X86-64: Data Access and Operations - Computer Action...
Transcript of X86-64: Data Access and Operations - Computer Action...
![Page 1: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/1.jpg)
X86-64: Data Access
and Operations
1 1
![Page 2: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/2.jpg)
2
Instruction Set Architecture (ISA)
![Page 3: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/3.jpg)
3
2015 State of the Art
![Page 4: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/4.jpg)
4
Instruction Set Architecture (ISA) How is data represented?
Previous lectures
How are programs represented? Instruction Set Architecture (ISA) Encoding is architecture dependent
x86-64 Evolutionary design starting in 1978 Many features added over time
8086 ! 286 ! i386 ! Pentium ! Core / misc 8 bit ! 16 bit ! 32 bit ! 64 bit
Backward compatibility ! Ugly “legacy baggage”
Complex Instruction Set Computer (CISC) Many different instructions with many different formats
![Page 5: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/5.jpg)
5
How did we program computers?
An ADD instruction
![Page 6: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/6.jpg)
6
An Assembly Code Program MemoryZero: load [r15+4],r1 ! r1 = arg1 (p) load [r15+8],r2 ! r2 = arg2 (byteCount) mzLoop1: ! LOOP: cmp r2,0 ! if byteCount <= 0 exit ble mzLoop2Test ! . and r1,0x00000003,r3 ! tmp = p % 4 cmp r3,0 ! if tmp == 0 exit be mzLoop2Test ! . storeb r0,[r1] ! *p = 0x00 add r1,1,r1 ! p = p + 1 sub r2,1,r2 ! byteCount = byteCount - 1 jmp mzLoop1 ! ENDLOOP
assembly code comments
(Not Intel)
![Page 7: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/7.jpg)
7
The Assembler Tool 000e34 MemoryZero:000e34 8b1f0004 load [r15+4],r1 ! r1 = arg1 (p)000e38 8b2f0008 load [r15+8],r2 ! r2 = arg2 (byteCount)000e3c mzLoop1: ! LOOP:000e3c 81020000 cmp r2,0 ! if byteCount <= 0 exit000e40 a500002c ble mzLoop2Test ! .000e44 88310003 and r1,0x00000003,r3 ! tmp = p % 4000e48 81030000 cmp r3,0 ! if tmp == 0 exit000e4c a2000020 be mzLoop2Test ! .000e50 70010000 storeb r0,[r1] ! *p = 0x00000e54 80110001 add r1,1,r1 ! p = p + 1000e58 81220001 sub r2,1,r2 ! byteCount = byteCount - 1000e5c a1ffffe0 jmp mzLoop1 ! ENDLOOP
memory address
machine code
assembly code comments
(Not Intel)
![Page 8: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/8.jpg)
8
Assemblers
![Page 9: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/9.jpg)
9
Definitions Architecture: (also ISA: Instruction Set Architecture)
The parts of a processor design that one needs to understand or write assembly/machine code. Examples: instruction set specification, registers.
Microarchitecture: Implementation of the architecture. Examples: cache sizes and clock frequency.
Code Forms: Machine Code: The byte-level program that a processor
executes
Assembly Code: A text representation of machine code
Example ISAs: Intel: x86, IA32, Itanium, x86-64 ARM: Used in almost all mobile phones
![Page 10: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/10.jpg)
10
CPU
Assembly Programmer’s View
PC
Registers
Memory
Code (instructions) Data Stack
Addresses
Data
Instructions Condition Codes
![Page 11: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/11.jpg)
11
binary
binary
Compiler (gcc –Og -‐S)
Assembler (gcc or as)
Linker (gcc or ld)
C program (prog1.c prog2.c)
Asm program (prog1.s prog2.s)
Object program (prog1.o prog2.o)
Executable program (prog)
StaFc libraries (.a)
Turning C into Object Code Code in files prog1.c prog2.cCompile with command: gcc –Og prog1.c prog2.c -o prog
(-Og is Nnew to recent versions of GCC) Put resulting binary in file prog
![Page 12: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/12.jpg)
12
Kernel Space
Virtual Address Space
000000000
.text segment
.data segment
Program Code
Constants
Data
Stack
Heap
Memory Maped Pages
![Page 13: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/13.jpg)
13
Compiling Into Assembly C Code (sum.c)
long plus(long x, long y);
void sumstore(long x, long y, long *dest) { long t = plus(x, y); *dest = t; }
Generated x86-‐64 Assembly sumstore: pushq %rbx movq %rdx, %rbx call plus movq %rax, (%rbx) popq %rbx ret
To compile:
gcc –Og –S sum.c Produces file sum.s
Warning:
Will get different results on different machines (Linux, Mac OS-‐X, …) Different versions of gcc and different compiler seCngs.
![Page 14: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/14.jpg)
14
What goes into memory: 0x0400595: 0x53 0x48 0x89 0xd3 0xe8 0xf2 0xff 0xff 0xff 0x48 0x89 0x03 0x5b 0xc3
Object Code
• Total of 14 bytes • Each instrucFon 1, 3, or 5 bytes
• Starts at address 0x0400595
![Page 15: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/15.jpg)
15
Machine Instruction Example *dest = t;
movq %rax,(%rbx)
0x40059e: 48 89 03
C Code Store value t where designated by dest
Assembly Move 8-byte value to memory Quad words in x86-64 parlance Operands: t: Register %rax dest: Register %rbx *dest: Memory M[%rbx]
Object Code 3-byte instruction Stored at address 0x40059e
![Page 16: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/16.jpg)
16
Output from objdump:
Disassembling Object Code objdump –d sum
Useful tool for examining object code Analyzes bit pattern of series of instructions Produces approximate rendition of assembly code Can be run on either a.out (complete executable) or .o file
0000000000400595 <sumstore>: 400595: 53 push %rbx 400596: 48 89 d3 mov %rdx,%rbx 400599: e8 f2 ff ff ff callq 400590 <plus> 40059e: 48 89 03 mov %rax,(%rbx) 4005a1: 5b pop %rbx 4005a2: c3 retq
![Page 17: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/17.jpg)
17
Output from objdump:
Disassembling Object Code objdump –d sum
Useful tool for examining object code Analyzes bit pattern of series of instructions Produces approximate rendition of assembly code Can be run on either a.out (complete executable) or .o file
sumstore: pushq %rbx movq %rdx, %rbx call plus movq %rax, (%rbx) popq %rbx ret
0000000000400595 <sumstore>: 400595: 53 push %rbx 400596: 48 89 d3 mov %rdx,%rbx 400599: e8 f2 ff ff ff callq 400590 <plus> 40059e: 48 89 03 mov %rax,(%rbx) 4005a1: 5b pop %rbx 4005a2: c3 retq
Original Assembly Code:
![Page 18: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/18.jpg)
18
Dump of assembler code for function sumstore: 0x0000000000400595 <+0>: push %rbx 0x0000000000400596 <+1>: mov %rdx,%rbx 0x0000000000400599 <+4>: callq 0x400590 <plus> 0x000000000040059e <+9>: mov %rax,(%rbx) 0x00000000004005a1 <+12>:pop %rbx 0x00000000004005a2 <+13>:retq
Disassembly within gdb
0x0400595: 0x53 0x48 0x89 0xd3 0xe8 0xf2 0xff 0xff 0xff 0x48 0x89 0x03 0x5b 0xc3
“disass” Output:
“x” Output:
![Page 19: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/19.jpg)
19
Dump of assembler code for function sumstore: 0x0000000000400595 <+0>: push %rbx 0x0000000000400596 <+1>: mov %rdx,%rbx 0x0000000000400599 <+4>: callq 0x400590 <plus> 0x000000000040059e <+9>: mov %rax,(%rbx) 0x00000000004005a1 <+12>:pop %rbx 0x00000000004005a2 <+13>:retq
Disassembly within gdb
0x0400595: 0x53 0x48 0x89 0xd3 0xe8 0xf2 0xff 0xff 0xff 0x48 0x89 0x03 0x5b 0xc3
“disass” Output:
“x” Output: sumstore: pushq %rbx movq %rdx, %rbx call plus movq %rax, (%rbx) popq %rbx ret
Original Assembly Code:
![Page 20: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/20.jpg)
20
What Can be Disassembled?
![Page 21: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/21.jpg)
21
What Can be Disassembled?
