wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).
The way @fptw was handled has been wrong for a long time but I finally figured out. This updates all the backends to do the right thing.
Other more minor changes:
The code that reads the CPU state has been updated to be compatible with snapshot. It also should be now able to load precise values for 80-bit registers. Loading 'old' dumps should also work as they were before (with the buggy code) to not break them
The way
@fptw
was handled has been wrong for a long time but I finally figured out. This updates all the backends to do the right thing.Other more minor changes:
@fpst
registers with afrac
/exponent
(cf https://github.com/yrp604/bochscpu/commit/cab805101cbcaf0c722ef266abdece8745676f44)