You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
My windows syscall data comes from Nebbett and Metasploit and does not have all the
argument data for the new Vista syscalls. I'm also not sure I even have all the XP data.
Some info about NtCreateWorkerFactory
It takes 10 args: 3 args pointing to memory address are more interesting, the rest are more like flags or something.
arg[0]: TpWorkerFactory Handle OUT
arg[5]: Starting Thread Routine something like ntdll!TppWorkerThread
arg[6]: Some data structure for Thread Pool, allocate with size of 00000c88, partialy initialized,
and it does not change before/after the syscall.
Also
arg[4]: 0xffffffff, might be the self process handle.
From [email protected] on December 10, 2010 17:57:35
PR 406351
My windows syscall data comes from Nebbett and Metasploit and does not have all the
argument data for the new Vista syscalls. I'm also not sure I even have all the XP data.
Original issue: http://code.google.com/p/drmemory/issues/detail?id=98
The text was updated successfully, but these errors were encountered: