首页 > 最新文献

Proceedings of the 19th Workshop on Hot Topics in Operating Systems最新文献

英文 中文
HotGPT: How to Make Software Documentation More Useful with a Large Language Model? hotpt:如何在大型语言模型下使软件文档更有用?
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595910
Yi-An Su, Chengcheng Wan, Utsav Sethi, Shan Lu, M. Musuvathi, Suman Nath
It is well known that valuable information is contained in the natural language components of software systems, like comments and manual, and such information can be used to improve system performance and reliability. Past research has attempted to extract such information through task-specific machine learning models and tool chains. Here, we investigate a general, one-model-fit-all solution through a state-of-the-art large language model (e.g., the GPT series). Our investigation covers three representative tasks: extracting locking rules from comments, synthesizing exception predicates from comments, and identifying performance-related configurations; it reveals challenges and opportunities in applying large language models to system maintenance tasks.
众所周知,有价值的信息包含在软件系统的自然语言组件中,比如注释和手册,这些信息可以用来提高系统的性能和可靠性。过去的研究试图通过特定任务的机器学习模型和工具链来提取这些信息。在这里,我们通过最先进的大型语言模型(例如,GPT系列)研究一个通用的、一个模型适合所有人的解决方案。我们的调查涵盖了三个代表性的任务:从注释中提取锁定规则,从注释中合成异常谓词,以及识别与性能相关的配置;它揭示了将大型语言模型应用于系统维护任务的挑战和机遇。
{"title":"HotGPT: How to Make Software Documentation More Useful with a Large Language Model?","authors":"Yi-An Su, Chengcheng Wan, Utsav Sethi, Shan Lu, M. Musuvathi, Suman Nath","doi":"10.1145/3593856.3595910","DOIUrl":"https://doi.org/10.1145/3593856.3595910","url":null,"abstract":"It is well known that valuable information is contained in the natural language components of software systems, like comments and manual, and such information can be used to improve system performance and reliability. Past research has attempted to extract such information through task-specific machine learning models and tool chains. Here, we investigate a general, one-model-fit-all solution through a state-of-the-art large language model (e.g., the GPT series). Our investigation covers three representative tasks: extracting locking rules from comments, synthesizing exception predicates from comments, and identifying performance-related configurations; it reveals challenges and opportunities in applying large language models to system maintenance tasks.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116764368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Why write address translation OS code yourself when you can synthesize it? 既然可以合成地址转换操作系统代码,为什么还要自己编写它呢?
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595895
Reto Achermann, Ilias Karimalis, M. Seltzer
Address translation hardware is at the cornerstone of modern computer systems. It provides a wide range of security-relevant features and abstractions such as memory partitioning, address space isolation, and virtual memory. Hardware designers have developed different memory protection schemes with varying features and means of configuration. Correct configuration is mission-critical for a system's integrity. It is the operating system's task to safely and securely manage and configure the memory hardware of a compute platform - a task that operating systems developers must repeat for every new memory hardware unit. We present a new approach that frees the OS programmer from writing system code to set up and configure translation hardware. We leverage software synthesis to automatically generate correct systems code that interfaces with translation hardware to create or modify memory mappings from a high-level, behavioral specification. By synthesizing correct, low-level systems code from a high-level specification we make it easier to port operating systems and facilitate incorporating accelerators into existing systems. Moreover, we believe that our system can generate actual and simulated hardware components enabling research in new memory translation and protection schemes.
地址转换硬件是现代计算机系统的基石。它提供了广泛的与安全相关的特性和抽象,如内存分区、地址空间隔离和虚拟内存。硬件设计人员开发了具有不同功能和配置手段的不同内存保护方案。正确的配置对于系统的完整性至关重要。安全可靠地管理和配置计算平台的内存硬件是操作系统的任务——操作系统开发人员必须为每个新的内存硬件单元重复这一任务。我们提出了一种新的方法,将操作系统程序员从编写系统代码中解放出来,以设置和配置翻译硬件。我们利用软件合成来自动生成正确的系统代码,这些代码与翻译硬件接口,以创建或修改来自高级行为规范的内存映射。通过从高级规范中合成正确的低级系统代码,我们可以更容易地移植操作系统,并促进将加速器合并到现有系统中。此外,我们相信我们的系统可以生成实际和模拟的硬件组件,从而可以研究新的内存转换和保护方案。
{"title":"Why write address translation OS code yourself when you can synthesize it?","authors":"Reto Achermann, Ilias Karimalis, M. Seltzer","doi":"10.1145/3593856.3595895","DOIUrl":"https://doi.org/10.1145/3593856.3595895","url":null,"abstract":"Address translation hardware is at the cornerstone of modern computer systems. It provides a wide range of security-relevant features and abstractions such as memory partitioning, address space isolation, and virtual memory. Hardware designers have developed different memory protection schemes with varying features and means of configuration. Correct configuration is mission-critical for a system's integrity. It is the operating system's task to safely and securely manage and configure the memory hardware of a compute platform - a task that operating systems developers must repeat for every new memory hardware unit. We present a new approach that frees the OS programmer from writing system code to set up and configure translation hardware. We leverage software synthesis to automatically generate correct systems code that interfaces with translation hardware to create or modify memory mappings from a high-level, behavioral specification. By synthesizing correct, low-level systems code from a high-level specification we make it easier to port operating systems and facilitate incorporating accelerators into existing systems. Moreover, we believe that our system can generate actual and simulated hardware components enabling research in new memory translation and protection schemes.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Creating Trust by Abolishing Hierarchies 通过废除等级制度创造信任
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595900
Charly Castes, Adrien Ghosn, Neelu S. Kalani, Yuchen Qian, Marios Kogias, Mathias Payer, Edouard Bugnion
Software is going through a trust crisis. Privileged code is no longer trusted and processes insufficiently protect user code from unverified libraries. While usually treated separately, confidential computing and program compartmentalization are both symptoms of the same problem, deeply rooted in hierarchical commodity systems: privileged software's monopoly over isolation. This paper proposes a separation of powers: to decouple trust and isolation from privilege hierarchies. It introduces an isolation monitor, which delivers verifiable isolation, confidentiality, and integrity to all software, independent of existing system abstractions and privilege hierarchies. Tyche, our prototype isolation monitor, runs on commodity hardware without relying on complex and emerging hardware security extensions. It enables any software component to create, compose, and nest isolation abstractions, including user and kernel sandboxes, enclaves, as well as confidential virtual machines.
软件正在经历一场信任危机。特权代码不再受信任,并且进程无法充分保护用户代码免受未经验证的库的攻击。尽管保密计算和程序划分通常是分开处理的,但它们都是同一个问题的症状,深深植根于等级商品系统:特权软件的垄断高于隔离。本文提出了一种权力分离的方法:将信任和隔离从特权层次中分离出来。它引入了一个隔离监控器,它向所有软件提供可验证的隔离、机密性和完整性,独立于现有的系统抽象和特权层次结构。我们的原型隔离监视器Tyche在商用硬件上运行,而不依赖于复杂和新兴的硬件安全扩展。它允许任何软件组件创建、组合和嵌套隔离抽象,包括用户和内核沙箱、enclave以及机密虚拟机。
{"title":"Creating Trust by Abolishing Hierarchies","authors":"Charly Castes, Adrien Ghosn, Neelu S. Kalani, Yuchen Qian, Marios Kogias, Mathias Payer, Edouard Bugnion","doi":"10.1145/3593856.3595900","DOIUrl":"https://doi.org/10.1145/3593856.3595900","url":null,"abstract":"Software is going through a trust crisis. Privileged code is no longer trusted and processes insufficiently protect user code from unverified libraries. While usually treated separately, confidential computing and program compartmentalization are both symptoms of the same problem, deeply rooted in hierarchical commodity systems: privileged software's monopoly over isolation. This paper proposes a separation of powers: to decouple trust and isolation from privilege hierarchies. It introduces an isolation monitor, which delivers verifiable isolation, confidentiality, and integrity to all software, independent of existing system abstractions and privilege hierarchies. Tyche, our prototype isolation monitor, runs on commodity hardware without relying on complex and emerging hardware security extensions. It enables any software component to create, compose, and nest isolation abstractions, including user and kernel sandboxes, enclaves, as well as confidential virtual machines.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Degrading Data to Save the Planet 降低数据质量,拯救地球
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595896
A. Zuck, Donald Porter, Dan Tsafrir
Storage capacity demand is projected to grow exponentially in the coming decade and so will its contribution to the overall carbon footprint of computing devices. In recent years, cloud providers and device vendors have substantially reduced their carbon impact through improved power consumption and product distribution. However, by 2030, the manufacturing of flash-based storage devices will account for 1.7% of carbon emissions in the world. Therefore, reducing production-related carbon emissions of storage is key to sustainability in computing devices. We present Sustainability-Oriented Storage (SOS), a new host-device co-design for personal storage devices, which opportunistically improves storage sustainability by: (1) targeting widely-produced flash-based personal storage devices; (2) reducing hardware production through optimizing bit density in existing materials, up to 50%; and (3) exploiting an underutilized gap between the effective lifespan of personal devices and longer lifespan of their underlying flash. SOS automatically stores low-priority files, occupying most personal storage capacities, on high-density flash memories, currently designated for nearline storage. To avoid data loss, low-priority files are allowed to slightly degrade in quality over time. Switching to high-density memories, which maximize production material utilization, reduces the overall carbon footprint of personal storage devices.
