000 35000 30000 25000 20000 15000 10000 Task 0 Task 1 5000 Task 2 Task 3 0 0 5 10 15 20 25 30 Time (seconds) Parmer, West, BU CS Hijack 18/33

  19. Related Work Related work includes: RTLinux Separate system into two functional domains for Hard-RT predictability Focus is on interrupt latency, not app-specific resource management policies VMs Interface provided to guest OSs ( executives ) is identical to the hardware itself Focus is on HW virtualization, not on providing app-specific services Parmer, West, BU CS Hijack 19/33

  20. Conclusions Hijack enables app-specific, user-level RT policies using a general purpose computing base Use interposition on system service requests to redefine policies executive defined at user-level can leverage underlying system functionality where appropriate Demonstrated that complex policies can be introduced A useful approach towards shrinking the semantic gap Parmer, West, BU CS Hijack 20/33

  21. Limitations global bit trick not ideal for all workloads can revert to simply flushing whole TLB or use other techniques Certain aspects of the system that cannot be hijacked using these techniques If utilize functionality in base system, generally cannot Hijack that functionality COTS system interrupt handling behavior (prototype limitation) Parmer, West, BU CS Hijack 22/33

  22. Using Global-bit Trick to Avoid TLB Flushes Study the effect of TLB flushes on Executive ↔ Guest communication Vary working set size (WSS) of guest by 350 touching data/instruction Hijack Guest -> Executive RPC Linux Pipe System Call 300 pages then making system 250 call # iTLB Misses 200 instruction-TLB has 128 150 entries 100 50 data-TLB has 64 entries 0 0 50 100 150 200 250 300 Global-bit trick avoids Instruction WSS TLB flush, thus avoiding misses Parmer, West, BU CS Hijack 23/33

  23. Using the Global-bit Trick to Avoid TLB Flushes (2) 35000 30000 Hijack Guest -> Executive RPC Hijack Guest -> Executive RPC Linux Pipe Linux Pipe 30000 25000 25000 20000 20000 Cycles Cycles 15000 15000 10000 10000 5000 5000 0 0 0 50 100 150 200 250 300 0 50 100 150 200 250 300 Data WSS Instruction WSS Parmer, West, BU CS Hijack 24/33

  24. Asynchronous Event Notification Experiments Timer interrupts in Average Signal Interarrival Time (milliseconds) 30.0 Executive synthesized Hijack Linux Task 25.0 with signals 20.0 Predictable notification Executive can define 15.0 customizable policy for 10.0 scheduling beyond 5.0 what is present in the 0.0 COTS system (EDF, 0 1 2 3 4 Number of Background CPU Bound Tasks PFAIR, DWCS, etc. . . ) Parmer, West, BU CS Hijack 25/33

  25. Hijack Execution Environment Address Space sigaltstack read-writable 4KB guard page executive stack executive 0x3FC00000 4KB guard page read-only signal_handler Parmer, West, BU CS Hijack 26/33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend