原博客:http://www.cnblogs.com/lanrenxinxin/p/4735027.html
詳細的理論講解都在上面
下面說的是通過windbg手動進行尋址,深入理解
x64:
實踐:
int main()
{
char* v1 = "HelloWorld";
printf("%p\r\n", v1);
while (1)
{
}
return 0;
}
PML4T(Page Map Level4 Table)及表內的PML4E結構,每個表為4K,內含512個PML4E結構,每個8字節
PDPT (Page Directory Pointer Table)及表內的PDPTE結構,每個表4K,內含512個PDPTE結構,每個8字節
PDT (Page Directory Table)及表內的PDE結構,每個表4K,內含512個PDE結構,每個8字節
PT(Page Table)及表內額PTE結構,每個表4K,內含512個PTE結構,每個8字節。
每個table entry 的結構都是8個字節64位寬,而virtual address中每個索引值都是9位,因此每個table都是512x8= 4K字節。
虛擬地址對應的意義 (四級表)
0x376b30
對應二進制: 000000000 000000001(9位) 1 0111 0110(9位) 1011 0011 0000(12位)
對應選擇子(索引) 0 1 176 b30
Windbg調試:
PROCESS 88713b58 SessionId: 1 Cid: 0724 Peb: 7ffde000 ParentCid: 056c
DirBase: 7f33c3c0 ObjectTable: 9a1d3cb8 HandleCount: 7.
Image: Helloworld.exe
kd> ! dq 7f33c3c0
#7f33c3c0 00000000`36c1f801 00000000`36e20801
#7f33c3d0 00000000`370a1801 00000000`38122801
#7f33c3e0 00000000`0e343801 00000000`0e444801
#7f33c3f0 00000000`0dd45801 00000000`0e4c6801
#7f33c400 00000000`395ce801 00000000`3964f801
#7f33c410 00000000`7a350801 00000000`38d51801
#7f33c420 00000000`0e654801 00000000`0df55801
#7f33c430 00000000`0e356801 00000000`0e2d7801
kd> ! dq 36c1f000
#36c1f000 00000000`3823e867 00000000`375bd867
#36c1f010 00000000`3794a867 00000000`00000000
#36c1f020 00000000`00000000 00000000`00000000
#36c1f030 00000000`00000000 00000000`00000000
#36c1f040 00000000`00000000 00000000`00000000
#36c1f050 00000000`00000000 00000000`00000000
#36c1f060 00000000`00000000 00000000`00000000
#36c1f070 00000000`00000000 00000000`00000000
kd> ! dq 375bd000+176*8
#375bdbb0 80000000`3e73a025 80000000`383ff025
#375bdbc0 80000000`382d0025 80000000`39078867
#375bdbd0 80000000`38e6f025 80000000`37b51025
#375bdbe0 80000000`3a53b025 80000000`3d4d4025
#375bdbf0 80000000`37602025 00000000`00000000
#375bdc00 00000000`00000000 00000000`00000000
#375bdc10 00000000`00000000 00000000`00000000
#375bdc20 00000000`00000000 00000000`00000000
kd> ! db 3e73a000+b30
#3e73ab30 48 65 6c 6c 6f 57 6f 72-6c 64 00 00 25 70 0d 0a HelloWorld..%p..
#3e73ab40 00 00 00 00 00 6c 37 00-10 6d 37 00 68 6e 37 00 .....l7..m7.hn7.
#3e73ab50 8c 6e 37 00 cc 6e 37 00-00 6f 37 00 01 00 00 00 .n7..n7..o7.....
#3e73ab60 00 00 00 00 01 00 00 00-01 00 00 00 01 00 00 00 ................
#3e73ab70 01 00 00 00 53 74 61 63-6b 20 61 72 6f 75 6e 64 ....Stack around
#3e73ab80 20 74 68 65 20 76 61 72-69 61 62 6c 65 20 27 00 the variable '.
#3e73ab90 27 20 77 61 73 20 63 6f-72 72 75 70 74 65 64 2e ' was corrupted.
#3e73aba0 00 00 00 00 54 68 65 20-76 61 72 69 61 62 6c 65 ....The variable
找到HelloWorld
相關博客:
http://www.360doc.com/content/14/1127/10/1895599_428416943.shtml
《x86/x64體系編程》
《軟件調試》