存储容量需求预计将在未来十年呈指数级增长,其对计算设备总体碳足迹的贡献也将如此。近年来,云提供商和设备供应商通过改进功耗和产品分销,大大减少了碳影响。然而,到2030年,基于闪存的存储设备的制造将占世界碳排放量的1.7%。因此,减少与生产相关的存储碳排放是计算设备可持续性的关键。我们提出了面向可持续性的存储(SOS),这是一种针对个人存储设备的新型主机-设备协同设计,它通过以下方式机会性地提高了存储可持续性:(1)针对广泛生产的基于闪存的个人存储设备;(2)通过优化现有材料的钻头密度,减少硬件生产,最高可达50%;(3)利用个人设备的有效寿命和其底层闪存的更长的寿命之间的未充分利用的差距。SOS自动存储低优先级文件,占用大部分个人存储容量,高密度闪存,目前指定为近线存储。为了避免数据丢失,允许低优先级文件的质量随着时间的推移略有下降。切换到高密度存储器,可以最大限度地利用生产材料,减少个人存储设备的总体碳足迹。
{"title":"Degrading Data to Save the Planet","authors":"A. Zuck, Donald Porter, Dan Tsafrir","doi":"10.1145/3593856.3595896","DOIUrl":"https://doi.org/10.1145/3593856.3595896","url":null,"abstract":"Storage capacity demand is projected to grow exponentially in the coming decade and so will its contribution to the overall carbon footprint of computing devices. In recent years, cloud providers and device vendors have substantially reduced their carbon impact through improved power consumption and product distribution. However, by 2030, the manufacturing of flash-based storage devices will account for 1.7% of carbon emissions in the world. Therefore, reducing production-related carbon emissions of storage is key to sustainability in computing devices. We present Sustainability-Oriented Storage (SOS), a new host-device co-design for personal storage devices, which opportunistically improves storage sustainability by: (1) targeting widely-produced flash-based personal storage devices; (2) reducing hardware production through optimizing bit density in existing materials, up to 50%; and (3) exploiting an underutilized gap between the effective lifespan of personal devices and longer lifespan of their underlying flash. SOS automatically stores low-priority files, occupying most personal storage capacities, on high-density flash memories, currently designated for nearline storage. To avoid data loss, low-priority files are allowed to slightly degrade in quality over time. Switching to high-density memories, which maximize production material utilization, reduces the overall carbon footprint of personal storage devices.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards (Really) Safe and Fast Confidential I/O 迈向(真正)安全和快速的机密I/O
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595913
Hugo Lefeuvre, D. Chisnall, Marios Kogias, Pierre Olivier
Confidential cloud computing enables cloud tenants to distrust their service provider. Achieving confidential computing solutions that provide concrete security guarantees requires not only strong mechanisms, but also carefully designed software interfaces. In this paper, we make the observation that confidential I/O interfaces, caught in the tug-of-war between performance and security, fail to address both at a time when confronted to interface vulnerabilities and observability by the untrusted host. We discuss the problem of safe I/O interfaces in confidential computing, its implications and challenges, and devise research paths to achieve confidential I/O interfaces that are both safe and fast.
机密云计算使云租户不信任其服务提供商。实现提供具体安全保证的机密计算解决方案不仅需要强大的机制,还需要精心设计的软件接口。在本文中,我们观察到机密I/O接口,陷入性能和安全性之间的拉锯战,在面对接口漏洞和不受信任主机的可观察性时,无法同时解决这两个问题。我们讨论了机密计算中的安全I/O接口问题、其意义和挑战,并设计了实现既安全又快速的机密I/O接口的研究路径。
{"title":"Towards (Really) Safe and Fast Confidential I/O","authors":"Hugo Lefeuvre, D. Chisnall, Marios Kogias, Pierre Olivier","doi":"10.1145/3593856.3595913","DOIUrl":"https://doi.org/10.1145/3593856.3595913","url":null,"abstract":"Confidential cloud computing enables cloud tenants to distrust their service provider. Achieving confidential computing solutions that provide concrete security guarantees requires not only strong mechanisms, but also carefully designed software interfaces. In this paper, we make the observation that confidential I/O interfaces, caught in the tug-of-war between performance and security, fail to address both at a time when confronted to interface vulnerabilities and observability by the untrusted host. We discuss the problem of safe I/O interfaces in confidential computing, its implications and challenges, and devise research paths to achieve confidential I/O interfaces that are both safe and fast.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPU-free Computing: A Vision with a Blueprint 无cpu计算:带蓝图的愿景
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595906
A. Trivedi, Marco Spaziani Brunella
Since the inception of computing, we have been reliant on CPU-powered architectures. However, today this reliance is challenged by manufacturing limitations (CMOS scaling), performance expectations (stalled clocks, Turing tax), and security concerns (microarchitectural attacks). To re-imagine our computing architecture, in this work, we take a more radical, but pragmatic approach and propose to eliminate the CPU with its design baggage from data center computing. We integrate three primary pillars of computing, i.e., networking, storage, and computing, into a single, self-hosting, unified CPU-free Data Processing Unit (DPU) called Hyperion. The elimination of the CPU from computing necessitates re-thinking our computing, networking, and storage abstractions, and tackle the associated challenges which we sketch in this paper. We share the blueprint of our work-in-progress, Hyperion's hardware and software stack, and seek feedback.
自从计算诞生以来,我们一直依赖于cpu驱动的架构。然而,今天这种依赖受到了制造限制(CMOS缩放)、性能期望(时钟停滞、图灵税)和安全问题(微架构攻击)的挑战。为了重新想象我们的计算架构,在这项工作中,我们采取了一种更激进但更实用的方法,并建议从数据中心计算中消除CPU及其设计包袱。我们将计算的三个主要支柱,即网络、存储和计算,集成到一个名为Hyperion的、自托管的、统一的无cpu数据处理单元(DPU)中。从计算中消除CPU需要重新思考我们的计算、网络和存储抽象,并解决我们在本文中概述的相关挑战。我们分享我们正在进行的工作蓝图,Hyperion的硬件和软件堆栈,并寻求反馈。
{"title":"CPU-free Computing: A Vision with a Blueprint","authors":"A. Trivedi, Marco Spaziani Brunella","doi":"10.1145/3593856.3595906","DOIUrl":"https://doi.org/10.1145/3593856.3595906","url":null,"abstract":"Since the inception of computing, we have been reliant on CPU-powered architectures. However, today this reliance is challenged by manufacturing limitations (CMOS scaling), performance expectations (stalled clocks, Turing tax), and security concerns (microarchitectural attacks). To re-imagine our computing architecture, in this work, we take a more radical, but pragmatic approach and propose to eliminate the CPU with its design baggage from data center computing. We integrate three primary pillars of computing, i.e., networking, storage, and computing, into a single, self-hosting, unified CPU-free Data Processing Unit (DPU) called Hyperion. The elimination of the CPU from computing necessitates re-thinking our computing, networking, and storage abstractions, and tackle the associated challenges which we sketch in this paper. We share the blueprint of our work-in-progress, Hyperion's hardware and software stack, and seek feedback.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing True Utility Computing with Quicksand 用流沙释放真正的效用计算
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595893
Zhenyuan Ruan, Shihang Li, Kaiyan Fan, M. Aguilera, A. Belay, S. Park, Malte Schwarzkopf
Today's clouds are inefficient: their utilization of resources like CPUs, GPUs, memory, and storage is low. This inefficiency occurs because applications consume resources at variable rates and ratios, while clouds offer resources at fixed rates and ratios. This mismatch of offering and consumption styles prevents fully realizing the utility computing vision. We advocate for fungible applications, that is, applications that can distribute, scale, and migrate their consumption of different resources independently while fitting their availability across different servers (e.g., memory at one server, CPU at another). Our goal is to make use of resources even if they are transiently available on a server for only a few milliseconds. We are developing a framework called Quicksand for building such applications and unleashing the utility computing vision. Initial results using Quicksand to implement a DNN training pipeline are promising: Quicksand saturates resources that are imbalanced across machines or rapidly shift in quantity.
