
pretalx.com/devconf-us-2024/talk/7V97QQ
Preview meta tags from the pretalx.com website.
Linked Hostnames
2Thumbnail
Search Engine Appearance
Porting and Generalizing Dynamic Privilege in Linux - Devconf.US pretalx
Dynamic Privilege is the ability for an authorized process to acquire and relinquish hardware privilege (supervisor privilege) on the fly. Recent work in our research group introduced the notion of Dynamic Privilege, and the attendant kernel mechanisms to introduce it to the Linux kernel. This permits the exploration of several interesting optimizations and novel approaches to system specialization - for example, shortcutting long code paths by calling internal kernel routines. The initial implementation was developed in x86_64. In this talk, we will present our work in porting the core primitives for Dynamic Privilege to ARM64 and discuss the details of this approach. Through a comparison of the ARM64 and x86 implementations, we will seek to differentiate the functional goal of Dynamic Privilege from the underlying architectural mechanisms. In doing so, we will summarize what we have learned through the process of generalizing its implementation beyond a single architecture. Finally, we will discuss how our experiences introducing the mechanism to ARM64 inform a natural path towards a RISC-V implementation which we will briefly introduce.
Bing
Porting and Generalizing Dynamic Privilege in Linux - Devconf.US pretalx
Dynamic Privilege is the ability for an authorized process to acquire and relinquish hardware privilege (supervisor privilege) on the fly. Recent work in our research group introduced the notion of Dynamic Privilege, and the attendant kernel mechanisms to introduce it to the Linux kernel. This permits the exploration of several interesting optimizations and novel approaches to system specialization - for example, shortcutting long code paths by calling internal kernel routines. The initial implementation was developed in x86_64. In this talk, we will present our work in porting the core primitives for Dynamic Privilege to ARM64 and discuss the details of this approach. Through a comparison of the ARM64 and x86 implementations, we will seek to differentiate the functional goal of Dynamic Privilege from the underlying architectural mechanisms. In doing so, we will summarize what we have learned through the process of generalizing its implementation beyond a single architecture. Finally, we will discuss how our experiences introducing the mechanism to ARM64 inform a natural path towards a RISC-V implementation which we will briefly introduce.
DuckDuckGo

Porting and Generalizing Dynamic Privilege in Linux - Devconf.US pretalx
Dynamic Privilege is the ability for an authorized process to acquire and relinquish hardware privilege (supervisor privilege) on the fly. Recent work in our research group introduced the notion of Dynamic Privilege, and the attendant kernel mechanisms to introduce it to the Linux kernel. This permits the exploration of several interesting optimizations and novel approaches to system specialization - for example, shortcutting long code paths by calling internal kernel routines. The initial implementation was developed in x86_64. In this talk, we will present our work in porting the core primitives for Dynamic Privilege to ARM64 and discuss the details of this approach. Through a comparison of the ARM64 and x86 implementations, we will seek to differentiate the functional goal of Dynamic Privilege from the underlying architectural mechanisms. In doing so, we will summarize what we have learned through the process of generalizing its implementation beyond a single architecture. Finally, we will discuss how our experiences introducing the mechanism to ARM64 inform a natural path towards a RISC-V implementation which we will briefly introduce.
General Meta Tags
13- titlePorting and Generalizing Dynamic Privilege in Linux :: Devconf.US :: pretalx
- charsetutf-8
- titlePorting and Generalizing Dynamic Privilege in Linux - Devconf.US pretalx
- descriptionDynamic Privilege is the ability for an authorized process to acquire and relinquish hardware privilege (supervisor privilege) on the fly. Recent work in our research group introduced the notion of Dynamic Privilege, and the attendant kernel mechanisms to introduce it to the Linux kernel. This permits the exploration of several interesting optimizations and novel approaches to system specialization - for example, shortcutting long code paths by calling internal kernel routines. The initial implementation was developed in x86_64. In this talk, we will present our work in porting the core primitives for Dynamic Privilege to ARM64 and discuss the details of this approach. Through a comparison of the ARM64 and x86 implementations, we will seek to differentiate the functional goal of Dynamic Privilege from the underlying architectural mechanisms. In doing so, we will summarize what we have learned through the process of generalizing its implementation beyond a single architecture. Finally, we will discuss how our experiences introducing the mechanism to ARM64 inform a natural path towards a RISC-V implementation which we will briefly introduce.
- application-namepretalx
Open Graph Meta Tags
4- og:imagehttps://pretalx.com/devconf-us-2024/talk/7V97QQ/og-image
- og:titlePorting and Generalizing Dynamic Privilege in Linux Devconf.US
- og:descriptionDynamic Privilege is the ability for an authorized process to acquire and relinquish hardware privilege (supervisor privilege) on the fly. Recent work in our research group introduced the notion of Dynamic Privilege, and the attendant kernel mechanisms to introduce it to the Linux kernel. This permits the exploration of several interesting optimizations and novel approaches to system specialization - for example, shortcutting long code paths by calling internal kernel routines. The initial implementation was developed in x86_64. In this talk, we will present our work in porting the core primitives for Dynamic Privilege to ARM64 and discuss the details of this approach. Through a comparison of the ARM64 and x86 implementations, we will seek to differentiate the functional goal of Dynamic Privilege from the underlying architectural mechanisms. In doing so, we will summarize what we have learned through the process of generalizing its implementation beyond a single architecture. Finally, we will discuss how our experiences introducing the mechanism to ARM64 inform a natural path towards a RISC-V implementation which we will briefly introduce.
- og:urlhttps://pretalx.com/devconf-us-2024/talk/7V97QQ/
Link Tags
6- alternatehttps://pretalx.com/api/events/devconf-us-2024/talks/7V97QQ
- apple-touch-icon/static/common/img/icons/apple-touch-icon-180x180.9cd0735ee8ec.png
- icon/static/common/img/icons/favicon.f79e2b95f18d.ico
- stylesheet/static/CACHE/css/output.9d72a867cc60.css
- stylesheet/devconf-us-2024/static/event.css
Emails
1Links
10- https://pretalx.com/devconf-us-2024/login/?next=/devconf-us-2024/talk/7V97QQ
- https://pretalx.com/devconf-us-2024/schedule
- https://pretalx.com/devconf-us-2024/speaker
- https://pretalx.com/devconf-us-2024/speaker/Q3NUKP
- https://pretalx.com/devconf-us-2024/talk