VMware, Inc.
Target injection safe method for inlining instance-dependent calls

Last updated:

Abstract:

A method for redirecting indirect calls to direct calls on a per-process basis includes accessing a memory code region of an operating system kernel that has a different mapping for each of one or more user processes running on the operating system kernel. The memory code region stores a first trampoline that refers directly to a second trampoline, which is an inline or outline trampoline that is correlated with a particular user process. Executing the first trampoline invokes the second trampoline, as a result of which the indirect calls are redirected to direct calls.

Status:
Grant
Type:

Utility

Filling date:

24 Jul 2019

Issue date:

25 May 2021