今天的云是低效的:它们对cpu、gpu、内存和存储等资源的利用率很低。之所以会出现这种低效率,是因为应用程序以可变的速率和比例消耗资源,而云以固定的速率和比例提供资源。这种产品和消费风格的不匹配阻碍了效用计算愿景的充分实现。我们提倡可替换的应用程序,也就是说,应用程序可以独立地分发、扩展和迁移它们对不同资源的消耗,同时在不同的服务器上适配它们的可用性(例如,一台服务器上的内存,另一台服务器上的CPU)。我们的目标是充分利用资源,即使它们在服务器上暂时可用的时间只有几毫秒。我们正在开发一个名为Quicksand的框架,用于构建这样的应用程序,并释放效用计算的愿景。使用流沙实现DNN训练管道的初步结果是有希望的:流沙使机器之间不平衡或数量迅速变化的资源饱和。
{"title":"Unleashing True Utility Computing with Quicksand","authors":"Zhenyuan Ruan, Shihang Li, Kaiyan Fan, M. Aguilera, A. Belay, S. Park, Malte Schwarzkopf","doi":"10.1145/3593856.3595893","DOIUrl":"https://doi.org/10.1145/3593856.3595893","url":null,"abstract":"Today's clouds are inefficient: their utilization of resources like CPUs, GPUs, memory, and storage is low. This inefficiency occurs because applications consume resources at variable rates and ratios, while clouds offer resources at fixed rates and ratios. This mismatch of offering and consumption styles prevents fully realizing the utility computing vision. We advocate for fungible applications, that is, applications that can distribute, scale, and migrate their consumption of different resources independently while fitting their availability across different servers (e.g., memory at one server, CPU at another). Our goal is to make use of resources even if they are transiently available on a server for only a few milliseconds. We are developing a framework called Quicksand for building such applications and unleashing the utility computing vision. Initial results using Quicksand to implement a DNN training pipeline are promising: Quicksand saturates resources that are imbalanced across machines or rapidly shift in quantity.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123739522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Executing Shell Scripts in the Wrong Order, Correctly 以错误的顺序正确地执行Shell脚本
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595891
Georgios Liargkovas, Konstantinos Kallas, M. Greenberg, Nikos Vasilakis
Shell scripts are critical infrastructure for developers, administrators, and scientists; and ought to enjoy the performance benefits of the full suite of advances in compiler optimizations. But between the shell's inherent challenges and neglect from the community, shell tooling and performance lags far behind the state of the art. We propose executing scripts out-of-order to better use modern computational resources. Optimizing any part of an arbitrary shell script is very challenging: the shell language's complex, late-bound semantics makes extensive use of opaque external commands with arbitrary side effects. We work with the grain of the shell's challenges, meeting dynamism with dynamism: we optimize at runtime, speculatively executing commands in an isolated and monitored environment to determine and contain their behavior. Our proposed approach can yield serious performance benefits (up to 3.9× for a bioinformatics script on a 16-core machine) for arbitrarily complex scripts without modifying their behavior. Contained out-of-order execution obviates the need for command specifications, operates on external commands, and yields a much more general framework for the shell. Script writers need not change a thing and observe no differences: they get improved performance with the interpretability of sequential output.
Shell脚本是开发人员、管理员和科学家的关键基础设施;并且应该享受编译器优化的全套进步带来的性能优势。但是在shell固有的挑战和社区的忽视之间,shell的工具和性能远远落后于技术水平。我们建议乱序执行脚本,以更好地利用现代计算资源。优化任意shell脚本的任何部分都是非常具有挑战性的:shell语言的复杂、后期绑定语义使得大量使用不透明的外部命令,这些命令具有任意的副作用。我们处理shell的挑战,以动态满足动态:我们在运行时进行优化,在隔离和监控的环境中推测性地执行命令,以确定和包含它们的行为。我们提出的方法可以在不修改其行为的情况下,为任意复杂的脚本带来显著的性能优势(对于16核机器上的生物信息学脚本,性能优势高达3.9倍)。包含的乱序执行消除了对命令规范的需要,对外部命令进行操作,并为shell提供了一个更通用的框架。脚本编写者不需要改变任何东西,也没有观察到任何差异:他们通过顺序输出的可解释性获得了改进的性能。
{"title":"Executing Shell Scripts in the Wrong Order, Correctly","authors":"Georgios Liargkovas, Konstantinos Kallas, M. Greenberg, Nikos Vasilakis","doi":"10.1145/3593856.3595891","DOIUrl":"https://doi.org/10.1145/3593856.3595891","url":null,"abstract":"Shell scripts are critical infrastructure for developers, administrators, and scientists; and ought to enjoy the performance benefits of the full suite of advances in compiler optimizations. But between the shell's inherent challenges and neglect from the community, shell tooling and performance lags far behind the state of the art. We propose executing scripts out-of-order to better use modern computational resources. Optimizing any part of an arbitrary shell script is very challenging: the shell language's complex, late-bound semantics makes extensive use of opaque external commands with arbitrary side effects. We work with the grain of the shell's challenges, meeting dynamism with dynamism: we optimize at runtime, speculatively executing commands in an isolated and monitored environment to determine and contain their behavior. Our proposed approach can yield serious performance benefits (up to 3.9× for a bioinformatics script on a 16-core machine) for arbitrarily complex scripts without modifying their behavior. Contained out-of-order execution obviates the need for command specifications, operates on external commands, and yields a much more general framework for the shell. Script writers need not change a thing and observe no differences: they get improved performance with the interpretability of sequential output.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces 向着安全内核驱动接口发展的操作系统内核
Pub Date : 2023-06-22 DOI: 10.1145/3593856.3595914
A. Burtsev, Vikram Narayanan, Yongzhe Huang, Kaiming Huang, Gang Tan, T. Jaeger
Our work explores the challenge of developing secure kernel-driver interfaces designed to protect the kernel from isolated kernel extensions. We first analyze a range of possible attack vectors that exist in current isolation frameworks. Then, we suggest a new approach to building secure isolation boundaries centered around ideas that originate in safe operating systems: isolation of heaps and single ownership.
我们的工作探讨了开发安全内核驱动程序接口的挑战,该接口旨在保护内核免受孤立的内核扩展的影响。我们首先分析了当前隔离框架中存在的一系列可能的攻击向量。然后,我们提出了一种新的方法来构建安全隔离边界,该边界以起源于安全操作系统的思想为中心:隔离堆和单一所有权。
{"title":"Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces","authors":"A. Burtsev, Vikram Narayanan, Yongzhe Huang, Kaiming Huang, Gang Tan, T. Jaeger","doi":"10.1145/3593856.3595914","DOIUrl":"https://doi.org/10.1145/3593856.3595914","url":null,"abstract":"Our work explores the challenge of developing secure kernel-driver interfaces designed to protect the kernel from isolated kernel extensions. We first analyze a range of possible attack vectors that exist in current isolation frameworks. Then, we suggest a new approach to building secure isolation boundaries centered around ideas that originate in safe operating systems: isolation of heaps and single ownership.","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 19th Workshop on Hot Topics in Operating Systems 第19届操作系统热点专题研讨会论文集
Pub Date : 1900-01-01 DOI: 10.1145/3593856
{"title":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","authors":"","doi":"10.1145/3593856","DOIUrl":"https://doi.org/10.1145/3593856","url":null,"abstract":"","PeriodicalId":330470,"journal":{"name":"Proceedings of the 19th Workshop on Hot Topics in Operating Systems","volume":"54 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 19th Workshop on Hot Topics in Operating Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1