A forum for reverse engineering, OS internals and malware analysis 

Forum for discussion about kernel-mode development.
 #10339  by madaboo
 Tue Dec 13, 2011 3:11 pm
Hi,

Any ideas how to obtain SYSENTER_EIP_MSR (unexported nt!kiFastCallEntry) in kernel module?
Only way I see is to attach to user process, call any zw api then get call stack and tkae address of kitrap - however I'm not sure if it can work?
Any ideas guys?

Thanks!
 #10345  by madaboo
 Tue Dec 13, 2011 4:24 pm
rkhuner.. Yeah I know I can do it like this .. but I'm looking for C/C++ solution without asm..
but maybe there is no such solution?

Thanks a lot anyway!