|
From: Julian S. <js...@ac...> - 2008-10-11 09:40:35
|
> I've written a tool that piggy backs onto of exp-ptrcheck and it seems
> to be working pretty well.
Sounds interesting. What does it do?
> if (o == GOF(EBX)+1 && is21) { o -= 1; o -= 0; goto contains_o; }
>
> and it seems to fix the crash. Does that look correct? or is there
> some other reason why this case was missing.
Yes, that looks right. I added those cases on-demand, so as to always
have at least one test example for each case (if you see what I mean)
and I guess this case never happened. It corresponds to an access to
the byte register %bh. Strange though, since I tested on some very
large applications.
J
|