|
|
|
|
|
|
|
|
|
|
xen-users
RE: [Xen-users] XenAccess Library: Introspection for Xen
Would XenAccess implementation and functionality be the same for both
paravirtualized and fully virtualized (using VT) guests?
I imagine that the changes for VT guests would range somewhere from
none to minimal. However, I haven't actually used XenAccess on VT
hardware yet, so I can't say for sure. If you try it out, please let
me know what you find.
Would the only difference between introspection on a Linux vs
Windows guest
be the closed and undocumented nature of the Windows kernel?
Pretty much. The nice thing is that memory access is more hardware
dependent than OS dependent. Therefore, you should be able to access
virtual addresses on windows just like you can on linux. The trick
is knowing which address to access :-) On linux you can leverage the
source code, system map file, etc to see how things are laid out in
memory. On windows, it's going to be a little tricker to figure out
which addresses to access.
I'm more knowledgeable with linux than I am with windows. So perhaps
there's some information out there that I'm not aware of that would
help with this situation. But, even without extra information, one
should be able to discern quite a bit of information through reverse
engineering techniques.
How difficult would it be to get a look at a running guest's file
system?
Linux seems easy, but I believe Windows guests use vmx images; can the
Windows file system be viewed naturally from the outside?
Having not used VT hardware, I'm not familiar with the vmx image
files. But, assuming that the format is well known, you should be
able to access its contents from dom0. Another option is to tap the
device access between the frontend and backend drivers, which would
allow you to view data as it is being accessed.
Are there any other potential obstacles or difficulties that would
make
various introspection techniques on Windows impossible, difficult,
or merely
a nuisance?
I believe that introspection with Windows should be very doable. In
fact, if you look at the XenAccess source code, you'll see that I've
already started breaking out OS-specific code. My plan is to work on
support for other OSes once linux is up and running. Of course, if
you have any success with windows first, I'd be happy to integrate
the code into subversion.
If you have other questions, feel free to drop me a line and/or post
to the XenAccess mailing list.
Cheers,
bryan
-
Bryan D. Payne
Graduate Student, Computer Science
Georgia Tech Information Security Center
http://www.bryanpayne.org
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
|
|
|
|