大约有 13,300 项符合查询结果(耗时:0.0295秒) [XML]
SEH stack 结构探索(1)--- 从 SEH 链的最底层(线程第1个SEH结构)说起 -...
...72e9cfc 55 push ebp
772e9cfd 8bec mov ebp,esp
772e9cff 51 push ecx
772e9d00 51 push ecx
772e9d01 8d45f8 lea eax,[ebp-8]
772e9d04 50 push eax
772e9d05 e8d5ffffff call ntdll32!RtlInitializeE...
Using GCC to produce readable assembly?
... push ebp
1: 89 e5 mov ebp,esp
3: 83 e4 f0 and esp,0xfffffff0
6: 83 ec 10 sub esp,0x10
puts("test");
9: c7 04 24 00 00 00 00 mov DWORD PTR [esp],0x0
10: e8 fc ff ff ff call 11 ...
What is the function of the push / pop instructions used on registers in x86 assembly?
...s r/m, not just register, so you can push dword [esi]. Or even pop dword [esp] to load and then store the same value back to the same address. (github.com/HJLebbink/asm-dude/wiki/POP). I only mention this because you say "not necessarily a register".
– Peter Cordes
...
Why does this loop produce “warning: iteration 3u invokes undefined behavior” and output more than 4
...def
__ZNKSt5ctypeIcE8do_widenEc:
LFB860:
.cfi_startproc
movzbl 4(%esp), %eax
ret $4
.cfi_endproc
LFE860:
LCOLDE0:
LHOTE0:
.section .text.unlikely,"x"
LCOLDB1:
.text
LHOTB1:
.p2align 4,,15
.def ___tcf_0; .scl 3; .type 32; .endef
___tcf_0:
LFB1091:
.c...
C++对象布局及多态探索之菱形结构虚继承 - C/C++ - 清泛网 - 专注C/C++及内核技术
...到子类的成员变量。
01 00426C00 push ebp
02 00426C01 mov ebp,esp
03 00426C03 sub esp,0CCh
04 00426C09 push ebx
05 00426C0A push esi
06 00426C0B push edi
07 00426C0C push ecx
08 00426C0D lea edi,[ebp+FFFFFF34h]
09 00426C13 mov ecx,33h
10 00426C18 mov eax,0CCCCCCCCh
11 ...
Linux反编译全攻略 - 操作系统(内核) - 清泛网 - 专注C/C++及内核技术
...sh ebp
08048971 89 E5 mov ebp, esp
08048973 81 EC 08 00 00 00 sub esp, 0x8
08048979 68 00 00 00 00 push 0x0
0804897E 68 03 00 00 00 push 0x3
08048983 E8 88 FE FF FF ...
What is exactly the base pointer and stack pointer? To what do they point?
...
esp is as you say it is, the top of the stack.
ebp is usually set to esp at the start of the function. Function parameters and local variables are accessed by adding and subtracting, respectively, a constant offset from ebp....
Code Golf: Collatz Conjecture
...;
section .text
global main
extern printf
extern atoi
main:
cmp dword [esp+0x04], 2
jne .usage
mov ebx, [esp+0x08]
push dword [ebx+0x04]
call atoi
add esp, 4
cmp eax, 0
je .usage
mov ebx, eax
push eax
push msg
.loop:
mov [esp+0x04], ebx
call printf
test ebx, 0x01
...
BSS段、数据段、代码段、堆与栈 剖析 - C/C++ - 清泛网 - 专注C/C++及内核技术
...i$ = -404
_main PROC NEAR
; File test.cpp
; Line 13
push ebp
mov ebp, esp
sub esp, 404 ; 00000194H
push edi
; Line 14
mov DWORD PTR _run$[ebp], 1
mov DWORD PTR _run$[ebp+4], 2
mov DWORD PTR _run$[ebp+8], 3
mov DWORD PTR _run$[ebp+12], 4
mov DWORD PTR _run$[ebp+16], 5
mov DWORD PTR _run...
Win32汇编--使用MASM - C/C++ - 清泛网 - 专注C/C++及内核技术
...是单个子程序,在进入子程序的时候,通过修改堆栈指针esp来预留出需要的空间,在用ret指令返回主程序之前,同样通过恢复esp丢弃这些空间,这些变量就随之无效了。它的缺点就是因为空间是临时分配的,所以无法定义含有初...