VMware, Inc.
Target injection safe method for inlining instance-dependent calls
Last updated:
Abstract:
A method for redirecting indirect calls to direct calls on a per-process basis includes accessing a memory code region of an operating system kernel that has a different mapping for each of one or more user processes running on the operating system kernel. The memory code region stores a first trampoline that refers directly to a second trampoline, which is an inline or outline trampoline that is correlated with a particular user process. Executing the first trampoline invokes the second trampoline, as a result of which the indirect calls are redirected to direct calls.
Status:
Grant
Type:
Utility
Filling date:
24 Jul 2019
Issue date:
25 May 2021