complementing functions ([Tab] Key Usage)
The command and file completion functions allow you to: Make sure that the input data is correct. The rules for using the tab key are as follows:
[Tab] after the first word of a command string, the command is supplemented;[Tab] after the second word of a string of commands, the file is complete.
Command completion: if you do not want to press too many buttons during command execution, for example, the command pcprofiledump. If you enter pcprofile, press
Transferred from the oldlinux Forum
This is what I learned from the bootsect. s file. After reading this version of the bootsect file, I collected it.
Some problems are really obvious in the book, so I didn't extract them.Some problems are really the same as bootsect.CodeIt does not matter, and I have not excerpted it.
They are all questions you want to ask. I have read it several times and there are still many problems.In fact, many questions have been asked before. This is indeed the c
in the instruction. The default segment base address is the DS segment register. Enclose a valid address in brackets to express the content of the storage unit.
Valid address = 16-bit displacement
The assembly language format is as follows:
MoV ax, [2010 H]; ax
MoV [1010 H], Al; DS: [1010 H]
MoV BX, ES: [3020 H]; BX
Indirect addressing of registers: The valid addresses of operands are all in the registers of the CPU. Because the valid address is
32-bit CPUs contain the following registers:
Four data registers (eax, EBX, ECx, and EDX)2 address changes and pointer registers (ESI and EDI) 2 pointer registers (ESP and EBP)Six segment registers (ES, Cs, SS, DS, FS, and GS)1 Instruction Pointer register (EIP) 1 flag register (eflags)
1. Data RegisterData registers are mainly used to save information such as the operands and operation results, thus saving the time required to read the operands by occupying the bus and accessing the memory.The
Grub Source Analysis-1
This chapter begins the analysis of Grub's source code, version 2.02.
When the system starts, the BIOS loads the first sector of the hard drive (assuming boot from the hard disk) into the memory 0x7c00 location, which corresponds to the start function in grub (assuming grub boot), as shown below.
first part of boot startGrub-core/boot/i386/pc/boot. S
start:jmp local (AFTER_BPB) ... Local (AFTER_BPB): CLI. org grub_boot_machine_drive_check boot_drive_check:jmp 3f testb $0x
habits.In the beginning, this process will take a lot of time, but for a programmer, writing a program is a lifelong career, can not improve it?Here are two examples of how to study improved programs that have been completed.1, the use of instructions:In the following communication procedure, not only is the syntax and instructions completely correct, but there is no error in the implementation, can it be improved?1-1 in accordance with the foregoing, a simplified string has been used in the de
First, calculate the number of child nodes of a node. $num = ($AR-$AL-1)/2;Second, find all the child nodes of the a node.SELECT * from the tree where L > $AL and R Third, find all the parent nodes of the a node.SELECT * from the tree where L Iv. adding nodes. You need to make room for the left and right values for the nodes you want to increase. Then insert the new node into the database. Where is the incr
. skysoft. pcks;
Import java. io .*;
Import java.net .*;
Import java. util .*;
Public class DataPacket {
InputStream is;
OutputStream OS;
PacketHeader;
PacketBody body;
ArrayList al;
Public static final int DataSwapSize = 64532;
/**
* Used to receive a Datagram
*/
Public DataPacket (){
Header = new PacketHeader ();
Body = new PacketBody ();
Al = new ArrayList ();
}
/**
* Used to send data reports. It cal
by the operating system.Mobile phone software has little to do. Which one has a big relationship with mobile phone software? The answer is: tmc_task. You can take this as an exercise.As the system entry (main) task, you can also regard it as the entry task of the entire mobile phone software. That is, allThe tmc_task is used to create and maintain its tasks.So far, the entire AMSS software has not been run, but it just ran into tmc_task. In tmc_taskTmc_init () is called to initialize the entire
the operand is expressed by the symbol after the instruction in B (byte, 8-bit), w (word, 16-bits), L (long, 32-bits ), for example, "movb % Al, % Bl", "movw % ax, % BX", "movl % eax, % EBX ".
If the length of the operand is not specified, the compiler will set it according to the length of the target operand.For example, the command "mov % ax, % BX", because the length of the destination operand BX is word, the compiler will equate this command with
; # SCSI driver service file, PE export Hook method (Tutorial), so that the program continues to monitor the data read into the memory ##Xor bx, BX; #3. WindowsNT layer: ntldr is loaded to the memory. If it is not a SCSI hard disk, int13h is used for ntldr read Operations ##MoV SS, BX; # assign control to ntoskrnl (winnt kernel) after ntldr completes parameter configuration and protection mode switching )##MoV sp, 7c00h; #4. ntoskrnl (module) loaded by hook ntldr. Available Method: inline Hook m
I. Data Transmission instructionsFunction: transmits data between the memory and registers, registers, and input/output ports. 1. general data transmission commands. moV transfers words or bytes. movsx first extends the symbol and then transmits it. movzx is not extended before transmission. push pushes words into the stack. pop pops up the word stack. pusha pushes ax, CX, dx, BX, SP, BP, Si, di into the stack in sequence. popa pops up the stack of DI, Si, BP, SP, BX, dx, CX, and ax in sequence.
For example, when we use assembly commands such as ADC and SBB, We Have To unbind the content in the flag register (EFL) for the sake of attention. View the value of each flag in binary details. Then these commands that need to use the mark register are clear at a glance. --
I can't wait to write a test code to see the secret:
# Include
Int main (void){_ ASM{MoV Al, 0xffMoV DL, 0x01
Add Al, DLADC
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.