[vbox-dev] Running Guest Ring 0 Code Natively

Sander van Leeuwen sandervl at innotek.de
Thu Nov 8 02:45:08 PST 2007

We already have code in place which does exactly that. There are limits 
as to how much you can scan though.
See /src/VBox/VMM/PATM/CSAM.cpp, CSAMR3CheckCodeEx. Called before 
executing ring 0 code in
raw mode (/src/VBox/VMM/EM.cpp).

Ryan Riley wrote:
> I'm doing a small hack on VirtualBox for a local research project and
> was hoping someone could point me in the right direction for what I
> want to do.  Basically, before a piece of guest ring 0 code gets
> executed, I want to know what addresses may potentially get run.  I
> can do this fairly easily by setting pVM->fRawR0Enabled=false and
> hacking the recompiler to check each instruction before translating it
> (which is what I do now) but for performance reasons I would really
> like to scan the code right before execution and let it run natively
> if there are no problems.  Does anyone have any thoughts on where I
> could get started?
> Thanks
> Ryan
> _______________________________________________
> vbox-dev mailing list
> vbox-dev at virtualbox.org
> http://vbox.innotek.de/mailman/listinfo/vbox-dev

Kind regards / mit freundlichen Gruessen / Met vriendelijke groet
   Sander van Leeuwen
innoTek GmbH
sandervl at innotek.de

More information about the vbox-dev mailing list