Tag

x86-64

0 views collected around this technical thread.

Deepin Linux
Deepin Linux
Mar 25, 2025 · Fundamentals

Understanding x86-64 Memory Paging Mechanism and Its Implementation

This article explains the role, operation, and different modes of x86‑64 memory paging, describes how page directories and tables are set up in assembly, shows the relevant control‑register bits, and provides practical code examples for enabling and managing paging in a protected‑mode kernel.

Operating SystemPage TablesVirtual Memory
0 likes · 43 min read
Understanding x86-64 Memory Paging Mechanism and Its Implementation
Deepin Linux
Deepin Linux
Oct 23, 2024 · Fundamentals

Understanding Linux x86-64 System Call Implementation

This article provides a comprehensive overview of how Linux kernel system calls are implemented on the x86-64 architecture, covering the conceptual differences from regular function calls, register conventions, initialization processes, syscall tables, and practical assembly examples such as write and getpid.

LinuxOS internalsassembly
0 likes · 28 min read
Understanding Linux x86-64 System Call Implementation
Deepin Linux
Deepin Linux
Jul 15, 2024 · Fundamentals

Understanding Memory Paging and Page Table Structures in x86-64

Memory paging, a core memory‑management technique used in modern operating systems and x86‑64 processors, divides physical memory into fixed‑size pages, enabling virtual memory, isolation, sharing, lazy loading, and protection, while the article explains page tables, hierarchical paging modes, and provides assembly code for enabling paging.

Operating SystemsPage TablesVirtual Memory
0 likes · 34 min read
Understanding Memory Paging and Page Table Structures in x86-64
IT Services Circle
IT Services Circle
Jul 15, 2024 · Fundamentals

Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study

The article analyzes a crash that occurs on Windows 10 when a 64‑bit program mixes RSP and ESP instructions, explains how writing to the 32‑bit ESP register zero‑extends the upper 32 bits of RSP, and shows how this stack‑pointer mismatch leads to an access‑violation error that does not appear on Windows 7.

Reverse Engineeringassemblydebugging
0 likes · 6 min read
Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study
Deepin Linux
Deepin Linux
Apr 25, 2024 · Fundamentals

Understanding Linux System Calls: Mechanism, Debugging, and Implementation

This article explains how Linux system calls serve as the primary interface between user‑space programs and the kernel, describes the transition from user mode to kernel mode, and provides step‑by‑step debugging examples and source‑code snippets for x86_64 architectures.

Linuxassemblykernel debugging
0 likes · 31 min read
Understanding Linux System Calls: Mechanism, Debugging, and Implementation
Tencent Cloud Developer
Tencent Cloud Developer
Aug 8, 2022 · Fundamentals

Deep Dive into Function Call Implementation: From Assembly to CPU Registers

This article thoroughly explains low‑level function call implementation, covering Intel and AT&T assembly syntax, the evolution of CPU registers from 16‑bit to 64‑bit x86, caller‑ and callee‑saved conventions, stack‑based to register‑based parameter passing, stack frame setup, and assembly representations of control structures.

CPU architectureCPU registersLow-level programming
0 likes · 23 min read
Deep Dive into Function Call Implementation: From Assembly to CPU Registers