home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!haven.umd.edu!darwin.sura.net!wupost!gumby!yale!mintaka.lcs.mit.edu!ai-lab!zurich.ai.mit.edu!jinx
- From: jinx@zurich.ai.mit.edu (Guillermo J. Rozas)
- Newsgroups: comp.sys.intel
- Subject: Re: 386 <-> 486 incompatibilities
- Message-ID: <JINX.92Aug13224100@chamarti.ai.mit.edu>
- Date: 14 Aug 92 02:41:00 GMT
- References: <16ds34INNpvn@fbi-news.Informatik.Uni-Dortmund.DE>
- <1992Aug13.232325.930@colorado.edu>
- Sender: news@ai.mit.edu
- Reply-To: jinx@zurich.ai.mit.edu
- Organization: M.I.T. Artificial Intelligence Lab.
- Lines: 18
- In-reply-to: drew@ophelia.cs.colorado.edu's message of 13 Aug 92 23:23:25 GMT
-
- In article <1992Aug13.232325.930@colorado.edu> drew@ophelia.cs.colorado.edu (Drew Eckhardt) writes:
-
- | >-Is there a way to detect this kind of self-modification
- | > either at runtime (say, with a small TSR debugger-like program) or
- | > scanning the assembly-code sources.
- |
- | Scanning the assembly code should do it.
- |
-
- That is not completely true. A program that dynamically creates and
- executes code can create and execute code that modifies itself within
- the prefetch buffer, even though the original did not.
-
- Both the Gambit and MIT Scheme compilers (and others as well) have had
- to deal with this problem in the past, and in no case was the code
- apparent from looking at the sources, since it was dynamically created
- and executed code.
-
-