Kernel Mode Linux: Toward an Operating System Protected by a Type Theory
نویسندگان
چکیده
Traditional operating systems protect themselves from user programs with a privilege level facility of CPUs. One problem of the protection-by-hardware approach is that system calls become very slow because heavy operations are required to safely switch the privilege levels of user programs. To solve the problem, we design an operating system that protects itself with a type theory. In our approach, user programs are written in a typed assembly language and the kernel performs typechecking before executing the programs. Then, the user programs can be executed in the kernel mode, because the kernel knows that the typechecked programs do not violate safety of the kernel. Thus, system calls become mere function calls and can be invoked very quickly. We implemented Kernel Mode Linux (KML) that realizes our approach. Several benchmarks show effectiveness of KML.
منابع مشابه
LOBOS (Linux OS Boots OS): Booting a Kernel in 32-bit Mode
LOBOS (Linux Os Boots OS) is a system call that allows a running Linux kernel to boot a new kernel, without leaving 32-bit protected mode and, in particular, without using the BIOS in any way. This capability in turn allows Linux to be used as a network bootstrap program and even as a BIOS, both of which we are working on now. In this paper we discuss how LOBOS works, how we use it, and how LOB...
متن کاملAn Operating System Design for the Security Architecture for Microprocessors
SAM is a processor extension used to protect execution of dedicated programs by preventing data disclosure and program manipulations in a multitasking environment. This paper presents an operating system design based on the Linux kernel for SAM. The design splits the kernel into a very small protected part and an unprotected part used by drivers and high level functions. Using this kernel prote...
متن کاملSafe Execution of User Programs in Kernel Mode Using Typed Assembly Language
In traditional operating systems, user programs suffer from the overhead of system calls because of transitions between the user mode and the kernel mode across their protection boundary. However, this overhead can be eliminated if the user programs can be executed safely inside the kernel mode. We achieve this effect by developing a safe kernel mode execution mechanism using TAL, Typed Assembl...
متن کاملSOFTICE: Facilitating both Adoption of Linux Undergraduate Operating Systems Laboratories and Students’ Immersion in Kernel Code
This paper discusses how Linux clustering and virtual machine technologies can improve undergraduate students’ hands-on experience in operating systems laboratories. Like similar projects, SOFTICE relies on User Mode Linux (UML) to provide students with privileged access to a Linux system without creating security breaches on the hosting network. We extend such approaches in two aspects. First,...
متن کاملRump File Systems: Kernel Code Reborn
When kernel functionality is desired in userspace, the common approach is to reimplement it for userspace interfaces. We show that use of existing kernel file systems in userspace programs is possible without modifying the kernel file system code base. Two different operating modes are explored: 1) a transparent mode, in which the file system is mounted in the typical fashion by using the kerne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003