. bash_profile file, open it with a text editor, and add the following two lines at the end:Ndk_root=/cygdrive/d/coco/android-ndk-r9Export Ndk_rootThe error will no longer appear. D/COCO/ANDROID-NDK-R9 is your NDK decompression directory, the author of the original directory is D:\COCO\ANDROID-NDK-R9, make similar changes can be.However, things are often not so smooth!Important! Wrong point! It is very like
After the NAND is all formatted today, re-use the uboot in nor to burn the uboot into the NAND. It should be the same as the uboot interface in nor. The following message is prompted: #### embedsky BIOS for sky2440/tq2440 #####
Press space key to download mode!
Booting LINUX...
Copy Linux kernel from 0x00200000 to 0x30008000, size = 0x00200000... Copy Kern
El to SDRAM done, warning: This binary is not compressed Linux kernel Image
Zimage magic = 0 xffffffff
Now, booting LINUX ......
Undefined in
The amd64 takes the traditional x86 and expands the registers to 64 bits, naming them rax, RBx, etc. It also adds eight more general purpose registers, named simply R8 through R15.
The first four parameters to a function are passed in rcX, RDX, R8 and r9. any further parameters are pushed on the stack. furthermore, space for the Register parameters is reserved on the stack, in case the called function wants to spill them; this is importantIf the fun
area template of the background homepage [not commonly used]/Dede/templets/index_body_showad.htmThe red "dedecms security prompt" section at the top of the main part of the background homepage, such as prompting data directory transfer./Dede/templets/index_body_showauth.htmCorresponding to the information of the background homepage program author
① Modify the background logo image. The image location is/Dede/images/style1/admin_top_logo.gif. modify the content of the image and overwrite it. be
digital microphone chip, and a shielded housing. See figure 1D. To improve the anti-interference ability of the microphone, a small filter capacitor is added between the power supply and the ground of the microphone. Generally, the 10pf and 33pf are connected in parallel.
Figure 1a ECM analog microphone Figure 1b ECM digital microphone
Figure 1c MEMS analog microphone figure 1D MEMS digital microphone
Microphone offset circuit: a typical application of the microphone circuit
'-integer pointer]Map System. dll variables to built-in variables in NSISIf you do not need to return any data, there is nothing to call the point of an external function. System. dll can map function variables to NSIS script variables in the following ways:
NSIS $0... $9 can correspond to System. dll r0.. r9; NSIS $ r0.. $ R9 can also correspond to System. dll r10. r19
Each parameter is specified by type,
writes R9 In the write-back phase, while the R9 needed in mov is the register value that LDR will re-write in the write-back phase, and the mov decoding needs to wait, the operation is complete until the register write-back operation of the ldr command is completed. (Note: In the current processor design, the pipeline can be optimized through the Register bypass technology to solve the register conflict pr
-R13}CMP R2, R3 // the code we need from reloc_start to reloc_end is put hereBlO 1B // decompress the kernel, and we will overwrite zimage belowBL cache_clean_flushAdd PC, R5, R0 // adjust to the adjusted reloc_start, after decompressed KernelReloc_start: Add R8, R5, R0 // Where R5 unzips the kernel, R0 unzips the kernel LengthDebug_reloc_startMoV R1, R4 // r4 = 0x300080001:. Rept 4Ldmia R5 !, {R0, R2, R3, R9-R13} @ relocate KernelStmia R1 !, {R0, R2,
[Independent developer er Cocos2d-x practice 011] Cocos2dx 3. x command line to generate APK details, cocos2d-xapk
Cocos2d-x 3.6 project package to generate apk Android app files, the steps to build the android environment is a bit cumbersome, but once set up, the future will be very fast!
The procedure is as follows:
1. Download the Android environment: the Android SDK, NDK, Ant, and JDK are required to build the Android environment;
Download Android SDK
Download Android NDK
Download Android J
rollback (add esp, 8 -- esp 8 bytes)
L no need to roll back the stack
In some cases, because you do not need to roll back the stack, no error will be reported when you call functions declared by others.
