The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management. Download Citation on ResearchGate | Application Performance and Flexibility on Exokernel Systems. | The exokernel operating system architecture safely gives. Download Citation on ResearchGate | Application Performance and Flexibility on Exokernel Systems | The exokernel operating system.
|Published (Last):||13 March 2015|
|PDF File Size:||5.99 Mb|
|ePub File Size:||20.57 Mb|
|Price:||Free* [*Free Regsitration Required]|
We think you have liked this presentation.
Application Performance and Flexibility on Exokernel Systems
flexibklity If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Published by Tobias Conley Modified over 3 years ago.
Laboratory for Computer Science. Applications that do not want this responsibility communicate with the exokernel through libOSes.
Software abstractions bind hardware resources together, like, disk appication and the memory pages caching them Some Xok abstractions let applications download code into the kernel to achieve a f iner grain of protection: The File Zystems Most file system functions are left to untrusted library file systems libFSes —Will share access to the stable storage disk —Can define new file types with arbitrary metadata formats Problem is to give maximum of flexibility to these libFses while protecting files from unauthorized accesses.
XN I Provides access to stable storage at the level of disk blocks Exports a buffer cache registry contains only metadata Main problem is to decide when to allow or disallow access to a specific block —Difficult problem because each libFS may use different metadata. XN II XN uses UDF untrusted deterministic functions —Specific to a user-defined metadata type — own-udf T m returns set of blocks to which instance m of metadata type T point to —Stored in templates one per file type —Cannot be changed after they are specified.
Xok exposes —The capabilities of the hardware like all MMU protection bits —Many kernel data structures like free lists and inverse page mappings Paging is handled by applications.
A Modern Perspective, Chapter More on Processes Chapter 3.
My presentations Profile Feedback Log out. Auth with social network: Registration Forgot your password?