Security Module Stacks That Don't Fall Over. Casey Schaufler Intel Open Source Technology Center

Size: px
Start display at page:

Download "Security Module Stacks That Don't Fall Over. Casey Schaufler Intel Open Source Technology Center"

Transcription

1 Security Module Stacks That Don't Fall Over Casey Schaufler Intel Open Source Technology Center

2 Casey Schaufler Kernel developer from the 1970 s Supercomputers in the 1990 s Smack Linux Security Module Security module stacking Photo Curtesy Ann Forrister 2

3 Linux Security Module Collection of security hooks Additions to traditional access controls You security people are insane. 3

4 Security Module Stack A collection of security modules Called in order Bail on fail policy 4

5 Minor Security Module Checks based on available state

6 Major Security Module Checks on module managed state System managed security blobs Netlabel and/or secmarks

7 Capability Yama LoadPin Stacking as of 4.18 Success Failure

8 Stumbing Block Blob Pointers

9 task cred file sock inode ipc key msg_msg superblock Security Blobs 9

10 cred Infrastructure Managed Blobs I want 200 I want 176 I want 32 I want 8 10

11 Capability Yama LoadPin Stacking with infrastructure managed blobs Success Failure

12 Stumbling Block secids

13 32 bits allows one module s data rc = security_cred_getsecid(cred, &secid); rc = security_secctx_to_secid(ctx, ctxlen, &secid); rc = security_secid_to_secctx(secid, &data, &datalen); 13

14 Replace u32 with struct secids With stacking struct secids { u32 selinux; u32 smack; u32 apparmor; }; Without stacking struct secids { union { u32 selinux; u32 smack; u32 apparmor; }; }; 14

15 Identify which to use Within a security module sec->sid = secid->selinux; 15

16 Identify which to use In netfilter case SECMARK_MODE_SEL: info->secid = secid.selinux; break; case SECMARK_MODE_SMACK: info->secid = secid.smack; break; 16

17 Identify which to use Select by task attribute prctl(pr_set_display_lsm, selinux, 7, 0, 0); 17

18 Capability Yama LoadPin Stacking with struct secids Success Failure

19 Stumbling Block Mount Options

20 Unrecognized Option mount o seclabel,smackfsroot= * Stop failing on unknown options Multiple mount option structures 20

21 Stumbling Block netlabel

22 Packet Labeling One CIPSO tag IP Packet Packet Header IP Options CIPSO/CALIPSO Security modules must agree 22

23 Pushed attributes Security modules push data to netlabel Other sub-systems pull data Attributes stored in socket In network format May not be used in the end 23

24 Netlabel Configuration Unlabeled networks Default for SELinux Labeled networks Default for Smack Address selectors Defers labeling until delivery 24

25 Granularity Security modules won t be synchronized May change after socket creation 25

26 Capability Yama LoadPin Stacking with netlabel equality Success Failure

27 What Can Still Cause Problems?

28 Redundant purpose Don t use SELinux and Smack together Do use Smack and AppArmor together 28

29 Networking Don t confuse IP Use one network enabled module 29

30 User Space May get confused /sys/kernel/security/lsm Updates needed for real support systemd id ls 30

31 Advice For New Security Modules

32 Networking Make netlabel optional Read the netlabel code before trying to use it Define sane behavior on unlabeled networks 32

33 Process Attributes Create a subdir in /proc/ /attr Create user space wrappers for SO_PEERSEC 33

34 Think twice about using secids Do you need audit events? What about tmpfs? 34

35 Be careful with state Module hooks may not get called Avoid additional memory management Let the infrastructure do it 35

36 Summary

37 Stacks of dissimilar modules are good Stacks should avoid fighting over the network Modules should color within the lines 37

38 Thank You

Security Module Stacking Next Steps

Security Module Stacking Next Steps Security Module Stacking Next Steps Casey Schaufler Intel Open Source Technology Center 1 The Security Module Stacking Logo Yama has no logo LoadPin has no logo 2 2 Status And Plans Stacking Infrastructure

More information

How To Write a Linux Security Module That Makes Sense For You. Casey Schaufler February 2016

