Reverse Engineering Asked by Qwark on July 19, 2021
I am currently reversing RUST binaries, and I often come across this block of instruction :
.text:000055F4BFB943F2 db 2Eh
.text:000055F4BFB943F2 nop word ptr [rax+rax+00000000h]
.text:000055F4BFB943FC nop dword ptr [rax+00h]
Which probably does nothing. I can see the rogue byte at the beginning, but pressing C
on IDA to disassemble from there gives no result. Thus, I am wondering why rust compiler create those instructions as they appear to be useless.
These are instructions used for alignment. You can see that the last instruction ends on a 16-byte boundary (000055F4BFB94400
).
Correct answer by Igor Skochinsky on July 19, 2021
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP