[vbox-dev] Running Guest Ring 0 Code Natively
Sander van Leeuwen
sandervl at innotek.de
Thu Nov 8 02:45:08 PST 2007
We already have code in place which does exactly that. There are limits
as to how much you can scan though.
See /src/VBox/VMM/PATM/CSAM.cpp, CSAMR3CheckCodeEx. Called before
executing ring 0 code in
raw mode (/src/VBox/VMM/EM.cpp).
Ryan Riley wrote:
> I'm doing a small hack on VirtualBox for a local research project and
> was hoping someone could point me in the right direction for what I
> want to do. Basically, before a piece of guest ring 0 code gets
> executed, I want to know what addresses may potentially get run. I
> can do this fairly easily by setting pVM->fRawR0Enabled=false and
> hacking the recompiler to check each instruction before translating it
> (which is what I do now) but for performance reasons I would really
> like to scan the code right before execution and let it run natively
> if there are no problems. Does anyone have any thoughts on where I
> could get started?
>
> Thanks
> Ryan
>
> _______________________________________________
> vbox-dev mailing list
> vbox-dev at virtualbox.org
> http://vbox.innotek.de/mailman/listinfo/vbox-dev
>
--
Kind regards / mit freundlichen Gruessen / Met vriendelijke groet
Sander van Leeuwen
innoTek GmbH
sandervl at innotek.de
http://www.innotek.de
Germany
More information about the vbox-dev
mailing list