This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] Modifying Xen hypervisor... but first some questions :)

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Modifying Xen hypervisor... but first some questions :)
From: Jonathon <thejunkjon@xxxxxxxxx>
Date: Thu, 3 Dec 2009 09:53:40 -0800
Delivery-date: Thu, 03 Dec 2009 09:54:04 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=lMxBQe8sVitrfQAyj3KIFbBDrOtQKQQ66atLeJIAhhI=; b=qzMegyT/N5jA1QOTQb6FyV0GOvI532X6n1akiOp/lMf54jfpWXEmhy42XbfN/wGm1v eghITjmZ06E1KNuKu1QSJam2Ox92TkGJK9QeAiB0f+3gbFsuD6O5+oXvdl6DJmKRhM5g bXSCEv6BgDpxa6k9t/PzIRV7v9BvRUrTv2188=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=NitVkylxmDO+D8YDlrhcJ/ViXkMF0cJnntWovMLJuWT4DZb7h1IiviZyOoQVEM0ZC1 vKEXTxzPi8vNyfr681YaFLBgF20ym0MquGdfpBuWgNOurZl2FjufsSYiw9YzutMIXdVO 0A5oCmJ7CdTNOY+nQBhptCAuV+uuZrBRlNV3o=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hello all,

I am currently performing a research project that involves modifying
the Xen hypervisor to monitor how specific data is being manipulated
within the VMs.  I've just started looking at the architecture of Xen
as well as briefly going over some of the source code.  Before I go
any further though, I'd like to ask a few questions:

1) How practical is it for me to implement this? I need to determine
which exact files are being modified.  My solution does not have to be
a pure hypervisor-based solution.  I could use paravirtualization to
inspect the internals of the OS if necessary.
2) Has anyone done something similar? and if so, what are some of the
challenges they've run up against using Xen?
3) Besides looking at the Xen wiki, Xen source code, and Xen
documentation, are there other useful sources I can use?


Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>