% objdump -d WINWORD.EXE
WINWORD.EXE: file format pei-i386
No symbols in "WINWORD.EXE". Disassembly of section .text:
30001000 <.text>: 30001000: 55 push %ebp 30001001: 8b ec mov %esp,%ebp 30001003: 6a ff push $0xffffffff 30001005: 68 90 10 00 30 push $0x30001090 3000100a: 68 91 dc 4c 30 push $0x304cdc91
Reverse engineering forbidden by MicrosoI End User License Agreement
![Page 22: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/22.jpg)
22
Registers
![Page 23: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/23.jpg)
23
Instruction Suffixes C Type Size in bits Instruction Suffix
char 8 b short 16 w (word) int 32 l (longword) long long 64 q (quadword)
AnimaMon
movq %rax,… copy 64 bitsmovl %eax,… copy 32 bitsmovw %ax,… copy 16 bitsmovb %al,… copy 8 bitsmovb %ah,… copy 8 bits
Also Used byte halfword word doubleword
![Page 24: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/24.jpg)
24
%rsp
x86-64 Integer Registers (8 bytes)
Can also reference low-‐order 1, 2, and 4 bytes
%r8
%r9
%r10
%r11
%r12
%r13
%r14
%r15
%rax
%rbx
%rcx
%rdx
%rsi
%rdi
%rbp
![Page 25: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/25.jpg)
25
%al%ah%eax%rax
%rax AnimaMon
63 0%ax
movq %rax,… copy 64 bitsmovl %eax,… copy 32 bitsmovw %ax,… copy 16 bitsmovb %al,… copy 8 bitsmovb %ah,… copy 8 bits
![Page 26: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/26.jpg)
26
%al%ah
%eax
%rax
%rax
63 0
%ax
movq %rax,… copy 64 bitsmovl %eax,… copy 32 bitsmovw %ax,… copy 16 bitsmovb %al,… copy 8 bitsmovb %ah,… copy 8 bits
![Page 27: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/27.jpg)
27
%rsp
x86-64 Integer Registers
Can also reference low-‐order 1, 2, and 4 bytes
%eax
%ebx
%ecx
%edx
%esi
%edi
%esp
%ebp
%r8d
%r9d
%r10d
%r11d
%r12d
%r13d
%r14d
%r15d
%r8
%r9
%r10
%r11
%r12
%r13
%r14
%r15
%rax
%rbx
%rcx
%rdx
%rsi
%rdi
%rbp
![Page 28: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/28.jpg)
28
%rsp
x86-64 Integer Registers
Can also reference low-‐order 1, 2, and 4 bytes
%eax
%ebx
%ecx
%edx
%esi
%edi
%esp
%ebp
%r8d
%r9d
%r10d
%r11d
%r12d
%r13d
%r14d
%r15d
%r8
%r9
%r10
%r11
%r12
%r13
%r14
%r15
%rax
%rbx
%rcx
%rdx
%rsi
%rdi
%rbp
![Page 29: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/29.jpg)
29
Some History: IA32 Registers
%eax
%ecx
%edx
%ebx
%esi
%edi
%esp
%ebp
%ax
%cx
%dx
%bx
%si
%di
%sp
%bp
%ah
%ch
%dh
%bh
%al
%cl
%dl
%bl
gene
ral purpo
se
accumulate
counter
data
base
source index
destination index
stack pointer
base pointer
Origin (mostly obsolete)
AnimaMon
![Page 30: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/30.jpg)
30
Register Naming - History
![Page 31: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/31.jpg)
31
%rax
%rcx
%rdx
%rbx
%rsi
%rdi
%rsp
%rbp
Moving Data AnimaMon
%r8 … %r15
![Page 32: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/32.jpg)
32
Operand Combinations for “mov”
Cannot do memory-‐to-‐memory transfer with a single instrucFon
movq
Imm
Reg
Mem
Reg
Mem
Reg
Mem
Reg
Source Dest C Analog
movq $0x4,%rax x = 0x4;
movq $-147,(%rax) *p = -147;
movq %rax,%rdx x = y;
movq %rax,(%rdx) *p = x;
movq (%rax),%rdx x = *p;
Example
AnimaMon
![Page 33: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/33.jpg)
33
Instruction Variations
![Page 34: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/34.jpg)
34
Immediate mode
Main memory
3C00
%rax
%rcx
%rdx myArray
Registers
• • •
123 456 789 ABC DEF
![Page 35: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/35.jpg)
35
Immediate mode
Main memory
3C00
myArray
Registers
• • •
123 456 789 ABC DEF
0000 0000 0000 8000 %rax
%rcx
%rdx
![Page 36: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/36.jpg)
36
Immediate mode
Main memory
3C00
myArray
Registers
• • •
123 456 789 ABC DEF
0000 0000 0000 3C00 %rax
%rcx
%rdx
![Page 37: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/37.jpg)
37
Register mode
Main memory
3C00
Registers
• • •
0000 0000 005B 12F8
myArray
123 456 789 ABC DEF
%rax
%rcx
%rdx
![Page 38: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/38.jpg)
38
Register mode
Main memory
3C00
Registers
• • •
myArray
123 456 789 ABC DEF
%rax
%rcx
%rdx
0000 0000 005B 12F8
0000 0000 005B 12F8
![Page 39: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/39.jpg)
39
Memory Modes Absolute
Specify the address of the data movl %eax,myArray
Indirect Use register to calculate address
movl %eax,(%rbx) Base + displacement
Use register plus absolute address to calculate address movl %eax,32(%rbx)
Indexed Indexed: Add contents of an index register
movl %eax,32(%rbx,%rcx) Scaled index: Add contents of an index register scaled by a
constant movl %eax,32(%rbx,%rcx,4)
![Page 40: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/40.jpg)
40
Absolute Memory Mode Form: Imm Operand value: M[Imm]
movl 0x3C04,%eaxmovl myArray,%edx
int myArray[30]; /* global variable stored at 0x3C00 */
Main memory
3C00
Registers
• • •
myArray
123 456 789 ABC DEF
3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
0102 0304 0506 0708 %rax
%rcx
%rdx
XXXX XXXX XXXX XXXX
XXXX XXXX XXXX XXXX
![Page 41: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/41.jpg)
41
Absolute Memory Mode Form: Imm Operand value: M[Imm]
movl 0x3C04,%eaxmovl myArray,%edx
int myArray[30]; /* global variable stored at 0x3C00 */
Main memory Registers
• • •
myArray
0000 0000 0000 0456
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
XXXX XXXX XXXX XXXX
XXXX XXXX XXXX XXXX
![Page 42: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/42.jpg)
42
Absolute Memory Mode Form: Imm Operand value: M[Imm]
movl 0x3C04,%eaxmovl myArray,%edx
int myArray[30]; /* global variable stored at 0x3C00 */
Main memory %rax
%rcx
%rdx
Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
0000 0000 0000 0123
0000 0000 0000 0456
XXXX XXXX XXXX XXXX
![Page 43: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/43.jpg)
43
Indirect Memory Mode Form: (Ea) Operand value: M[R[Ea]]
Register Ea specifies the memory address movl (%rcx),%eax
Main memory Registers
• • •
0000 0000 0000 3C08
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
![Page 44: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/44.jpg)
44
Indirect Memory Mode Form: (Ea) Operand value: M[R[Ea]]
Register Ea specifies the memory address movl (%rcx),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC 0000 0000 0000 3C08
%rax
%rcx
%rdx
![Page 45: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/45.jpg)
45
Indirect Memory Mode Form: (Ea) Operand value: M[R[Ea]]
Register Ea specifies the memory address movl (%rcx),%eax
Main memory Registers
• • •
myArray
0000 0000 0000 0789
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC 0000 0000 0000 3C08
%rax
%rcx
%rdx
![Page 46: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/46.jpg)
46
Memory Mode: Base + Displacement Form: Imm(Eb) Operand value: M[Imm+R[Eb]]
Register Eb specifies start of memory region Imm specifies the offset/displacement
movl 8(%rcx),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
![Page 47: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/47.jpg)
47
Memory Mode: Base + Displacement Form: Imm(Eb) Operand value: M[Imm+R[Eb]]
Register Eb specifies start of memory region Imm specifies the offset/displacement
movl 8(%rcx),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
0000 0000 0000 0789
![Page 48: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/48.jpg)
48
Indexed Memory Mode Form: Imm(Eb,Ei) Operand value: M[Imm+R[Eb]+Reg[Ei]]
Register Eb specifies start of memory region Register Ei holds index
movl 4(%rcx,%rdx),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
0000 0000 0000 0008
![Page 49: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/49.jpg)
49
Indexed Memory Mode Form: Imm(Eb,Ei) Operand value: M[Imm+R[Eb]+Reg[Ei]]
Register Eb specifies start of memory region Register Ei holds index
movl 4(%rcx,%rdx),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
0000 0000 0000 0008
0000 0000 0000 0ABC
![Page 50: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/50.jpg)
50
Memory Mode: Scaled Indexed The most general format Form: Imm(Eb,Ei,S) Operand value: M[Imm+R[Eb]+S*R[Ei]]
Register Eb specifies start of memory region Ei holds index S is integer scale (1,2,4,8)
movl 8(%rcx,%rdx,4),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
0000 0000 0000 0002
![Page 51: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/51.jpg)
51
Memory Mode: Scaled Indexed The most general format Form: Imm(Eb,Ei,S) Operand value: M[Imm+R[Eb]+S*R[Ei]]
Register Eb specifies start of memory region Ei holds index S is integer scale (1,2,4,8)
movl 8(%rcx,%rdx,4),%eax
Main memory Registers
• • •
myArray
123 456 789 ABC DEF
3C00 3C04 3C08 3C0C 3C10 3C14
3CF8 3CFC
%rax
%rcx
%rdx
0000 0000 0000 3C00
0000 0000 0000 0002
0000 0000 0000 0DEF
![Page 52: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/52.jpg)
52
Most General Form: Scaled indexed Absolute, indirect, base+displacement, and indexed are simply special cases of scaled indexed.
