LibVMI: Simplified Virtual Machine Introspection
LibVMI is a virtual machine introspection library. This means that it helps you access the memory of a running virtual machine. LibVMI provides primitives for accessing this memory using physical or virtual addresses and kernel symbols. LibVMI also supports accessing memory from a physical memory snapshot, which is helpful for debugging or forensic analysis.
In addition to memory access, LibVMI supports memory events. Events provide notifications when registered regions of memory are executed, written to, or read. Memory events require hypervisor support and are currently only available with Xen.
LibVMI is designed to run on Linux (file, Xen, or KVM access) or Mac OS X (file access only). The most used platform is Linux + Xen, but the others are well tested and worth exploring as well. LibVMI can provide access to physical memory for any operating system, and access to virtual memory and kernel symbols from Windows and Linux.
If you would like higher level semantic information, then we suggest using the LibVMI Python bindings and Volatility. Volatility (https://github.com/volatilityfoundation/volatility/) is a forensic memory analysis framework supporting both Linux and Windows systems that can aid significantly in performing useful memory analysis tasks. The LibVMI Python bindings includes a Volatility address space plugin that enables you to use Volatility on a live virtual machine.
This file contains very basic instructions to get you up and running. If you want more details about installation, or programming with LibVMI, then see the documentation included in the doc/ subdirectory of LibVMI, or view the documentation online at http://www.libvmi.com.
The following libraries are used in building this code:
libtoolGeneric library support script
bison(optional, for reading the configuration file)
flex(optional, for reading the configuration file)
Installing the dependencies on Ubuntu:
$ sudo apt-get install cmake flex bison libglib2.0-dev libvirt-dev libjson-c-dev libyajl-dev
LibVMI uses the [CMake](https://cmake.org/) build system. To compile this library, simply follow the steps below:
mkdir build cd build cmake .. make
The example code will work without installing LibVMI.
You can specify a different install prefix with
cmake -DCMAKE_INSTALL_PREFIX=/usr ..
The default installation prefix is
/usr/local. You may need to run
ldconfig after performing a
For a complete view of the build options, using
ccmake tool is prefered if
Otherwise, look at
Installation and Configuration
For complete details on installation and configuration, please see the related online documentation:
LibVMI provides support for Xen out-of-the-box. If you install Xen from source, make sure the Xen libraries compiled from source are in your LD_LIBRARY_PATH. You don't have to recompile LibVMI if you update Xen as LibVMI is able to detect what version of Xen you have dynamically at runtime.
Compiling LibVMI on a XenServer dom0 can be challenging as there are no development headers and tools present. The recommended way to compile is in a separate CentOS installation using the Xen development packages matching what XenServer runs on. The compiled LibVMI library and tools can then be transferred to the XenServer dom0 and run natively.
LibVMI will have KVM support if libvirt is available during compile time. Ensure that your libvirt installation supports QMP commands, most prepackaged versions do not support this by default so you may need to install libvirt from source yourself. To enable QMP support when installing from source, ensure that you have libyajl-dev (or the equivalent from your linux distro) installed, then run the configure script from libvirt. Ensure that the configure script reports that it found yajl. Then run make && make install.
Currently there is no native VMI support in KVM, so you have two options for adding it:
Patch QEMU-KVM with the provided patch. This technique will provide the fastest memory access, but is buggy and may cause your VM to crash / lose data / etc. To use this method, follow the instructions in the libvmi/tools/qemu-kvm-patch directory.
Enable GDB access to your KVM VM. This is done by adding '-s' to the VM creation line or, by modifying the VM XML definition used by libvirt as follows:
to:<domain type='kvm' xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0'>
Add:<qemu:commandline> <qemu:arg value='-s'/> </qemu:commandline>
under the <domain> level of the XML.
You only need one memory access technique. LibVMI will first look for the QEMU-KVM patch and use that if it is installed. Otherwise it will fall back to using GDB. So if you want to use GDB, you should both enable GDB and ensure that QEMU-KVM does not have the LibVMI patch.
LibVMI is written in C. If you would rather work with Python, then look at the
libvmi/python` repository. They provide an almost feature complete python
interface to LibVMI with a relatively small performance overhead.
File / Snapshot Support
If you would like LibVMI to work on physical memory snapshots saved to a file, then you don't need any special setup.
Volatility3 Intermediate Symbol Table (IST) Format
LibVMI supports the use of Volatility3's IST JSONs for introspecting Windows and Linux. By using these jsons, LibVMI is able to bypass the use if the in-memory KdDebuggerData (KDBG) structure normally used by memory forensics tools and thus allows introspecting domains where this structure is either corrupted, or encoded (like in the case of Windows 8 x64). However, these ISTs have to be created for each kernel version, and therefore if an update is made to the kernel, the JSON file has to be re-generated, thus it's a bit less stable as the standard LibVMI configuration entries.
Volatility3 is available at https://github.com/volatilityfoundation/volatility3.
To read about how to generate the IST see: https://volatility3.readthedocs.io/en/latest/symbol-tables.html.
Note: Rekall is no longer maintained. Support for Rekall profiles will be deprecated.
LibVMI also supports the use of Rekall profiles for introspecting Windows and Linux. By using Rekall profiles, LibVMI is able to bypass the use if the in-memory KdDebuggerData (KDBG) structure normally used by memory forensics tools and thus allows introspecting domains where this structure is either corrupted, or encoded (like in the case of Windows 8 x64). However, Rekall profiles have to be created for each kernel version, and therefore if an update is made to the kernel, the profile has to be re-generated, thus it's a bit less stable as the standard LibVMI configuration entries.
Rekall is available at https://github.com/google/rekall.
To create a Rekall profile for Windows you can use the rekall_offset_finder.py script that ships with LibVMI. See https://github.com/libvmi/libvmi/blob/master/tools/windows-offset-finder for more details. If you need to examine an on-disk version of the kernel (or any other PE executable), you can run the following the Rekall command:
rekall peinfo -f <path/to/ntoskrnl.exe>
Once the PDB filename and GUID is known, creating the Rekall profile is done in two steps:
rekall fetch_pdb <PDB filename> <GUID> rekall parse_pdb <PDB filename> > rekall-profile.json
The PDB filename should not have the .pdb extension in the above commands.
To create a Rekall profile for Linux follow the instructions at https://github.com/google/rekall/tree/master/tools/linux
The Rekall profile can be used directly in the LibVMI config via an additional rekall_profile entry pointing to this file with an absolute path. There is no need to specify any of the offsets normally required as those offsets will be available via the profile itself.
To enable LibVMI debug output, look at the
libvmi/debug.h header file,
and set the CMake
VMI_DEBUG option accordingly.
Example to enable all debug output:
cmake -DVMI_DEBUG=__VMI_DEBUG_ALL ..
Example to enable selective output (XEN and CORE)
cmake -DVMI_DEBUG='(VMI_DEBUG_XEN | VMI_DEBUG_CORE)' ..
The LibVMI forums are available at https://groups.google.com/forum/#!forum/vmitools