首页> 外文学位 >Detecting problematic execution patterns through automatic kernel trace analysis.
【24h】

Detecting problematic execution patterns through automatic kernel trace analysis.

机译:通过自动内核跟踪分析检测有问题的执行模式。

获取原文
获取原文并翻译 | 示例

摘要

As multi-core processors, distributed systems and virtualization are gaining a larger share in the market, debugging production systems has become a more challenging task, especially when the occurring problems are not easily reproducible. The new architectural complexity introduced a large number of potential problems that need to be detected on live systems with adequate, efficient and scalable methodologies. By tracing the kernel of an operating system, performance bottlnecks, malicious activities, programming bugs and other kinds of problematic behavior could be accurately detected. Tracing consists in monitoring and logging relevant events occurring on live systems with a minimal performance impact and interference with the flow of execution. The generated trace is typically inspected remotely with no overhead on the system whatsoever. This work presents an automata-based approach for modeling patterns of undesired behavior using executable Finite State Machines. They are fed into an offline analyzer which efficiently and simultaneously checks for their occurrences even in traces of several gigabytes. The analyzer provides an Application Programming Interface offering essential services to the Finite State Machines. To our knowledge, this is the first attempt that relies on describing problematic patterns for kernel trace analysis.;The analyzer achieves a linear performance with respect to the trace size. The remaining factors impacting its performance are also discussed. The performance of the automata-based approach is compared with that of a dedicated implementation suggesting that the overhead of using Finite State Machines for execution and not just for modeling is acceptable especially in post-mortem analysis.;The implemented solution is highly parallelizable and may be ported for online pattern matching. The thesis concludes by suggesting a list of possible optimizations that would further improve the analyzer's performance.;The implemented patterns touch on several fields including security, software testing and performance debugging. The analysis results provide enough information to precisely identify the source of the problem. This was helpful to identify a suspicious code sequence in the Linux kernel that could generate a deadlock.
机译:随着多核处理器,分布式系统和虚拟化在市场上获得更大的份额,调试生产系统已成为一项更具挑战性的任务,尤其是当发生的问题不容易重现时。新的体系结构复杂性引入了大量潜在问题,需要使用适当,有效和可扩展的方法在实时系统上检测到这些潜在问题。通过跟踪操作系统的内核,可以准确检测性能瓶颈,恶意活动,编程错误和其他类型的问题行为。跟踪包括监视和记录实时系统上发生的相关事件,而对性能的影响和对执行流程的干扰最小。生成的跟踪通常在没有系统开销的情况下进行远程检查。这项工作提出了一种基于自动机的方法,用于使用可执行的有限状态机对不良行为的模式进行建模。它们被送入离线分析仪中,该分析仪即使在几GB的痕迹中也可以有效地同时检查它们的出现。分析器提供了一个应用程序编程接口,可为有限状态机提供基本服务。据我们所知,这是第一次依靠描述有问题的模式进行内核跟踪分析的尝试。分析仪在跟踪大小方面实现了线性性能。还讨论了影响其性能的其他因素。将基于自动机的方法的性能与专用实现方案的性能进行了比较,这表明使用有限状态机执行而不是仅用于建模的开销是可以接受的,尤其是在事后分析中;所实现的解决方案是高度可并行化的,并且可能用于在线模式匹配。本文最后提出了一系列可能会进一步提高分析仪性能的可能优化方法。;已实现的模式涉及多个领域,包括安全性,软件测试和性能调试。分析结果提供了足够的信息,可以准确地确定问题的根源。这有助于识别Linux内核中可能产生死锁的可疑代码序列。

著录项

  • 作者

    Matni, Gabriel.;

  • 作者单位

    Ecole Polytechnique, Montreal (Canada).;

  • 授予单位 Ecole Polytechnique, Montreal (Canada).;
  • 学科 Engineering Computer.;Engineering Electronics and Electrical.
  • 学位 M.Sc.A.
  • 年度 2009
  • 页码 104 p.
  • 总页数 104
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号