Reconstructing Omni-kernel control flow
Today, with the prevalence of many- and multi-core systems has it been sparked a new interest for programming models that permits developer to exploit their resources. This has sparked renewed interest in creating larger event-based systems, systems where stack ripping occurs and with an obfuscated control flow. Both increases the complexity of debugging errors. During the development of the event-based experimental research OS and VMM Vortex saw we the need for tools that could aid developers to handle these challenges. This thesis design and implements two tools that allow users to gain insights into an obfuscated control flow and see when and why a state change was done. We propose a design and implements two tools that are simple, flexible, and lightweight enough to live inside of the critical path of event processing in Vortex. First is a tool to observe the messages being passed to and from one resource, enabling the de-obfuscation of the control flow. The second tool uses the built-in debugging tool in modern CPU to tie state access and change to the processing of one event. Both of these tools creates debug messages that are being visualized in a remote client.
ForlagUiT Norges arktiske universitet
UiT The Arctic University of Norway
Følgende lisensfil er knyttet til denne innførselen: