Assembly Language: Function Calls" Jennifer Rexford!



Similar documents
CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 20: Stack Frames 7 March 08

CS61: Systems Programing and Machine Organization

Lecture 7: Machine-Level Programming I: Basics Mohamed Zahran (aka Z)

Instruction Set Architecture

Machine Programming II: Instruc8ons

Machine-Level Programming II: Arithmetic & Control

Return-oriented programming without returns

CS:APP Chapter 4 Computer Architecture Instruction Set Architecture. CS:APP2e

Lecture 27 C and Assembly

A Tiny Guide to Programming in 32-bit x86 Assembly Language

Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail

l C-Programming l A real computer language l Data Representation l Everything goes down to bits and bytes l Machine representation Language

Intel Assembler. Project administration. Non-standard project. Project administration: Repository

Computer Architectures

CHAPTER 6 TASK MANAGEMENT

Intel 8086 architecture

Stack Overflows. Mitchell Adair

Buffer Overflows. Security 2011

64-Bit NASM Notes. Invoking 64-Bit NASM

Under The Hood: The System Call

x64 Cheat Sheet Fall 2015

Off-by-One exploitation tutorial

Chapter 4 Processor Architecture

X86-64 Architecture Guide

More MIPS: Recursion. Computer Science 104 Lecture 9

Abysssec Research. 1) Advisory information. 2) Vulnerable version

Machine-Code Generation for Functions

Stack machines The MIPS assembly language A simple source language Stack-machine implementation of the simple language Readings:

Software Vulnerabilities

Lecture Outline. Stack machines The MIPS assembly language. Code Generation (I)

1 The Java Virtual Machine

Systems Design & Programming Data Movement Instructions. Intel Assembly

5. Calling conventions for different C++ compilers and operating systems

W4118 Operating Systems. Junfeng Yang

Computer Organization and Assembly Language

Attacking x86 Windows Binaries by Jump Oriented Programming

Simple C Programs. Goals for this Lecture. Help you learn about:

Stack Allocation. Run-Time Data Structures. Static Structures

Programming from the Ground Up

TODAY, FEW PROGRAMMERS USE ASSEMBLY LANGUAGE. Higher-level languages such

Hotpatching and the Rise of Third-Party Patches

Computer Organization and Architecture

Computer Systems Architecture

The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014

Heap-based Buffer Overflow Vulnerability in Adobe Flash Player

Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code

Programming from the Ground Up

Software Fingerprinting for Automated Malicious Code Analysis

CS:APP Chapter 4 Computer Architecture. Wrap-Up. William J. Taffe Plymouth State University. using the slides of

Advanced Computer Architecture-CS501. Computer Systems Design and Architecture 2.1, 2.2, 3.2

High-speed image processing algorithms using MMX hardware

Compilers I - Chapter 4: Generating Better Code

CSC 2405: Computer Systems II

G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries

esrever gnireenigne tfosorcim seiranib

Computer Organization and Components

CS:APP Chapter 4 Computer Architecture Instruction Set Architecture

COMP 356 Programming Language Structures Notes for Chapter 10 of Concepts of Programming Languages Implementing Subprograms.

Chapter 7D The Java Virtual Machine

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering

Unpacked BCD Arithmetic. BCD (ASCII) Arithmetic. Where and Why is BCD used? From the SQL Server Manual. Packed BCD, ASCII, Unpacked BCD

Syscall Proxying - Simulating remote execution Maximiliano Caceres <maximiliano.caceres@corest.com> Copyright 2002 CORE SECURITY TECHNOLOGIES

Overview of IA-32 assembly programming. Lars Ailo Bongo University of Tromsø

Administration. Instruction scheduling. Modern processors. Examples. Simplified architecture model. CS 412 Introduction to Compilers

MSc Computer Science Dissertation

Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc

For a 64-bit system. I - Presentation Of The Shellcode

Computer Architectures

Encryption Wrapper. on OSX

TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com

Practical taint analysis for protecting buggy binaries

Return-oriented Programming: Exploitation without Code Injection

Introduction. Compiler Design CSE 504. Overview. Programming problems are easier to solve in high-level languages

Programming from the Ground Up. Jonathan Bartlett

Understanding a Simple Operating System

CS 161 Computer Security

Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration

Fighting malware on your own

Andreas Herrmann. AMD Operating System Research Center

Functional programming languages

A3 Computer Architecture

Dynamic Behavior Analysis Using Binary Instrumentation

telnetd exploit FreeBSD Telnetd Remote Exploit Für Compass Security AG Öffentliche Version 1.0 Januar 2012

Hacking the Preboot execution Environment

Identification and Removal of

Attacking Obfuscated Code with IDA Pro. Chris Eagle

x86-64 Machine-Level Programming

Binary Code Extraction and Interface Identification for Security Applications

Automatic Reverse Engineering of Data Structures from Binary Execution

An introduction to the Return Oriented Programming. Why and How

Reversing C++ Paul Vincent Sabanal. Mark Vincent Yason

CS 152 Computer Architecture and Engineering. Lecture 22: Virtual Machines

An Introduction to Assembly Programming with the ARM 32-bit Processor Family

Programming Languages and Compilers

REpsych. : psycholigical warfare in reverse engineering. def con 2015 // domas

Chapter 5 Kernel Code (kernel)

Transcription:

Assembly Language: Function Calls" Jennifer Rexford! 1

Goals of this Lecture" Function call problems:! Calling and returning! Passing parameters! Storing local variables! Handling registers without interference! Returning values! IA-32 solutions to those problems! Pertinent instructions and conventions! 2

Recall from Last Lecture" Examples of Operands! Immediate Operand! movl $5,! CPU uses 5 as source operand! movl $i,! CPU uses address denoted by i as source operand! Register Operand! movl %eax,! CPU uses contents of EAX register as source operand! 3

Recall from Last Lecture (cont.)" Memory Operand: Direct Addressing! movl i,! CPU fetches source operand from memory at address i! Memory Operand: Indirect Addressing! movl (%eax),! CPU considers contents of EAX to be an address! Fetches source operand from memory at that address! Memory Operand: Base+Displacement Addressing! movl 8(%eax),! CPU computes address as 8 + [contents of EAX]! Fetches source operand from memory at that address! 4

Recall from Last Lecture (cont.)" Memory Operand: Indexed Addressing! movl 8(%eax, %ecx),! Computes address as 8 + [contents of EAX] + [contents of ECX]! Fetches source operand from memory at that address! Memory Operand: Scaled Indexed Addressing! movl 8(%eax, %ecx, 4),! Computes address as 8 + [contents of EAX] + ([contents of ECX] * 4)! Fetches source operand from memory at that address! Same for destination operand, except! Destination operand cannot be immediate! 5

Function Call Problems" 1. Calling and returning! How does caller function jump to callee function?! How does callee function jump back to the right place in caller function?! 2. Passing parameters! How does caller function pass parameters to callee function?! 3. Storing local variables! Where does callee function store its local variables?! 4. Handling registers! How do caller and callee functions use same registers without interference?! 5. Returning a value! How does callee function send return value back to caller function?! 6

Problem 1: Calling and Returning" How does caller function jump to callee function?! I.e., Jump to the address of the calleeʼs first instruction! How does the callee function jump back to the right place in caller function?! I.e., Jump to the instruction immediately following the most-recently-executed call instruction! 7

Attempted Solution: Use Jmp Instruction" Attempted solution: caller and callee use jmp instruction! P: # Function P jmp R # Call R Rtn_point1: R: # Function R jmp Rtn_point1 # Return 8

Attempted Solution: Use Jmp Instruction" Problem: callee may be called by multiple callers! P: # Function P jmp R # Call R Rtn_point1: R: # Function R jmp??? # Return Q: # Function Q jmp R # Call R Rtn_point2: 9

