|
@vm_call | |||||
|
First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem" vmcall.blog/nt/2019/10/18/…
|
||||||
|
||||||
|
Carl Schou / vm
@vm_call
|
19. lis |
|
Will periodically release unknown methods to circumvent various kernel anti-cheats in this series. This part explains how you can intercept gpu calls and draw to the screen buffer without any ETW traces, unlike normal direct-x implementations.
|
||
|
|
||
|
ko1N
@ko1N1337
|
19. lis |
|
neat 🤙
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
19. lis |
|
you're neat
|
||
|
|
||
|
姜梦人
@RqbAtlgvZ0LAtQY
|
22. stu |
|
amazing! does it trigger patchguard?
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
22. stu |
|
No
|
||
|
|
||
|
h0mbre
@h0mbre_
|
19. lis |
|
This is great, thank u very much
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
20. lis |
|
Sweet job!! as always :)
|
||
|
|
||
|
fox8091
@fox8091_1
|
19. lis |
|
Would this be a decent way to implement VirGL as a low latency, non-exclusive way of having a GPU in a VM?
|
||
|
|
||
|
fox8091
@fox8091_1
|
19. lis |
|
Not VirGL, virtio-gpu
|
||
|
|
||