We already have code in place which does exactly that. There are limits as to how much you can scan though. See /src/VBox/VMM/PATM/CSAM.cpp, CSAMR3CheckCodeEx. Called before executing ring 0 code in raw mode (/src/VBox/VMM/EM.cpp).
Ryan Riley wrote: > I'm doing a small hack on VirtualBox for a local research project and > was hoping someone could point me in the right direction for what I > want to do. Basically, before a piece of guest ring 0 code gets > executed, I want to know what addresses may potentially get run. I > can do this fairly easily by setting pVM->fRawR0Enabled=false and > hacking the recompiler to check each instruction before translating it > (which is what I do now) but for performance reasons I would really > like to scan the code right before execution and let it run natively > if there are no problems. Does anyone have any thoughts on where I > could get started? > > Thanks > Ryan > > _______________________________________________ > vbox-dev mailing list > [email protected] > http://vbox.innotek.de/mailman/listinfo/vbox-dev > -- Kind regards / mit freundlichen Gruessen / Met vriendelijke groet Sander van Leeuwen innoTek GmbH [EMAIL PROTECTED] http://www.innotek.de Germany _______________________________________________ vbox-dev mailing list [email protected] http://vbox.innotek.de/mailman/listinfo/vbox-dev