General Form Imm(Eb,Ei,S) M[Imm + R[Eb] + R[Ei]*S]
Examples Imm M[Imm] Imm(Eb) M[Imm + R[Eb]] (Eb,Ei,S) M[R[Eb] + R[Ei]*S] (Eb,Ei) M[R[Eb] + R[Ei]] (,Ei,S) M[R[Ei]*S] Imm(,Ei,S) M[Imm + R[Ei]*S]
![Page 53: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/53.jpg)
53
%rdi
%rsi
%rax
%rdx
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers xp yp t0 t1
![Page 54: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/54.jpg)
54
%rdi
%rsi
%rax
%rdx
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 333
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
![Page 55: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/55.jpg)
55
%rdi
%rsi
%rax
%rdx
120
108
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 333
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
![Page 56: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/56.jpg)
56
%rdi
%rsi
%rax
%rdx
120
108
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 333
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
333
![Page 57: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/57.jpg)
57
%rdi
%rsi
%rax
%rdx
120
108
333
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 333
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1 555
![Page 58: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/58.jpg)
58
%rdi
%rsi
%rax
%rdx
120
108
333
555
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 333
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
555
![Page 59: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/59.jpg)
59
%rdi
%rsi
%rax
%rdx
120
108
333
555
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 555
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
333
![Page 60: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/60.jpg)
60
%rdi
%rsi
%rax
%rdx
120
108
333
555
Understanding Swap() void swap (long *xp, long *yp) { long t0 = *xp; long t1 = *yp; *xp = t1; *yp = t0; }
Memory
swap: movq (%rdi), %rax # t0 = *xp movq (%rsi), %rdx # t1 = *yp movq %rdx, (%rdi) # *xp = t1 movq %rax, (%rsi) # *yp = t0 ret
Registers 555
555
0x000120
0x000118
0x000110
0x000108
0x000100
Address
xp yp t0 t1
333
![Page 61: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/61.jpg)
61
Addressing Mode Examples
addq 12(%rbp),%rcx
movb (%rax,%rcx),%dl
subl %edx,(%rcx,%rax,4)
incw 0xA(,%rcx,8)
Add the long-long at address rbp+12 to rcx
Load the byte at address rax+rcx into dl
Subtract edx from the int at address
rcx+(4*rax)
Increment the short at address 0xA+(8*rcx)
animation
![Page 62: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/62.jpg)
62
Practice Problems
0x110x010C
0x130x0108
0xAB0x0104
0xFF0x0100
Value Address
0x00000003%rdx
0x00000001%rcx
0x00000100%rax
Value Register
(%rax,%rdx,4)
0xFC(,%rcx,4)
260(%rcx, %rdx)
9(%rax, %rdx)
4(%rax)
(%rax)
$0x108
0x104
%rax
Value Operand
0x110xFF
0x13
0x110xAB
0xFF
0x100
0xAB
0x108
animation
![Page 63: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/63.jpg)
63
Practice Problem
void decode(int *xp, int *yp, int *zp);
Function prototype:
Write C code for this function
Assembly code: 1 decode: 2 movq (%rdi),%r8 3 movq (%rsi),%rcx 4 movq (%rdx),%rax 5 movq %r8,(%rsi) 6 movq %rcx,(%rdx) 7 movq %rax,(%rdi) 8 ret
%rsi %rdx %rdi
void decode(…) { long x=*xp; long y=*yp; long z=*zp; *yp=x; *zp=y; *xp=z;
}
t1 = *xp t2 = *yp t3 = *zp *yp = t1 *zp = t2 *xp = t3
animation
![Page 64: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/64.jpg)
64
Practice Problem Suppose an array in C is declared as a global variable:
int myArray[34];
Write some assembly code that: sets %rsi to the address of myArray sets %rbx to the constant 9 loads myArray[9] into register %eax.
Use scaled index memory mode
animation
![Page 65: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/65.jpg)
65
Alternate mov instructions
Assumptions: %dh = 0x8D, %eax = 0x98765432
movb %dh, %almovsbl %dh, %eaxmovzbl %dh, %eax
movb only changes specific byte
movsbl does sign extension
movzbl sets other bytes to zero
%eax = 0x9876548D %eax = 0xFFFFFF8D %eax = 0x0000008D
![Page 66: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/66.jpg)
66
Data Movement Instructions
Move zero-extended byte D ← ZeroExtend(S) movzbl S,D
Move sign-extended byte D ← SignExtend(S) movsbl S,D
Move byte D ← S movb S,D
Move double word
Move word
D ← S
D ← S
movl S,D
movw S,D
Description Effect Instruction
![Page 67: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/67.jpg)
Arithmetic and Logical Operations
67
![Page 68: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/68.jpg)
68
LEA: Load Effective Address movq Source, Dest
Dest ← M[Source] leaq Source, Dest
Dest ← &Source
leaq (%rax),%rdxmovq %rax,%rdx
Destination must be a register Commonly used by compiler to do simple arithmetic
If variable “k” is in %rbx… leaq 7(%rbx,%rbx,4),%rax
%rax ← (5 × k) + 7
Performs a multiply and add all in one instruction!