How To Write a Linux Security Module That Makes Sense For You. Casey Schaufler February 2016 How To Write a Linux Security Module That Makes Sense For You Casey Schaufler February 2016 Casey Schaufler Unix 32 bit port - 1979 Smack Linux security module Security module stacking Why Would You Write

More information

Does Making The Kernel Harder Make

Does Making The Kernel Harder Make Does Making The Kernel Harder Make Making The Kernel Harder? Casey Schaufler Intel Open Source Technology Center Casey Schaufler Kernel developer from the 1970 s Supercomputers in the 1990 s Smack Linux

More information

Introduction to Labeled Networking on Linux

Introduction to Labeled Networking on Linux Introduction to Labeled Networking on Linux Paul Moore paul.moore@hp.com 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda Labeled

More information

Linux Kernel Security Update LinuxCon Europe Berlin, 2016

Linux Kernel Security Update LinuxCon Europe Berlin, 2016 Linux Kernel Security Update LinuxCon Europe Berlin, 2016 James Morris james.l.morris@oracle.com Introduction Who am I? Kernel security subsystem maintainer Started kernel development w/ FreeS/WAN in 1999

More information

Linux Kernel Security

Linux Kernel Security Linux Kernel Security Adapting 1960s Technology to st Meet 21 Century Threats James Morris Red Hat LinuxCon Boston 2010 Fig. 1 History The first fact to face is that UNIX was not developed with security,

More information

Leveraging IPsec for Mandatory Access Control of Linux Network Communications

Leveraging IPsec for Mandatory Access Control of Linux Network Communications Leveraging for Mandatory of Linux Network Communications Trent Jaeger Department of Computer Science and Engineering Pennsylvania State University December 6, 2005 1 Mandatory 2 Mandatory File X 3 Network

More information

Keeping Up With The Linux Kernel. Marc Dionne AFS and Kerberos Workshop Pittsburgh

Keeping Up With The Linux Kernel. Marc Dionne AFS and Kerberos Workshop Pittsburgh Keeping Up With The Linux Kernel Marc Dionne AFS and Kerberos Workshop Pittsburgh - 2015 The stage Linux is widely deployed as an AFS client platform OpenAFS client available in popular distributions Ubuntu,

More information

What's New with SELinux

What's New with SELinux What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov National Information Assurance Research Laboratory National Security Agency National Information Assurance Research Laboratory 1 Advances in

More information

SECURITY DEVROOM PTAGS

SECURITY DEVROOM PTAGS SECURITY DEVROOM PTAGS The module PTAGS allows to manage tags attached to processes. The module PTAGS is built on top of the Linux Security Module (LSM) infrastructure as it exists since V4.1 with stacking*

More information

Security model for embedded systems using Smack *

Security model for embedded systems using Smack * Security model for embedded systems using Smack * Simple but secure * Simplified Mandatory Access Control Kernel - José Bollo - Context José Bollo Eurogiciel Intel Tizen Smack Linux Smack for embeddeds

More information

Transparent TCP Recovery

Transparent TCP Recovery Transparent Recovery with Chain Replication Robert Burgess Ken Birman Robert Broberg Rick Payne Robbert van Renesse October 26, 2009 Motivation Us: Motivation Them: Client Motivation There is a connection...

More information

CSE 153 Design of Operating Systems Fall 2018

CSE 153 Design of Operating Systems Fall 2018 CSE 153 Design of Operating Systems Fall 2018 Lecture 4: Processes (2) Threads Process Creation: Unix In Unix, processes are created using fork() int fork() fork() Creates and initializes a new PCB Creates

More information

Tizen-Meta as Security and Connectivity Layers For Yocto Project

Tizen-Meta as Security and Connectivity Layers For Yocto Project Tizen-Meta as Security and Connectivity Layers For Yocto Project () dominig.arfoll@fridu.net October 2014 Tizen-Meta What is Tizen How to build Tizen with Yocto tools Which Connectivity is available with

More information

Linux Kernel Evolution. OpenAFS. Marc Dionne Edinburgh

Linux Kernel Evolution. OpenAFS. Marc Dionne Edinburgh Linux Kernel Evolution vs OpenAFS Marc Dionne Edinburgh - 2012 The stage Linux is widely deployed as an OpenAFS client platform Many large OpenAFS sites rely heavily on Linux on both servers and clients

More information

Operating Systems. 17. Sockets. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 17. Sockets. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 17. Sockets Paul Krzyzanowski Rutgers University Spring 2015 1 Sockets Dominant API for transport layer connectivity Created at UC Berkeley for 4.2BSD Unix (1983) Design goals Communication

More information

Leveraging IPSec for Network Access Control for SELinux

Leveraging IPSec for Network Access Control for SELinux Leveraging IPSec for Network Access Control for SELinux Trent Jaeger IBM Research, Watson Serge Hallyn, Joy Latten, George Wilson IBM Linux Technology Center, Austin SELinux Symposium March, 2005 Problem:

More information

Practical Techniques to Obviate Setuid-to-Root Binaries

Practical Techniques to Obviate Setuid-to-Root Binaries Operating Systems, Security, Concurrency and Architecture Research Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, Donald Porter OSCAR Lab Computer Science

More information

Exploring the file system. Johan Montelius HT2016

Exploring the file system. Johan Montelius HT2016 1 Introduction Exploring the file system Johan Montelius HT2016 This is a quite easy exercise but you will learn a lot about how files are represented. We will not look to the actual content of the files

More information

A Scalable High-Performance Active Network Node

A Scalable High-Performance Active Network Node A Scalable High-Performance Active Network Node D. Decasper, B. Plattner ETH Zurich G. Parulkar, S. Choi, J. DeHart, T. Wolf Washington U Presented by Jacky Chu Motivation Apply Active Network over gigabits

More information

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017 ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 The Operating System (OS) Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke)

More information

Linux Kernel Architecture

Linux Kernel Architecture Professional Linux Kernel Architecture Wolf gang Mauerer WILEY Wiley Publishing, Inc. Introduction xxvii Chapter 1: Introduction and Overview 1 Tasks of the Kernel v -- 2 Implementation Strategies 3 Elements

More information

Linux Kernel Security Overview

Linux Kernel Security Overview Linux Kernel Security Overview Linux Security Summit Europe 2018 Edinburgh, UK James Morris jmorris@namei.org $ whoami Linux kernel security subsystem maintainer Linux kernel engineer at Microsoft Previously

More information

Tutorial 2. Linux networking, sk_buff and stateless packet filtering. Roei Ben-Harush Check Point Software Technologies Ltd.

Tutorial 2. Linux networking, sk_buff and stateless packet filtering. Roei Ben-Harush Check Point Software Technologies Ltd. Tutorial 2 Linux networking, sk_buff and stateless packet filtering Agenda 1 Linux file system - networking 2 3 4 sk_buff Stateless packet filtering About next assignment 2 Agenda 1 Linux file system -

More information

Travis Cardwell Technical Meeting

Travis Cardwell Technical Meeting .. Introduction to Docker Travis Cardwell Tokyo Linux Users Group 2014-01-18 Technical Meeting Presentation Motivation OS-level virtualization is becoming accessible Docker makes it very easy to experiment

More information

File access-control per container with Landlock

File access-control per container with Landlock File access-control per container with Landlock Mickaël Salaün ANSSI February 4, 2018 1 / 20 Secure user-space software How to harden an application? secure development follow the least privilege principle

More information

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to

More information

Landlock LSM: toward unprivileged sandboxing

Landlock LSM: toward unprivileged sandboxing Landlock LSM: toward unprivileged sandboxing Mickaël Salaün ANSSI September 14, 2017 1 / 21 Secure user-space software How to harden an application? secure development follow the least privilege principle

More information

Security Enhanced Linux. Thanks to David Quigley

Security Enhanced Linux. Thanks to David Quigley Security Enhanced Linux Thanks to David Quigley History SELinux Timeline 1985: LOCK (early Type Enforcement) 1990: DTMach / DTOS 1995: Utah Fluke / Flask 1999: 2.2 Linux Kernel (patch) 2000: 2001: 2.4

More information

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li Securing Linux Hyungjoon Koo and Anke Li Outline Overview Background: necessity & brief history Core concepts LSM (Linux Security Module) Requirements Design SELinux Key elements Security context: identity

More information

Software Development & Education Center

Software Development & Education Center Software Development & Education Center Embedded Linux & RTOS With ARM 9 µc Embedded Linux and RTOS with ARM9 µc Introduction The course is designed for those who want to pursue Linux based Embedded Systems.

More information

Accelerating Load Balancing programs using HW- Based Hints in XDP

Accelerating Load Balancing programs using HW- Based Hints in XDP Accelerating Load Balancing programs using HW- Based Hints in XDP PJ Waskiewicz, Network Software Engineer Neerav Parikh, Software Architect Intel Corp. Agenda Overview express Data path (XDP) Software

More information

Lecture 8: February 19

Lecture 8: February 19 CMPSCI 677 Operating Systems Spring 2013 Lecture 8: February 19 Lecturer: Prashant Shenoy Scribe: Siddharth Gupta 8.1 Server Architecture Design of the server architecture is important for efficient and

More information

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat Linux Containers Roadmap Red Hat Enterprise Linux 7 RC Bhavna Sarathy Senior Technology Product Manager, Red Hat Linda Wang Senior Eng. Manager, Red Hat Bob Kozdemba Principal Soln. Architect, Red Hat

More information

Embedded System Curriculum

Embedded System Curriculum Embedded System Curriculum ADVANCED C PROGRAMMING AND DATA STRUCTURE (Duration: 25 hrs) Introduction to 'C' Objectives of C, Applications of C, Relational and logical operators, Bit wise operators, The

More information

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Agenda Intro / Prep Environments Day 1: Docker Deep Dive Day 2: Kubernetes Deep Dive Day 3: Advanced Kubernetes: Concepts, Management, Middleware Day 4:

More information

Implementing the Wireless Token Ring Protocol As a Linux Kernel Module

Implementing the Wireless Token Ring Protocol As a Linux Kernel Module Implementing the Wireless Token Ring Protocol As a Linux Kernel Module Ruchira Datta Web Over Wireless Group University of California Berkeley, California September 28, 2001 1 Preliminary Groundwork: Fake

More information

A practical introduction to XDP

A practical introduction to XDP A practical introduction to XDP Jesper Dangaard Brouer (Red Hat) Andy Gospodarek (Broadcom) Linux Plumbers Conference (LPC) Vancouver, Nov 2018 1 What will you learn? Introduction to XDP and relationship

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 25 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 FAQ Q 2 Data and Metadata

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 15 - Linux Security October 18, 2007 URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ 1 Retrofit Security in Existing Systems Upside Operating systems are costly to

More information

METU Department of Computer Engineering

METU Department of Computer Engineering METU Department of Computer Engineering CEng 536 - Advanced Unix Fall 2011-2012 Midterm (Take Home / Due: Dec 1, 18:00 AM/4 questions, 110 points, 5 pages) Name: No: Signature: Note: You are not expected

More information

Overlayfs And Containers. Miklos Szeredi, Red Hat Vivek Goyal, Red Hat

Overlayfs And Containers. Miklos Szeredi, Red Hat Vivek Goyal, Red Hat Overlayfs And Containers Miklos Szeredi, Red Hat Vivek Goyal, Red Hat Introduction to overlayfs Union or? Union: all layers made equal How do you take the union of two files? Or a file and a directory?

More information

An Analysis of Linux Scalability to Many Cores

An Analysis of Linux Scalability to Many Cores An Analysis of Linux Scalability to Many Cores 1 What are we going to talk about? Scalability analysis of 7 system applications running on Linux on a 48 core computer Exim, memcached, Apache, PostgreSQL,

More information

CS3210: Crash consistency

CS3210: Crash consistency CS3210: Crash consistency Kyle Harrigan 1 / 45 Administrivia Lab 4 Part C Due Tomorrow Quiz #2. Lab3-4, Ch 3-6 (read "xv6 book") Open laptop/book, no Internet 2 / 45 Summary of cs3210 Power-on -> BIOS

More information

libnetfilter_log Reference Manual

libnetfilter_log Reference Manual libnetfilter_log Reference Manual x.y Generated by Doxygen 1.4.6 Tue Mar 21 13:47:12 2006 CONTENTS 1 Contents 1 libnetfilter_log File Index 1 2 libnetfilter_log File Documentation 1 1 libnetfilter_log

More information

File Systems: Recovery

File Systems: Recovery File Systems: Recovery Learning Objectives Identify ways that a file system can be corrupt after a crash. Articulate approaches a file system can take to limit the kinds of failures that can occur. Describe

More information

IPtables and Netfilter

IPtables and Netfilter in tables rely on IPtables and Netfilter Comp Sci 3600 Security Outline in tables rely on 1 2 in tables rely on 3 Linux firewall: IPtables in tables rely on Iptables is the userspace module, the bit that

More information

Open Source Traffic Analyzer

Open Source Traffic Analyzer Open Source Traffic Analyzer Daniel Turull June 2010 Outline 1 Introduction 2 Background study 3 Design 4 Implementation 5 Evaluation 6 Conclusions 7 Demo Outline 1 Introduction 2 Background study 3 Design

More information

OS Containers. Michal Sekletár November 06, 2016

OS Containers. Michal Sekletár November 06, 2016 OS Containers Michal Sekletár msekleta@redhat.com November 06, 2016 whoami Senior Software Engineer @ Red Hat systemd and udev maintainer Free/Open Source Software contributor Michal Sekletár msekleta@redhat.com

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1 Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem

More information

XDP: The Future of Networks. David S. Miller, Red Hat Inc., Seoul 2017

XDP: The Future of Networks. David S. Miller, Red Hat Inc., Seoul 2017 XDP: The Future of Networks David S. Miller, Red Hat Inc., Seoul 2017 Overview History of ebpf and XDP Why is it important. Fake News about ebpf and XDP Ongoing improvements and future developments Workflow

More information

Virtual File System. Don Porter CSE 306

Virtual File System. Don Porter CSE 306 Virtual File System Don Porter CSE 306 History Early OSes provided a single file system In general, system was pretty tailored to target hardware In the early 80s, people became interested in supporting

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode

More information

System Hardening From concepts into details

System Hardening From concepts into details System Hardening From concepts into details Marcus Meissner Technical Project Manager Security meissner@suse.com Craig Gardner Engineering Lead Storage cgardner@suse.com Hardening Top Down 2 What is Security?

More information

CSE506: Operating Systems CSE 506: Operating Systems

CSE506: Operating Systems CSE 506: Operating Systems CSE 506: Operating Systems File Systems Traditional File Systems FS, UFS/FFS, Ext2, Several simple on disk structures Superblock magic value to identify filesystem type Places to find metadata on disk

More information

Processes (Intro) Yannis Smaragdakis, U. Athens

Processes (Intro) Yannis Smaragdakis, U. Athens Processes (Intro) Yannis Smaragdakis, U. Athens Process: CPU Virtualization Process = Program, instantiated has memory, code, current state What kind of memory do we have? registers + address space Let's

More information

Release Notes Virtual File System Driver July 15, 2013

Release Notes Virtual File System Driver July 15, 2013 2.0.0.15 July 15, 2013 EURESYS s.a. shall retain all property rights, title and interest of the documentation of the hardware and the software, and of the trademarks of EURESYS s.a. All the names of companies

More information

regsim.scm ~/umb/cs450/ch5.base/ 1 11/11/13

regsim.scm ~/umb/cs450/ch5.base/ 1 11/11/13 1 File: regsim.scm Register machine simulator from section 5.2 of STRUCTURE AND INTERPRETATION OF COMPUTER PROGRAMS This file can be loaded into Scheme as a whole. Then you can define and simulate machines

More information

Implementation of Processes

Implementation of Processes Implementation of Processes A processes information is stored in a process control block (PCB) The PCBs form a process table Sometimes the kernel stack for each process is in the PCB Sometimes some process

More information

Getting Memcached Secure. NEC OSS Promotion Center KaiGai Kohei

Getting Memcached Secure. NEC OSS Promotion Center KaiGai Kohei Getting Memcached Secure NEC OSS Promotion Center KaiGai Kohei Self Introduction Name Company Works KaiGai Kohei NEC, OSS Promotion Center 7 years experiences of OSS development»

More information

ExecVus. Alexandru Totolici

ExecVus. Alexandru Totolici ExecVus Alexandru Totolici a way to visualize control-flow in! software execution 2 planned for: code collapse code reordering improved selection of exec. path zoom in/out of control flow scented graph

More information

Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center

Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center Container Adoption for NFV Challenges & Opportunities Sriram Natarajan, T-Labs Silicon Valley Innovation Center Virtual Machine vs. Container Stack KVM Container-stack Libraries Guest-OS Hypervisor Libraries

More information

Local File Stores. Job of a File Store. Physical Disk Layout CIS657

Local File Stores. Job of a File Store. Physical Disk Layout CIS657 Local File Stores CIS657 Job of a File Store Recall that the File System is responsible for namespace management, locking, quotas, etc. The File Store s responsbility is to mange the placement of data

More information

Ext3/4 file systems. Don Porter CSE 506

Ext3/4 file systems. Don Porter CSE 506 Ext3/4 file systems Don Porter CSE 506 Logical Diagram Binary Formats Memory Allocators System Calls Threads User Today s Lecture Kernel RCU File System Networking Sync Memory Management Device Drivers

More information

lpengfei Ding & Chenfu Bao lsecurity Researcher & Baidu X-Lab lfocused on Mobile, IoT and Linux kernel security

lpengfei Ding & Chenfu Bao lsecurity Researcher & Baidu X-Lab lfocused on Mobile, IoT and Linux kernel security lpengfei Ding & Chenfu Bao lsecurity Researcher & Developer @ Baidu X-Lab lfocused on Mobile, IoT and Linux kernel security l Introduction l Past Compat Vulnerabilities l Newly Identified Compat Vulnerabilities

More information

PROCESS MANAGEMENT Operating Systems Design Euiseong Seo

PROCESS MANAGEMENT Operating Systems Design Euiseong Seo PROCESS MANAGEMENT 2016 Operating Systems Design Euiseong Seo (euiseong@skku.edu) Definition A process is a program in execution Context Resources Specifically, Register file state Address space File and

More information

Classes Nov 3, Ch

Classes Nov 3, Ch Classes Nov 3, Ch 10.1-10.3 Highlights - class / struct (structure) - constructor struct/class vs array Arrays group together similar data types (any amount you want) Classes and structs group together

More information

Linux-CR: Transparent Application Checkpoint-Restart in Linux

Linux-CR: Transparent Application Checkpoint-Restart in Linux Linux-CR: Transparent Application Checkpoint-Restart in Linux Oren Laadan Columbia University orenl@cs.columbia.edu Linux Kernel Summit, November 2010 1 orenl@cs.columbia.edu Linux Kernel Summit, November

More information

Quiz I Solutions MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Department of Electrical Engineering and Computer Science

Quiz I Solutions MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Department of Electrical Engineering and Computer Science Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Fall 2011 Quiz I Solutions Mean 71 Median 69 Std. dev. 20.2 10 8 6 4 2 0 0 10 20 30 40 50 60 70 80

More information

- Knowledge of basic computer architecture and organization, ECE 445

- Knowledge of basic computer architecture and organization, ECE 445 ECE 446: Device Driver Development Fall 2014 Wednesdays 7:20-10 PM Office hours: Wednesdays 6:15-7:15 PM or by appointment, Adjunct office Engineering Building room 3707/3708 Last updated: 8/24/14 Instructor:

More information

Error Detection/Correction Policy

Error Detection/Correction Policy Error Detection/Correction Policy James T. Linnemann Michigan State University BU STT Workshop December 19, 1999 Michigan State University 11/17/99 1 Error Handling Strategy Confine errors to single event,

More information

IBM Research Report. Leveraging IPSec for Mandatory Access Control of Linux Network Communications

IBM Research Report. Leveraging IPSec for Mandatory Access Control of Linux Network Communications RC23642 (W0506-109) June 28, 2005 Computer Science IBM Research Report Leveraging IPSec for Mandatory Access Control of Linux Network Communications Trent R. Jaeger IBM Research Division Thomas J. Watson

More information

Virtual File System. Don Porter CSE 506

Virtual File System. Don Porter CSE 506 Virtual File System Don Porter CSE 506 History ò Early OSes provided a single file system ò In general, system was pretty tailored to target hardware ò In the early 80s, people became interested in supporting

More information

Linux Operating System

Linux Operating System Linux Operating System Dept. of Computer Science & Engineering 1 History Linux is a modern, free operating system based on UNIX standards. First developed as a small but self-contained kernel in 1991 by

More information

CSCI S-Q Lecture #12 7/29/98 Data Structures and I/O

CSCI S-Q Lecture #12 7/29/98 Data Structures and I/O CSCI S-Q Lecture #12 7/29/98 Data Structures and I/O Introduction The WRITE and READ ADT Operations Case Studies: Arrays Strings Binary Trees Binary Search Trees Unordered Search Trees Page 1 Introduction

More information

File System Definition: file. File management: File attributes: Name: Type: Location: Size: Protection: Time, date and user identification:

File System Definition: file. File management: File attributes: Name: Type: Location: Size: Protection: Time, date and user identification: File System Definition: Computer can store the information on different storage media such as magnetic disk, tapes, etc. and for convenience to use the operating system provides the uniform logical view

More information

ebpf Tooling and Debugging Infrastructure

ebpf Tooling and Debugging Infrastructure ebpf Tooling and Debugging Infrastructure Quentin Monnet Fall ebpf Webinar Series 2018-10-09 Netronome 2018 Injecting Programs into the Kernel ebpf programs are usually compiled from C (or Go, Rust, Lua

More information

Software Development & Education Center

Software Development & Education Center Software Development & Education Center Embedded Linux & Device Drivers Embedded Linux & Device Drivers Introduction The course is designed for those who want to pursue Linux based Embedded Systems. Embedded

More information

Nooks. Robert Grimm New York University

Nooks. Robert Grimm New York University Nooks Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Design and Implementation Nooks Overview An isolation

More information

Announcements. Persistence: Crash Consistency

Announcements. Persistence: Crash Consistency Announcements P4 graded: In Learn@UW by end of day P5: Available - File systems Can work on both parts with project partner Fill out form BEFORE tomorrow (WED) morning for match Watch videos; discussion

More information

XDP now with REDIRECT

XDP now with REDIRECT XDP - express Data Path XDP now with REDIRECT Jesper Dangaard Brouer, Principal Engineer, Red Hat Inc. LLC - Lund Linux Conf Sweden, Lund, May 2018 Intro: What is XDP? Really, don't everybody know what

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 & TECHNOLOGY (IJCET) PROCESS BEHAVIOUR MODELLING USING LSM INTERNATIONAL 6367(Print), ISSN 0976 6375(Online) JOURNAL Volume OF 3, Issue COMPUTER 3, October-December ENGINEERING (2012), IAEME & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume

More information

Disk divided into one or more partitions

Disk divided into one or more partitions UNIX File System Filesystem structure Disk divided into one or more partitions independent file system on each partition Sector 0 contains the Master Boot Record (MBR) MBR contains partition table one

More information

RCU. ò Walk through two system calls in some detail. ò Open and read. ò Too much code to cover all FS system calls. ò 3 Cases for a dentry:

RCU. ò Walk through two system calls in some detail. ò Open and read. ò Too much code to cover all FS system calls. ò 3 Cases for a dentry: Logical Diagram VFS, Continued Don Porter CSE 506 Binary Formats RCU Memory Management File System Memory Allocators System Calls Device Drivers Networking Threads User Today s Lecture Kernel Sync CPU

More information

CSCI-1680 Transport Layer I Rodrigo Fonseca

CSCI-1680 Transport Layer I Rodrigo Fonseca CSCI-1680 Transport Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Today Transport Layer UDP TCP Intro Connection Establishment Transport Layer "#$ -##$

More information

CSE 374 Programming Concepts & Tools

CSE 374 Programming Concepts & Tools CSE 374 Programming Concepts & Tools Hal Perkins Fall 2017 Lecture 8 C: Miscellanea Control, Declarations, Preprocessor, printf/scanf 1 The story so far The low-level execution model of a process (one

More information

VFS, Continued. Don Porter CSE 506

VFS, Continued. Don Porter CSE 506 VFS, Continued Don Porter CSE 506 Logical Diagram Binary Formats Memory Allocators System Calls Threads User Today s Lecture Kernel RCU File System Networking Sync Memory Management Device Drivers CPU

More information

Linux Driver and Embedded Developer

Linux Driver and Embedded Developer Linux Driver and Embedded Developer Course Highlights The flagship training program from Veda Solutions, successfully being conducted from the past 10 years A comprehensive expert level course covering

More information

CSCI-1680 Transport Layer I Rodrigo Fonseca

CSCI-1680 Transport Layer I Rodrigo Fonseca CSCI-1680 Transport Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Transport Layer UDP TCP Intro Connection Establishment From Lec 2: OSI Reference

More information

Lecture 2: The file system

Lecture 2: The file system Lecture 2: The file system Hands-on Unix System Administration DeCal 2012-01-30 1 / 19 Basic programs Basic commands 2 / 19 Basic programs Basic programs Basic commands pwd cd ls cp, mv less, vi 3 / 19

More information

Process. Operating Systems (Fall/Winter 2018) Yajin Zhou ( Zhejiang University

Process. Operating Systems (Fall/Winter 2018) Yajin Zhou (  Zhejiang University Operating Systems (Fall/Winter 2018) Process Yajin Zhou (http://yajin.org) Zhejiang University Acknowledgement: some pages are based on the slides from Zhi Wang(fsu). Review System calls implementation

More information

File System Consistency

File System Consistency File System Consistency Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu EEE3052: Introduction to Operating Systems, Fall 2017, Jinkyu Jeong (jinkyu@skku.edu)

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Allocation Methods Free-Space Management

More information

Linux Network Programming with P4. Linux Plumbers 2018 Fabian Ruffy, William Tu, Mihai Budiu VMware Inc. and University of British Columbia

Linux Network Programming with P4. Linux Plumbers 2018 Fabian Ruffy, William Tu, Mihai Budiu VMware Inc. and University of British Columbia Linux Network Programming with P4 Linux Plumbers 2018 Fabian Ruffy, William Tu, Mihai Budiu VMware Inc. and University of British Columbia Outline Introduction to P4 XDP and the P4 Compiler Testing Example

More information

Project 2 Non- preemptive Kernel. COS 318 Fall 2016

Project 2 Non- preemptive Kernel. COS 318 Fall 2016 Project 2 Non- preemptive Kernel COS 318 Fall 2016 Project 2: Schedule Design Review: - Monday, 10/10; - Answer the questions: ü ü ü ü ü Process Control Block: What will be in your PCB and what will it

More information

!"#$%&'())*'"+,&-,.-!! 1

!#$%&'())*'+,&-,.-!! 1 !"#$%&'())*'"+,&-,.-!! 1 Thinking about thinking in code George V. Neville-Neil Ottawa, Canada What is this about? 3 What is this about? This is not about any particular BSD 3 What is this about? This

More information

Lecture 8: Other IPC Mechanisms. CSC 469H1F Fall 2006 Angela Demke Brown

Lecture 8: Other IPC Mechanisms. CSC 469H1F Fall 2006 Angela Demke Brown Lecture 8: Other IPC Mechanisms CSC 469H1F Fall 2006 Angela Demke Brown Topics Messages through sockets / pipes Receiving notification of activity Generalizing the event notification mechanism Kqueue Semaphores

More information

Topics. Lecture 8: Other IPC Mechanisms. Socket IPC. Unix Communication

Topics. Lecture 8: Other IPC Mechanisms. Socket IPC. Unix Communication Topics Lecture 8: Other IPC Mechanisms CSC 469H1F Fall 2006 Angela Demke Brown Messages through sockets / pipes Receiving notification of activity Generalizing the event notification mechanism Kqueue Semaphores

More information

Version (Source Code) Control SWEN-250

Version (Source Code) Control SWEN-250 Version (Source Code) Control SWEN-250 Overview Motivation why is version control useful? Key concepts Variations on the basic theme Example version control systems 1/10/2019 (c) 2013 RIT Dept. of Software

More information

Operating System Modifications for User-Oriented Addressing Model

Operating System Modifications for User-Oriented Addressing Model Operating System Modifications for User-Oriented Addressing Model Dong Zhou and Taoyu Li Department of Electronic Engineering, Tsinghua University Tsinghua University, Beijing, 100084, P R China zhoud@mails.tsinghua.edu.cn,

More information