-
-
[转帖]Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI
-
发表于: 2020-12-15 19:16 1606
-
[转帖]Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI
Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI
Dec 14, 2020 • Andrei Lutas
Introduction
Hypervisor Memory Introspection, as its name implies, relies heavily an analyzing guest memory contents in order to infer details about the OS structures or to analyze the behavior of the kernel and applications. This works perfectly as long as only physical memory or resident virtual memory is analyzed (for example, guest page-tables, or non-paged kernel memory). Many times, however, regions of the Windows kernel memory or regions belonging to user-mode processes will not be mapped in physical memory, thus preventing HVMI from analyzing their contents. In this blog post, we will describe how we deal with swapped-out guest memory, in order to ensure HVMI will get a chance to analyze the contents of a memory page even if it is not resident in physical memory: meet the page-fault injection mechanism!
https://hvmi.github.io/blog/2020/12/14/pfinjection.html