Why do Windows functions all begin with a MOV EDI, EDI instruction? (2011) devblogs.microsoft.com 22 points by Tomte 2 months ago
burnt-resistor 2 months ago This potentially violates W^X, self-modifying code hurts the instruction cache, and it's probably less secure too.
kristianp 2 months ago Are these patches for dealing with bugs in popular old programs? rolph 2 months ago if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]
rolph 2 months ago if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]
This potentially violates W^X, self-modifying code hurts the instruction cache, and it's probably less secure too.
Are these patches for dealing with bugs in popular old programs?
if you want to say bugs, ok but this goes beyond bugs, this ensures there is a space to install a jmp out of the function to execute your patch [haxed version of the function]