Why do Windows functions all begin with a MOV EDI, EDI instruction? (2011) devblogs.microsoft.com 18 points by Tomte 9 hours ago
burnt-resistor 3 hours ago This potentially violates W^X, self-modifying code hurts the instruction cache, and it's probably less secure too.
kristianp 6 hours ago Are these patches for dealing with bugs in popular old programs? rolph 3 hours ago if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]
rolph 3 hours ago if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]
This potentially violates W^X, self-modifying code hurts the instruction cache, and it's probably less secure too.
Are these patches for dealing with bugs in popular old programs?
if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]