Equivalent
![Page 69: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/69.jpg)
69
Practice Problem %rax = x, %rcx = y
leaq 1(, %rax, 2), %rdx
leaq (%rcx, %rax, 4), %rdx
leaq 9(%rax, %rcx, 2), %rdx
leaq 0xA(, %rcx, 4), %rdx
leaq 7(%rax, %rax, 8), %rdx
leaq (%rax, %rcx, 4), %rdx
leaq (%rax, %rcx), %rdx
leaq 6(%rax), %rdx
Result in %rdx? Instruction
x+6 x+y x+4y 9x+7
4y+10 x+2y+9 4x+y 2x+1
animation
![Page 70: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/70.jpg)
70
Unary Operations
![Page 71: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/71.jpg)
71
Binary Operations
Be careful! Not X – Y
![Page 72: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/72.jpg)
72
Integer Multiply imul = signed multiply
mul = unsigned multiply
Binary form imul Src,Dest dest " dest × src
Multiple forms based on 8-bit, 16-bit, 32-bit, 64-bit imulb, imulw, imull, imulq, mulb, mulw, mull, mulq
Unary form (for 128-bit result) mulq %r13 imulq %rbx
Other operand is assumed to be in %rax 128-bit result in %rdx:%rax` %rdx:%rax " %r??? × %rax
![Page 73: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/73.jpg)
73
Integer Divide idiv = signed divide
div = unsigned divide
Binary form Not present (?)
Unary form divq %r13 idivq %rbx
Computes both division and remainder at once! Other operand is assumed to be in %rax %rax " %r??? ÷ %rax %rdx " %r??? mod %rax
![Page 74: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/74.jpg)
74
R[%edx] ← R[%edx]:R[%eax] mod S unsigned
R[%eax] ← R[%edx]:R[%eax] ÷ S
divl S
R[%edx] ← R[%edx]:R[%eax] mod S signed
R[%eax] ← R[%edx]:R[%eax] ÷ S
idivl S
R[%edx]:R[%eax] ← SignExtend(R[%eax]) cltd
R[%edx]:R[%eax] ← S x R[%eax] unsigned mull S
R[%edx]:R[%eax] ← S x R[%eax] signed imull S
Effect Instruction
R[%edx]:R[%eax] is viewed as a 64-bit quad word
![Page 75: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/75.jpg)
75
Practice Problem
0x3%rdx
0x1%rcx0x100%raxValue Register
subq %edx, %eaxdecq %ecxincq 8(%eax)imulq $16, (%eax,%edx,4)subw %edx, 4(%eax)addq %ecx, (%eax)
Result Destination address Instruction 0x100 0x1000x108 0xA8 0x118 0x1100x110 0x14 %rcx 0x0 %rax 0xFD
0x110x118
0x130x110
0xAB0x1080xFF0x100Value Address
![Page 76: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/76.jpg)
76
Logical Operators in C
![Page 77: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/77.jpg)
77
Shift Operations
same (i.e., same machine code)
![Page 78: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/78.jpg)
78
Practice Problem
longshiftExample (long x, long n) { x <<= 4; x >>= n; return x;
}
shiftExample:movq %rdi,%rax ; get x_________________ ; x <<= 4;movl %esi,%ecx ; get n_________________ ; x >>= n;ret
%rdi %rsi
salq $4,%rax
sarq %cl,%rax
Return value in %rax
animation
![Page 79: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/79.jpg)
79
Practice Problem
long arith (long x, long y, long z) { long t1 = x ^ y; long t2 = z * 48; long t3 = t1 & 0x0F0F0F0F; long t4 = t2 – t3; return t4;
}
arith:xorq %rsi,%rdi t1 = x ^ yleaq (%rdx,rdx,2),%rax 3×zsalq $4,%rax t2 = 16×(3×z) = 48×zandl $252645135,%edi t3 = t1& 0x0F0F0F0Fsubq %rdi,%rax return t2-t3ret
%rdi %rsi %rdx
Return value in %rax
![Page 80: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/80.jpg)
80
Disassembled 00401040 <_sum>: 0: 55 push %ebp 1: 89 e5 mov %esp,%ebp 3: 8b 45 0c mov 0xc(%ebp),%eax 6: 03 45 08 add 0x8(%ebp),%eax 9: 89 ec mov %ebp,%esp b: 5d pop %ebp c: c3 ret d: 8d 76 00 lea 0x0(%esi),%esi
Disassembling Object Code
![Page 81: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/81.jpg)
81
gcc -Wall -O1 -m32 -Wa,-al foo.c -c
foo.c
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
![Page 82: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/82.jpg)
82
gcc -Wall -O1 -m32 -Wa,-al foo.c -c 1 .file "foo.c" 2 .text 3 .globl foo3 4 .type foo3, @function 5 foo3: 6 .LFB0: 7 .cfi_startproc 8 0000 A1000000 movl y, %eax 8 00 9 0005 8D507B leal 123(%eax), %edx 10 0008 89150000 movl %edx, x 10 0000 11 000e 0FAF4424 imull 4(%esp), %eax 11 04 12 0013 C3 ret 13 .cfi_endproc 14 .LFE0: 15 .size foo3, .-foo3 16 .globl y 17 .data 18 .align 4 19 .type y, @object 20 .size y, 4 21 y: 22 0000 C8010000 .long 456 23 .ident "GCC: (Ubuntu 4.8.2-19ubuntu1) 4.8.2" 24 .section .note.GNU-stack,"",@progbits foo.c
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
![Page 83: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/83.jpg)
83
gcc -Wall -O1 -m32 -Wa,-al foo.c -c 1 .file "foo.c" 2 .text 3 .globl foo3 4 .type foo3, @function 5 foo3: 6 .LFB0: 7 .cfi_startproc 8 0000 A1000000 movl y, %eax 8 00 9 0005 8D507B leal 123(%eax), %edx 10 0008 89150000 movl %edx, x 10 0000 11 000e 0FAF4424 imull 4(%esp), %eax 11 04 12 0013 C3 ret 13 .cfi_endproc 14 .LFE0: 15 .size foo3, .-foo3 16 .globl y 17 .data 18 .align 4 19 .type y, @object 20 .size y, 4 21 y: 22 0000 C8010000 .long 456 23 .ident "GCC: (Ubuntu 4.8.2-19ubuntu1) 4.8.2" 24 .section .note.GNU-stack,"",@progbits foo.c
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
![Page 84: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/84.jpg)
84
What is in memory?
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
foo.c
foo3:0000 A1000000 movl y, %eax 000005 8D507B leal 123(%eax), %edx0008 89150000 movl %edx, x 0000000e 0FAF4424 imull 4(%esp), %eax 040013 C3 ret
0x?? 0x?? 0x?? 0x?? 0xc8 0x01 0x00 0x00
x
y
45610 = 1C816
![Page 85: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/85.jpg)
85
What is in memory?
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
foo.c
+0 a1 +1 00 +2 00 +3 00 +4 00 +5 8d +6 50 +7 7b +8 89 +9 15 +10 00 +11 00 +12 00 +13 00 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
foo3:0000 A1000000 movl y, %eax 000005 8D507B leal 123(%eax), %edx0008 89150000 movl %edx, x 0000000e 0FAF4424 imull 4(%esp), %eax 040013 C3 ret
0x?? 0x?? 0x?? 0x?? 0xc8 0x01 0x00 0x00
x
y
45610 = 1C816
![Page 86: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/86.jpg)
86
What is in memory?
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
foo.c
08048409: +0 a1 +1 00 +2 00 +3 00 +4 00 +5 8d +6 50 +7 7b +8 89 +9 15 +10 00 +11 00 +12 00 +13 00 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
foo3:0000 A1000000 movl y, %eax 000005 8D507B leal 123(%eax), %edx0008 89150000 movl %edx, x 0000000e 0FAF4424 imull 4(%esp), %eax 040013 C3 ret
0804a01c: 0x?? 1d: 0x?? 1e: 0x?? 1f: 0x?? 20: 0xc8 21: 0x01 22: 0x00 23: 0x00
x
y
45610 = 1C816
![Page 87: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/87.jpg)
87
What is in memory?
