skip to main
|
skip to sidebar
Work
Sunday, September 20, 2009
stack and calling conventions
http://unixwiz.net/techtips/win32-callconv-asm.html
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Pages
Home
Usenix security
Labels
_KPCR
(1)
64bit
(1)
9054
(1)
ACPI
(7)
acrobat
(1)
AES
(1)
algorithm
(4)
AMD
(1)
AMT
(1)
Apache
(1)
APC
(1)
APIC
(1)
assembly
(5)
ASUS
(1)
bash
(4)
beep
(1)
BFS
(1)
BIOS
(11)
bochs
(2)
BootP
(1)
bootup
(1)
buddy
(1)
C++
(1)
caller
(1)
cell phone
(1)
CentOS
(8)
Chinese
(1)
Cisco
(1)
clone
(1)
coreboot
(2)
CPU
(2)
cscope
(2)
ctag
(1)
data structure
(1)
DDK
(1)
deadlock
(1)
Debug
(9)
DELL
(1)
device driver
(11)
disk
(3)
dll
(1)
DMA
(1)
DOS
(1)
DPC
(1)
e1000
(2)
EC
(1)
error code
(1)
ESXi
(2)
Excel
(1)
fabric
(1)
facebook
(1)
file
(1)
file system
(1)
finite automata
(1)
firefox
(2)
Flash
(1)
forensics
(1)
FPGA
(1)
Ftrace
(1)
function_call
(1)
FVM
(2)
GAS
(2)
gcc
(3)
GDB
(5)
getopt
(1)
git
(4)
google
(1)
Grammar
(1)
grep
(2)
hash
(1)
heap
(2)
hibernation
(2)
Hyper-V
(2)
HyperSpace
(1)
IDT
(2)
IE
(2)
ifconfig
(1)
initrd
(1)
Intel
(5)
Interrupt
(2)
IO
(3)
ioremap
(2)
Java
(2)
kdump
(1)
kernel
(13)
kernel panic
(3)
kexec
(1)
kobjects
(1)
KVM
(1)
latex
(2)
ldd
(1)
libcap
(2)
libnet
(1)
library
(1)
libvirt
(1)
linked_list
(1)
Linux
(105)
livecd
(1)
liveKd
(1)
LKM
(1)
LOC
(1)
log
(1)
ls
(1)
lxr
(3)
Mac
(1)
Matlab
(2)
memcached
(1)
memory
(4)
MIT opencourseware
(1)
mm
(2)
MSI
(2)
MSR
(1)
Mutex
(1)
nasm
(1)
NDIS
(1)
neighboring
(1)
netcat
(1)
netperf
(1)
network
(8)
network namespaces
(1)
nfs
(1)
NIC
(5)
NUMA
(1)
oops
(2)
openstack
(1)
oprofile
(1)
OS
(1)
OutputDebugString
(1)
page table
(1)
papers
(2)
passthrough
(1)
password
(1)
PC
(1)
PCI
(6)
PCIe
(4)
pdf
(1)
PE
(1)
per-CPU
(1)
perl
(1)
powerpoint
(1)
printk
(1)
process
(4)
PSE
(1)
PXE
(4)
Python
(5)
qemu
(18)
RDO
(1)
RDP
(2)
rdtsc
(1)
real mode
(2)
Reverse Engineering
(1)
rootkit
(3)
route
(1)
RPM
(3)
scale
(1)
scp
(1)
screen
(1)
Segmentation fault
(1)
sendmail
(1)
serial console
(3)
SHA1
(1)
shell
(1)
Shutdown
(2)
skb
(1)
SMI
(1)
SMM
(5)
SMP
(2)
softirq
(1)
SSDT
(1)
ssh
(2)
stack
(1)
STREAM benchmark
(1)
string matching
(1)
Suspend
(3)
svn
(7)
Switch
(1)
Symbol
(1)
sysfs
(1)
syslog
(1)
sysrq
(1)
tab
(1)
tasklet
(1)
tc
(1)
TCG
(1)
tcpdump
(1)
terminal
(1)
top
(1)
TPM
(4)
trace
(1)
transparent
(1)
tree
(1)
Trusted computing
(1)
TSC
(1)
tun/tap
(1)
ubuntu
(11)
UEFI
(1)
UMDF
(1)
upstart
(1)
USB
(3)
User Agent
(1)
users
(1)
vi
(2)
vim
(5)
Vista
(1)
vm
(1)
vmlinux
(1)
vmware
(7)
VNC
(1)
WinDbg
(3)
Windows
(25)
Windows_Server_2008
(1)
x86_64
(2)
Xen
(15)
xenoprofile
(1)
Xentrace
(1)
Xming
(1)
Followers
Blog Archive
►
2020
(1)
►
September
(1)
►
2016
(3)
►
September
(1)
►
April
(1)
►
January
(1)
►
2015
(20)
►
December
(1)
►
October
(3)
►
August
(1)
►
July
(14)
►
May
(1)
►
2014
(6)
►
December
(3)
►
October
(1)
►
August
(1)
►
February
(1)
►
2013
(13)
►
November
(3)
►
October
(2)
►
September
(3)
►
May
(2)
►
April
(1)
►
March
(1)
►
February
(1)
►
2012
(30)
►
November
(4)
►
October
(4)
►
September
(1)
►
August
(3)
►
May
(1)
►
April
(7)
►
March
(3)
►
February
(5)
►
January
(2)
►
2011
(75)
►
December
(14)
►
November
(11)
►
October
(5)
►
September
(12)
►
August
(2)
►
July
(1)
►
June
(4)
►
April
(8)
►
March
(8)
►
February
(7)
►
January
(3)
►
2010
(61)
►
December
(2)
►
November
(5)
►
September
(2)
►
August
(6)
►
July
(7)
►
June
(11)
►
May
(10)
►
April
(4)
►
March
(7)
►
February
(3)
►
January
(4)
▼
2009
(143)
►
December
(11)
►
November
(9)
►
October
(6)
▼
September
(8)
Library in Linux and compiling with libraries
虚拟地址到物理地址的转换过程
stack and calling conventions
change CD-ROM in QEMU
QEMU core functions call map
simple mailing list on Linux
SVN usage
Users managment in Linux
►
August
(12)
►
July
(26)
►
June
(15)
►
May
(9)
►
April
(16)
►
March
(12)
►
February
(11)
►
January
(8)
►
2008
(35)
►
December
(12)
►
November
(7)
►
October
(12)
►
September
(4)
About Me
Jiang
View my complete profile
No comments:
Post a Comment