Re: repeatable header foot pagenum crasher on win32


Subject: Re: repeatable header foot pagenum crasher on win32
From: Randy Kramer (rhkramer@fast.net)
Date: Sun Sep 23 2001 - 21:24:21 CDT


Mike Nordell wrote:
> Randy Kramer wrote:
> > I started the debugger and found the PC at that address ("0x0046eb95").
> > The instruction at this address is:
> > mov ecx.dword ptr(eax+84h)
>
> OK, this one was easy. If you let eax be zero, and change the style for
> displaying hexadecimal from 84h to 0x84, I think it's obvious.

Mike,

Wow! Not obvious to me, but there's probably a reason for that! Thanks
for the response, this will probably be educational for me, once I think
about it enough.

Randy Kramer



This archive was generated by hypermail 2b25 : Sun Sep 23 2001 - 21:25:15 CDT