{"published":"2014-09-23 18:45:58","categories":[],"type":"rich","url":"https://www.shigemk2.com/entry/2014/09/23/objdump_intel","height":"190","blog_title":"by shigemk2","image_url":null,"author_name":"shigemk2","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.shigemk2.com%2Fentry%2F2014%2F09%2F23%2Fobjdump_intel\" title=\"objdump intel - by shigemk2\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","description":"\u30a2\u30bb\u30f3\u30d6\u30ea\u3092\u9006\u30a2\u30bb\u30f3\u30d6\u30eb\u3059\u308b\u3068\u304d\u306b\u3001\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3intel\u3092\u6307\u5b9a\u3059\u308b\u306e\u304cM\u30aa\u30d7\u30b7\u30e7\u30f3\u3002 $ objdump -d -M intel exit.o exit.o: file format pe-i386 Disassembly of section .text: 00000000 <.text>: 0: 6a 00 push 0x0 2: e8 00 00 00 00 call 7 <.text+0x7> 7: 90 nop","author_url":"https://blog.hatena.ne.jp/shigemk2/","provider_url":"https://hatena.blog","blog_url":"https://www.shigemk2.com/","title":"objdump intel","width":"100%","provider_name":"Hatena Blog"}