On 2005.05.23 at 17:30:04 +0200, Andy Polyakov wrote:

> 
> Buf if you issue disassemble command at debugger prompt, you should see 
> that you're in _init and if you follow to failing address you're most 
> likely to spot mov (%eax),%al, right?

You are right:
Dump of assembler code for function _init:
0xdfb1b7c0 <_init+0>:   call   0xdfa6532c <frame_dummy>
0xdfb1b7c5 <_init+5>:   add    %al,(%eax)
0xdfb1b7c7 <_init+7>:   add    %al,(%eax)
0xdfb1b7c9 <_init+9>:   add    %al,(%eax)
0xdfb1b7cb <_init+11>:  add    %al,(%eax)
0xdfb1b7cd <_init+13>:  add    %al,(%eax)
0xdfb1b7cf <_init+15>:  add    %ch,%al
0xdfb1b7d1 <_init+17>:  inc    %edi
0xdfb1b7d2 <_init+18>:  mov    %eax,0x9ebfff4
0xdfb1b7d7 <_init+23>:  nop    
0xdfb1b7d8 <_init+24>:  nop    
x/23cx 0xdfb1b7c0
0xdfb1b7c0 <_init>:   0xe8  0x67  0x9b  0xf4 0xff  0x00 0x00    0x00
0xdfb1b7c8 <_init+8>: 0x00  0x00  0x00  0x00 0x00  0x00 0x00    0x00
0xdfb1b7d0 <_init+16>:0xe8  0x47  0xa3  0xf4 0xff  0xeb 0x09
 
Of course, it is add rather than mov, because add instruction has zero
opcode on intel. 
 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to