浏览代码

Merge pull request #151 from funsim/patch-1

Fix spelling mistake
0xAX 9 年之前
父节点
当前提交
f5d54198ab
共有 1 个文件被更改,包括 1 次插入1 次删除
  1. 1 1
      Misc/linkers.md

+ 1 - 1
Misc/linkers.md

@@ -189,7 +189,7 @@ $ readelf -d factorial | grep \(INIT\)
  0x000000000000000c (INIT)               0x4003a8
  0x000000000000000c (INIT)               0x4003a8
  ```
  ```
 
 
-So, the address of the `main` function is the `0000000000400506` and it is offset from the `.init` section. As we can see from the output, the address of the `factorial` function is `0x0000000000400537` and binary code for the call of the `factorial` function now is `e8 18 00 00 00`. We already knwo that `e8` is opcode for the `call` instruction, the next `18 00 00 00` (note that address represented as little endian for the `x86_64`, in other words it is `00 00 00 18`) is the offset from the `callq` to the `factorial` function:
+So, the address of the `main` function is the `0000000000400506` and it is offset from the `.init` section. As we can see from the output, the address of the `factorial` function is `0x0000000000400537` and binary code for the call of the `factorial` function now is `e8 18 00 00 00`. We already know that `e8` is opcode for the `call` instruction, the next `18 00 00 00` (note that address represented as little endian for the `x86_64`, in other words it is `00 00 00 18`) is the offset from the `callq` to the `factorial` function:
 
 
 ```python
 ```python
 >>> hex(0x40051a + 0x18 + 0x5) == hex(0x400537)
 >>> hex(0x40051a + 0x18 + 0x5) == hex(0x400537)