extern int x;int y=456;
int foo3 (int i) { x = y + 123; return (y*i);}
foo.c
08048409: +0 a1 +1 20 +2 a0 +3 04 +4 08 +5 8d +6 50 +7 7b +8 89 +9 15 +10 1c +11 a0 +12 04 +13 08 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
foo3:0000 A1000000 movl y, %eax 000005 8D507B leal 123(%eax), %edx0008 89150000 movl %edx, x 0000000e 0FAF4424 imull 4(%esp), %eax 040013 C3 ret
0804a01c: 0x?? 1d: 0x?? 1e: 0x?? 1f: 0x?? 20: 0xc8 21: 0x01 22: 0x00 23: 0x00
x
y
45610 = 1C816
![Page 88: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/88.jpg)
88
LINUX% gdb foo (gdb) x/x foo3 0x8048409 <foo3>: 0x04a020a1 (gdb) RETURN0x804840d <foo3+4>: 0x7b508d08 (gdb) RETURN 0x8048411 <foo3+8>: 0xa01c1589 (gdb) RETURN 0x8048415 <foo3+12>: 0xaf0f0804 (gdb) RETURN 0x8048419 <foo3+16>: 0xc3042444 (gdb)
Using gdb to disassemble 08048409: +0 a1 +1 20 +2 a0 +3 04 +4 08 +5 8d +6 50 +7 7b +8 89 +9 15 +10 1c +11 a0 +12 04 +13 08 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
![Page 89: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/89.jpg)
89
LINUX% gdb foo (gdb) x/x foo3 0x8048409 <foo3>: 0x04a020a1 (gdb) RETURN0x804840d <foo3+4>: 0x7b508d08 (gdb) RETURN 0x8048411 <foo3+8>: 0xa01c1589 (gdb) RETURN 0x8048415 <foo3+12>: 0xaf0f0804 (gdb) RETURN 0x8048419 <foo3+16>: 0xc3042444 (gdb) disass foo3 Dump of assembler code for function foo3: 0x08048409 <+0>: mov 0x804a020,%eax 0x0804840e <+5>: lea 0x7b(%eax),%edx 0x08048411 <+8>: mov %edx,0x804a01c 0x08048417 <+14>: imul 0x4(%esp),%eax 0x0804841c <+19>: ret End of assembler dump.
Using gdb to disassemble 08048409: +0 a1 +1 20 +2 a0 +3 04 +4 08 +5 8d +6 50 +7 7b +8 89 +9 15 +10 1c +11 a0 +12 04 +13 08 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
![Page 90: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/90.jpg)
90
LINUX% gdb foo (gdb) x/x foo3 0x8048409 <foo3>: 0x04a020a1 (gdb) RETURN0x804840d <foo3+4>: 0x7b508d08 (gdb) RETURN 0x8048411 <foo3+8>: 0xa01c1589 (gdb) RETURN 0x8048415 <foo3+12>: 0xaf0f0804 (gdb) RETURN 0x8048419 <foo3+16>: 0xc3042444 (gdb) disass foo3 Dump of assembler code for function foo3: 0x08048409 <+0>: mov 0x804a020,%eax 0x0804840e <+5>: lea 0x7b(%eax),%edx 0x08048411 <+8>: mov %edx,0x804a01c 0x08048417 <+14>: imul 0x4(%esp),%eax 0x0804841c <+19>: ret End of assembler dump.
Using gdb to disassemble 08048409: +0 a1 +1 20 +2 a0 +3 04 +4 08 +5 8d +6 50 +7 7b +8 89 +9 15 +10 1c +11 a0 +12 04 +13 08 +14 0f +15 af +16 44 +17 24 +18 04 +19 c3
foo3:0000 A1000000 movl y, %eax 000005 8D507B leal 123(%eax), %edx0008 89150000 movl %edx, x 0000000e 0FAF4424 imull 4(%esp), %eax 040013 C3 ret
![Page 91: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/91.jpg)
91
Where can you look this stuff up?
![Page 92: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/92.jpg)
92 SOURCE: Intel.com --- 3,603 pages!!!
From Intel Manual
![Page 93: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/93.jpg)
93 SOURCE: Intel.com --- 3,603 pages!!!
From Intel Manual
![Page 94: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/94.jpg)
94 SOURCE: Intel.com --- 3,603 pages!!!
![Page 95: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/95.jpg)
95
From Intel Manual
SOURCE: http://download.intel.com/design/intarch/manuals/24319101.pdf
![Page 96: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/96.jpg)
96
From Intel Manual
SOURCE: http://download.intel.com/design/intarch/manuals/24319101.pdf
![Page 97: X86-64: Data Access and Operations - Computer Action Teamweb.cecs.pdx.edu/~harry/cs201/slides/06DataAndOperations.pdf · 7 The Assembler Tool 000e34 MemoryZero: 000e34 8b1f0004 load](https://reader033.fdocuments.in/reader033/viewer/2022060311/5f0af15a7e708231d42e19e2/html5/thumbnails/97.jpg)
97
From Intel Manual
SOURCE: http://download.intel.com/design/intarch/manuals/24319101.pdf