-
I have a function with a signature that doesn't make a lot of sense:
This is a relatively normal linux binary, so I'm pretty confident that it doesn't have a weird one-off calling convention. Looking at the body of the function, Im pretty sure strcmp does not take 3 arguments. Instead, what I suspect has happened here is that strcmp has something broken (probably unlifted instructions) which break dataflow, and this type propagates up to this function. Looking at strcmp confirms this, as the function contains an instruction which would initialize x11: From the initial function where I can see the suspected brokenness (sub_4014d0), how can I find the use site for the variable I think is wrong. Said another way: from where I can see the symptom of a problem, how do I quickly navigate to its cause? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
So I think the answer here is Variable Cross references #234 Generally you're going to follow use sites until you find the one that is going to be live. |
Beta Was this translation helpful? Give feedback.
So I think the answer here is Variable Cross references #234 Generally you're going to follow use sites until you find the one that is going to be live.