reverse debugging of kernel failures
play

Reverse Debugging of Kernel Failures in Deployed Systems Xinyang - PowerPoint PPT Presentation

Reverse Debugging of Kernel Failures in Deployed Systems Xinyang Ge, Ben Niu and Weidong Cui Microsoft Research USENIX Annual Technical Conference, 2020 What happened before the crash? REPT: Reverse Execution with Processor Trace REPT:


  1. Reverse Debugging of Kernel Failures in Deployed Systems Xinyang Ge, Ben Niu and Weidong Cui Microsoft Research USENIX Annual Technical Conference, 2020

  2. What happened before the crash?

  3. REPT: Reverse Execution with Processor Trace

  4. REPT: Reverse Execution with Processor Trace • A practical reverse debugging solution for user- mode failures [OSDI’18] • Online hardware tracing (e.g., Intel Processor Trace) • Log the control flow with timestamps • Low runtime overhead (1-5%) • No data! • Offline binary analysis • Recovers data flow from the control flow How to make REPT support the kernel?

  5. How REPT works? USER KERNEL

  6. How REPT works? USER KERNEL

  7. How REPT works? USER KERNEL

  8. How REPT works? USER KERNEL

  9. How REPT works? rax=?,rbx=? add rax,rbx rax=3,rbx=1 USER KERNEL

  10. How REPT works? rax=2 ,rbx=1 add rax,rbx rax=3,rbx=1 USER KERNEL

  11. Can we simply inverse the tracing?

  12. Can we simply inverse the tracing? • There are too many processes/threads on a system • High memory overhead for tracing • Hardware events must be emulated in addition to CPU instructions • Interrupts • Exceptions • System calls

  13. Here comes Kernel REPT…

  14. USER KERNEL context switch … is irreversible, and we log it in software.

  15. USER KERNEL syscalls interrupts/ exceptions

  16. Kernel Stack Interrupt Descriptor Table SS INTERRUPT GATE 0 RSP INTERRUPT GATE 1 RFLAGS INTERRUPT GATE 2 CS RIP Error Code Stack Pointer INTERRUPT GATE N USER KERNEL syscalls interrupts/ exceptions Different events can have different architectural effects

  17. That’s it?

  18. Automated Analyses • A common bug pattern: missing undo operations • EnterCriticalRegion vs LeaveCriticalRegion • Root-Cause Analysis • Scan the kernel execution trace to find missing undo operations • Proactive Bug Detector • Sanitize the kernel execution based on specified invariants • 17 new bugs found and fixed!

  19. Demo

  20. Conclusion • Debugging production kernel failures is hard • REPT now supports the reverse debugging of the kernel • Per-core control flow tracing in hardware • Context switch logging in software • Recovers data flow via CPU instruction and hardware event emulation • REPT enables automated analysis beyond reverse debugging • Root-cause analysis • Sanitizing analysis

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend