Главная
Study mode:
on
1
Introduction
2
Conventionalized Stack Design
3
Data Plane Libraries
4
Outline
5
Protected Library
6
Memory Protection Keys
7
PeekARu
8
Hardware Watchpoints
9
Cost
10
Hodor Alternatives
11
Evaluation
12
Evaluation Results
Description:
Explore a cutting-edge approach to achieving both safety and performance in high-throughput data plane libraries through intra-process isolation. Delve into the concept of protected libraries as a new OS abstraction, providing separate user-level protection domains for various services while maintaining performance comparable to unprotected kernel bypass. Learn how Intel's memory protection keys (PKU) are utilized to safely modify permissions within a single address space, and discover the use of hardware watchpoints to manage asynchronous event delivery and ensure independent failure of applications sharing a protected library. Examine the implementation's efficiency in protecting high-throughput in-memory databases and user-space network stacks, allowing up to 2.3 million library entrances per second per core. Compare this approach to kernel-level protection and alternative implementations using system calls and Intel's VMFUNC switching of user-level address spaces.

Hodor - Intra-Process Isolation for High-Throughput Data Plane Libraries

USENIX
Add to list