GDB shows retq instruction (gdb) disassemble Dump of assembler code for function __read_nocancel: 0x00007fbd743e0e89 : mov $0x0,%eax 0x00007fbd743e0e8e : syscall => 0x00007fbd743e0e90 : cmp $0xfffffffffffff001,%rax 0x00007fbd743e0e96 : jae 0x7fbd743e0ec9 0x00007fbd743e0e98 : retq End of assembler dump. (gdb) Process Involved GPL Ghostscript 8.71. PostScript and PDF language interpreter and previewer. A Screen Shot GPL Ghostscript 8.71 …
Tag Archives: stack
push instruction.. push %rbx
| push instruction | (gdb) disass Dump of assembler code for function _IO_default_uflow: 0x00007f7c1e9964d0 : mov 0xd8(%rdi),%rax => 0x00007f7c1e9964d7 : push %rbx 0x00007f7c1e9964d8 : mov %rdi,%rbx 0x00007f7c1e9964db : callq *0x20(%rax) 0x00007f7c1e9964de : cmp $0xffffffffffffffff,%eax 0x00007f7c1e9964e1 : je 0x7f7c1e9964f2 0x00007f7c1e9964e3 : mov 0x8(%rbx),%rdx 0x00007f7c1e9964e7 : movzbl (%rdx),%eax 0x00007f7c1e9964ea : add $0x1,%rdx 0x00007f7c1e9964ee : mov %rdx,0x8(%rbx) 0x00007f7c1e9964f2 …
pop instruction and stack…
| POP Instruction | source : Windows Debugger. MOV AX,1234H MOV BX,5678H PUSH AX PUSH BX POP AX POP BX The values: AX=5678h BX=1234h First the value 1234h was pushed after that the value 5678h was pushed to the stack. Acording to LIFO 5678h comes of first, so AX will pop that value and BX …