No Parameters:
In this case, the call side does not have the stack function parameter pressure, so there is no function parameter rollback problem, the stack rollback only needs to return 0 Length
When the number of parameters is less than four, the stack is not pressed in the case of winX64
library static {System. loadLibrary ("hello"); // Note: remove the preceding lib and the following. so} @ Overrideprotected void onCreate (Bundle savedInstanceState) {super. onCreate (savedInstanceState); setContentView (R. layout. activity_main);} public void click (View view) {Toast. makeText (this, helloworldfromC (), Toast. LENGTH_SHORT ). show ();}}
Create a jni folder under the projectAdd C files and android. mk files to the folder.
// Hello. c # include
# Include
// Androi
Stack Overflow Attack series: shellcode in linux x86 64-bit attacks get root permissions (1) how to execute functions, shellcoderoot
There are already many examples of stack overflow on the Internet, but it rarely involves 64-bit linux related to the operating system. Recently, I have been researching this, so I wrote a series of blog posts, one is to help you remember, and the other is to help more people explore each other.Register
The X86-64 has 16 64-bit registers: % rax, % rbx, % rcx, % rdx
conflict in the five-level pipeline. As shown in figure 6, the LDR command writes R9 In the write-back phase, while the R9 needed in mov is the register value that LDR will re-write in the write-back phase, and the mov decoding needs to wait, the operation is complete until the register write-back operation of the ldr command is completed. (Note: In the current processor design, the pipeline can be optimiz
address in R14. All R14 instances must be saved to other registers (not actually valid) or a stack. This register has a shadow Register in each processor mode. Once the connection address has been saved, this register can be used as a general register.Register 15 is the program counter. In addition to holding the 26-digit number of the address currently used by the instruction program, it also holds the status of the processor.Provide the following charts for clarity:
User Mode SVC mode IRQ mod
indexes as much as possible.
For a, B, C in [(1, 2, 3), (4, 5, 6)]: # Better Pass
is equivalent to assigning a value directly to each element.
Def force (): LST = range (4) for A1 in [1, 2]: for A2 in LST: for A3 in LST: for B1 in LST: for B2 in lst:
Third, generator optimization (check table instead of operation)
Def force (Start, end): # Used for password brute-cracking program for I in range (Start, end): Now = i sublst = [] for J in range:
sublst.append (
registers, examine the contents of R1 as a string, and Prin T the object description of the pointer located in R0. Remember R1 should contain the selector and R0 should contain the class instance.After resuming execution, we are hit the next breakpoint, which we have set, and our Stoop-hook is invoked.General Purpose Registers: r0 = 0x176f6d70 r1 = 0x335c9122 "Objectatindex:" r2 = 0x00000000 R3 = 0x00000000 r4 = 0x176d50d0 R5 = 0X001402BF "saveinplist
= [] for j in range (10 ): sublst. append (I % 10) # large division overhead, greater than multiplication I // = 10 sublst. reverse () yield (tuple (sublst), now)
def force(): # better lst = range(5) for a1 in [1]: for a2 in lst: for a3 in lst: for b1 in lst: for b2 in lst: for b3 in lst: for c1 in lst: for c2 in lst: for c3 in lst: for d1 in lst: yield (a1, a2, a3, b1, b2, b3, c1, c2
The logical instruction set is: And/orr/eor/bic1) With logic commands are generally used to place 0 bits: andandLogical and operation.
Syntax
And{cond}{s} Rd, Rn, OP2
Description
Load Rd with logical AND of Rn with OP2. Rd: = Rn and OP2
Condition Flags
If S is specified, N, Z the flags are updated. C flag May is updated by calculation of OP2.
Example
and
, (stack_sp2-1-(int) psselibbase), Gettid (), Reg_r0,reg_r1,reg _R2,REG_R3,REG_R4,REG_R5,REG_R6,REG_R7,REG_R8,REG_R9,REG_R10,REG_R11,REG_R12);}Inside the specific parameter meaning is later said.Printallreg to be called by a transit function, this function must meet the following requirements:1. the value of the R0-r12,LR Register cannot be changed before and after the call2. after calling the print function, skip to the old function3. put the monitoring address into the stack, this requirement
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.