2/14/2023 0 Comments Windows 10 update rageUnlike UNIX-derived OSes, in Windows you are not allowed to delete a file while a process has it open furthermore, when a program is executing, the OS keeps its EXE file (and any DLLs) open in case the virtual memory subsystem needs to page in code from disk. Part of the problem here is Windows' file system semantics. It's a tough problem, but it needs to be solved somehow as opposed to just trying to skirt the issue like MS keeps trying to do. What do you do if the program is currently inside the function call the security patch modifies? This also ignores the possibility that the program is currently inside one of the images you are changing (ie it's in the middle of a system call). But, if you do that, then any pointers to the function may be invalid as the image changed. The problem with this approach is changing the files on disk and leaving the executable images the same doesn't close the security hole, you have to also edit the copy of the file in each process's memory. Also, they need to start working on the ability to suspend processes to allow specific files to be updated, rather than requiring the OS to be shut down in the first place.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |