Skip to content

XBDM hack corrupts xboxkrnl.exe #14

@JayFoxRox

Description

@JayFoxRox

Our call command from #12 uses the xboxkrnl.exe header at 0x80010000. We should instead improve the assembly to use code-relative addressing. The easiest is probably by writing a pointer to the communication space to the code and just loading the pointer from that. Alternatively, the old call f; f: pop eax trick.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions