Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Abstracting the Content of System Call Traces Waseem Fadel Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering Concordia University.

Similar presentations


Presentation on theme: "1 Abstracting the Content of System Call Traces Waseem Fadel Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering Concordia University."— Presentation transcript:

1 1 Abstracting the Content of System Call Traces Waseem Fadel Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering Concordia University Montréal, QC, Canada {w_fadel, abdelw}@ece.concordia.ca

2 2 Objective of the Trace Abstraction and Analysis Track (Reminder) Develop trace abstraction techniques and tools to facilitate the understanding and analysis of the content of large event-based system call traces

3 3 Benefits Help users understand the behavioural aspects of a system Allow automated comparison of multiple traces based on the system behaviour and not a mere set of events Monitor the system performance to detect service degradation Ensure that subsequent revisions of a software system have not introduced programming errors Compare traces of redundant servers, performing the same work in order to detect any malfunction possibly caused by a security breach

4 4 Proposed Approach Trace Generated from Linux Kernel (LTTng events) Trace Abstraction Algorithm Based on Pattern Matching and Filtering of Noise High-Level Trace

5 5 Pattern Library We built a pattern library that contains several patterns that represent key Linux kernel operations File, socket and process management operations The patterns are modeled as state machines States represent system modes (user_mode, sys_call mode, etc.) Events consist of LTTng events

6 6 Patterns we have so far We completed the pattern library to include the following operations: File Management (Open, Read, Write, Seek, Access, File Manipulation with fcntl, Stat, Close) Socket Management for both TCP and UDP (Create, Connect, Bind, Listen, Accept, Send, Receive, Close) Process Management (Execution with exec and execve, Exit, Fork, Clone, Get Resource Limit, Get Time of The Day, New UName, Unlink, Read Link)

7 7 Filtering of Trace Noise We define noise in an LTTng trace as any event associated with memory management, page faults, and interrupts Are dependent on a specific kernel version Can occur anywhere in the trace and in any order Are treated similarly to the way utilities have been treated in related work Associated events are treated as a set i.e. order of occurrence of detailed events is ignored

8 8 Validation of Patterns The patterns have been validated by Pierre-Marc Fournier and Mathieu Desnoyers from École Polytechnique de Montréal Regular meetings with them have also helped in the process of understanding the markers, the system calls, and the main modes of execution Both users agreed with the way we defined noise found in traces

9 9 The Linux Kernel Trace Abstraction Tool The tool takes as input a trace generated from LTTng tracer It applies our approach to that trace Outputs the trace in its abstracted format It has been developed in Java as an Eclipse plug-in

10 10 The Linux Kernel Trace Abstraction Tool (cont.) The tool was designed to accept patterns defined as external XML files SYSCALL_SAMPLE SYSCALL_SAMPLED USER_MODE_SAMPLED

11 11 The Linux Kernel Trace Abstraction Tool (cont.)

12 12 The Linux Kernel Trace Abstraction Tool (cont.) The tool consists of three parts: The top part, through which the developer can provide the tool with the required information The middle part, displays the trace resulting from the abstraction process The bottom part, displays the information related to the original and abstracted traces The following slides show the architecture and the class diagram

13 13 Architecture Partitioned both horizontally and vertically Easy to extend (to add new system calls patterns or even patterns for different calls) Easy to maintain (to modify existing patterns or the design itself)

14 14 Horizontal Partitioning Horizontal partitioning is performed by defining the main domains of the system

15 15 Vertical Partitioning

16 16 Vertical Partitioning (cont.) Divide the system into different layers Define the interfaces between layers Presentation layer can be developed without affecting lower layers (Multiple GUIs can be provided for the same data) Components from different layers can be designed, implemented and maintained independently

17 17 Class Diagram

18 18 Class Diagram (cont.) Adding new patterns and high-level constructs can easily be done by sub- classing the appropriate classes and interfaces Multiple implementations representing different trace formats can be applied using the same interfaces High level constructs are easy to further abstract

19 19 Case Studies We applied our approach to large traces generated while running different processes One process was the java virtual machine which was running a distributed file server and a client Another process was the eclipse framework Third process was gedit Fourth process was GIMP image editor The final process was firefox

20 20 Case Studies (cont.) Compression Ratio Size after Abstraction Initial size Process 73%3259021226985Eclipse 73%229778847575GIMP 60%257282646710Firefox 51%90482186167Gedit 93%303347271JVM

21 21 Case Studies (cont.) SEQ(1) Socket Create: family = 2, type = 2, protocol = 0, sock = 0xd563d340, ret = 8 SEQ(1) Socket Connect: fd = 8, uservaddr = 0x80569c8, addrlen = 28, ret = 0 SEQ(2) File Stat: ip = 0xb7f78430, syscall_id = 221 [sys_fcntl64+0x0/0xb0] SEQ(1) Get Time of Day: ip = 0xb7f78430, syscall_id = 78 [sys_gettimeofday+0x0/0x80] SEQ(1) Unknown Event: Event name: pollfd, Params: fd = 8 SEQ(1) Unknown Event: Syscall name: sys_poll, Params: ip = 0xb7f78430, syscall_id = 168 [sys_poll+0x0/0xc0] SEQ(1) Socket Send: call = 9, a0 = 8 SEQ(4) Unknown Event: Event name: pollfd, Params: fd = 8 SEQ(1) Process Schedule: prev_pid = 0, next_pid = 23566, prev_state = 0 … SEQ(1) Unknown Event: Syscall name: sys_futex, Params: ip = 0xb7f78430, syscall_id = 240 [sys_futex+0x0/0x130] SEQ(1) Unknown Event: Syscall name: sys_clock_gettime, Params: ip = 0xb7f78430, syscall_id = 265 [sys_clock_gettime+0x0/0xa0] SEQ(1) Get Time of Day: ip = 0xb7f78430, syscall_id = 78 [sys_gettimeofday+0x0/0x80] SEQ(1) File Access: ip = 0xb7f78430, syscall_id = 33 [sys_access+0x0/0x30] SEQ(1) File Write: fd = 19 SEQ(1) Socket Receive: call = 10, a0 = 19 SEQ(1) Process Exit: Process Exit: pid = 23580, cpu_id = 1, state = 1, Send Signal: pid = 23610, cpu_id = 1, state = 1, Sched Try Wakeup: pid = 23972, cpu_id = 1, state = 1 A snapshot of the traces resulting from the abstraction of the JVM process

22 22 Remaining Challenges Continuous improvement of the pattern library Defining additional patterns Dealing with new LTTng events Using higher level constructs to further abstract the resulting traces Improving the algorithm in terms of performance Embedding the tool with the LTTv

23 23 Conclusion We introduced techniques to abstract execution traces resulting from the Linux kernel Our approach is based on building a pattern library that consists of patterns of the most common operations in Linux We also defined noise patterns that result from memory management operations and page faults We introduced an algorithm to abstract the system call traces by using the pattern library We applied our techniques to traces generated from several processes

24 24 Pattern Library

25 25 File Management: Open & Close Open FileClose File

26 26 File Management: Read & Write Write to File Read from File

27 27 Socket Management (1) Create Bind Listen

28 28 Socket Management (2) Connect Receive Send

29 29 Socket Management (3) TCP Connection

30 30 Process Management (1)

31 31 Process Management (2) Execution with exec with execve Exit Cloning

32 32 Other Patterns File Control Read Link Unlink Get Resource Limit New UName

33 33 Thank You! Questions?


Download ppt "1 Abstracting the Content of System Call Traces Waseem Fadel Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering Concordia University."

Similar presentations


Ads by Google