86eff7597d
This PR is for "I/O Interface to Bochs Debugger" from ring3 (port range: **0x8A00 - 0x8A01**) PR #64 was for E9 HACK (port **0xE9**) By enabling the iodebug's 'all_rings' option, you can utilize the port I/O Interface to Bochs Debugger from ring3. This PR allows the code running inside Bochs (ring3) to monitor memory ranges, trace individual instructions, and observe register values during execution. https://bochs.sourceforge.io/doc/docbook/development/debugger-advanced.html IMO very useful for: - user-mode sandbox (ex Cuckoo) - malware analysis - API/SYSCALL hook/monitor from ring3 - automation + instrumentation from user mode code ... A complement for PR #64 **This PR is 100% backward compatibility** ![IODEBUG ALL RINGS](https://github.com/bochs-emu/Bochs/assets/9882181/6308ad0f-c189-43f3-a92b-dccde3542ad6) btw, @stlintel I'm not certain about: - if misc is the ideal location for this.. should I create a new iodebug-option for this? - should I remove the #if in 'new bx_param_bool_c'? - the new .bochsrc entry makes sense for you? |
||
---|---|---|
.. | ||
user.dbk |