hey, dbtid :)
here is something funny to check - http://www.youtube.com/watch?v=M4KX7SkDe4Q
for the instruction cmpl $0x0008, 0xfffffff0(%ebp)
would 0xfffffff0(%ebp) be a stack variable?
maybe maybe not
depends on the value of ebp and esp :)
but usually it is
thanks just experimenting
is there a way of getting GDB to examine whats at 0xfffffff0(%ebp) ?
like if i break at that instruction
i r $ebp gives 0xbfc0d728
don't there is a x command ?
like x -0x10(%ebp)
x/x fffffff0($ebp) gives a segfault as memory is out of bounds
i guess what i need to find out is how the offset of fffffff0 works....
of course if the pointer is not valid
gdb won't show you memory
just display all registers
when i break at that instruction %ebp is set to 0xbfc0d728
and you'll see if pointer is invalid
it doesn't look like so bad
if you see my reverse enginering attempt its line 14, which executes fine but at debug time i can peel at the address 0xfffffff0(%ebp)
anyone available ?