Attempted Solution: Use Register" Attempted solution 2: Store return address in register! P: # Function P movl $Rtn_point1, %eax jmp R # Call R Rtn_point1: R: # Function R jmp *%eax # Return Q: # Function Q movl $Rtn_point2, %eax jmp R # Call R Rtn_point2: Special form of jmp instruction; we will not use 10

Attempted Solution: Use Register" Problem: Cannot handle nested function calls! P: # Function P movl $Rtn_point1, %eax jmp Q # Call Q Rtn_point1: R: # Function R jmp *%eax # Return Q: # Function Q movl $Rtn_point2, %eax jmp R # Call R Rtn_point2: jmp %eax # Return Problem if P calls Q, and Q calls R Return address for P to Q call is lost 11

IA-32 Solution: Use the Stack" May need to store many return addresses! The number of nested functions is not known in advance! A return address must be saved for as long as the function invocation continues, and discarded thereafter! Addresses used in reverse order! E.g., function P calls Q, which then calls R! Then R returns to Q which then returns to P! Last-in-first-out data structure (stack)! Caller pushes return address on the stack! and callee pops return address off the stack! IA 32 solution: Use the stack via call and ret! EIP for Q EIP for P 12

IA-32 Call and Ret Instructions" Ret instruction knows the return address! P: # Function P R: # Function R call R call Q 1! 2! ret Q: # Function Q call R ret 13

IA-32 Call and Ret Instructions" Ret instruction knows the return address! P: # Function P call R call Q 3! 4! 5! R: # Function R ret Q: # Function Q 6! call R ret 14

Implementation of Call" ESP (stack pointer register) points to top of stack! 0 Instruction" pushl src popl dest Effective Operations" subl $4, %esp movl src, (%esp) movl (%esp), dest addl $4, %esp ESP 15

Implementation of Call" EIP (instruction pointer register) points to next instruction to be executed! Instruction" pushl src popl dest call addr Effective Operations" subl $4, %esp movl src, (%esp) movl (%esp), dest addl $4, %esp pushl %eip jmp addr Call instruction pushes return address (old EIP) onto stack ESP before call 0 Note: can t really access EIP directly, but this is implicitly what call is doing 16

Implementation of Call" 0 Instruction" Effective Operations" pushl src subl $4, %esp movl src, (%esp) popl dest movl (%esp), dest addl $4, %esp call addr pushl %eip jmp addr ESP after call Old EIP 17

Implementation of Ret" 0 Instruction" pushl src popl dest call addr ret Effective Operations" subl $4, %esp movl src, (%esp) movl (%esp), dest addl $4, %esp pushl %eip jmp addr pop %eip Ret instruction pops stack, thus placing return address (old EIP) into EIP Note: can t really access EIP directly, but this is implicitly what ret is doing. ESP before ret Old EIP 18

Implementation of Ret" 0 Instruction" pushl src popl dest call addr Effective Operations" subl $4, %esp movl src, (%esp) movl (%esp), dest addl $4, %esp pushl %eip jmp addr ret pop %eip ESP after ret 19

Problem 2: Passing Parameters" Problem: How does caller function pass parameters to callee function?! int add3(int a, int b, int c) { int d; d = a + b + c; return d; } int f(void) { return add3(3, 4, 5); } 20

Attempted Solution: Use Registers" Attempted solution: Pass parameters in registers! f: movl $3, %eax movl $4, %ebx movl $5, %ecx call add3 add3: # Use EAX, EBX, ECX ret 21

Attempted Solution: Use Registers" Problem: Cannot handle nested function calls! f: movl $3, %eax movl $4, %ebx movl $5, %ecx call add3 add3: movl $6, %eax call g # Use EAX, EBX, ECX # But EAX is corrupted! ret Also: How to pass parameters that are longer than 4 bytes?! 22

IA-32 Solution: Use the Stack" Caller pushes parameters before executing the call instruction! 0 ESP before pushing params 23

IA-32 Parameter Passing" Caller pushes parameters in the reverse order! Push N th param first! Push 1 st param last! So first param is at top of the stack at the time of the Call! 0 ESP before call Param 1 Param Param N 24

IA-32 Parameter Passing" Callee addresses params relative to ESP: Param 1 as 4(%esp)! 0 ESP after call Old EIP Param 1 Param Param N 25

IA-32 Parameter Passing" After returning to the caller! 0 ESP after return Param 1 Param Param N 26

IA-32 Parameter Passing" the caller pops the parameters from the stack! 0 ESP after popping params 27

IA-32 Parameter Passing" For example:! f: # Push parameters pushl $5 pushl $4 pushl $3 call add3 # Pop parameters addl $12, %esp add3: movl 4(%esp), wherever movl 8(%esp), wherever movl 12(%esp), wherever ret 28

Base Pointer Register: EBP" Problem:! As callee executes, ESP may change! E.g., preparing to call another function! Error-prone for callee to reference params as offsets relative to ESP! Solution:! Use EBP as fixed reference point to access params! ESP after call 0 Old EIP Param 1 Param Param N EBP 29

Using EBP" Need to save old value of EBP! Before overwriting EBP register! 0 Callee executes prolog! pushl %ebp movl %esp, %ebp ESP Old EBP Old EIP Param 1 Param Param N EBP 30

Base Pointer Register: EBP" Callee executes prolog! pushl %ebp 0 movl %esp, %ebp Regardless of ESP, callee can reference param 1 as 8(%ebp), param 2 as 12(%ebp), etc.! ESP, EBP Old EBP Old EIP Param 1 Param Param N 31

Base Pointer Register: EBP" Before returning, callee must restore ESP and EBP to their old values! ESP 0 Callee executes epilog! movl %ebp, %esp popl %ebp ret EBP Old EBP Old EIP Param 1 Param Param N 32

Base Pointer Register: EBP" Callee executes epilog! movl %ebp, %esp 0 popl %ebp ret ESP, EBP Old EBP Old EIP Param 1 Param Param N 33

Base Pointer Register: EBP" Callee executes epilog! movl %ebp, %esp 0 popl %ebp ret ESP Old EIP Param 1 Param Param N EBP 34

Base Pointer Register: EBP" Callee executes epilog! movl %ebp, %esp 0 popl %ebp ret ESP Param 1 Param Param N EBP 35

Problem 3: Storing Local Variables" Where does callee function store its local variables?! int add3(int a, int b, int c) { int d; d = a + b + c; return d; } int foo(void) { return add3(3, 4, 5); } 36

IA-32 Solution: Use the Stack" Local variables:! Short-lived, so donʼt need a permanent location in memory! Size known in advance, so donʼt need to allocate on the heap! So, the function just uses the top of the stack! Store local variables on the top of the stack! The local variables disappear after the function returns! int add3(int a, int b, int c) { int d; d = a + b + c; return d; } int foo(void) { return add3(3, 4, 5); } 37

IA-32 Local Variables" Local variables of the callee are allocated on the stack! 0 Allocation done by moving the stack pointer! Example: allocate memory for two integers! subl $4, %esp! subl $4, %esp! (or equivalently, subl $8, %esp)! Reference local variables as negative offsets relative to EBP! -4(%ebp)! -8(%ebp)! ESP EBP Var 2 Var 1 Old EBP Old EIP Param 1 Param Param N 38

IA-32 Local Variables" For example:! add3: # Allocate space for d subl $4, %esp # Access d movl whatever, -4(%ebp) ret 39

Problem 4: Handling Registers" Problem: How do caller and callee functions use same registers without interference?! Registers are a finite resource!! In principle: Each function should have its own set of registers! In reality: All functions must use the same small set of registers! Callee may use a register that the caller also is using! When callee returns control to caller, old register contents may be lost! Caller function cannot continue where it left off! 40

IA-32 Solution: Define a Convention" IA-32 solution: save the registers on the stack! Someone must save old register contents! Someone must later restore the register contents! Define a convention for who saves and restores which registers! 41

IA-32 Register Handling" Caller-save registers! EAX, EDX, ECX ESP If necessary! Caller saves on stack before call! Caller restores from stack after call! Callee-save registers! EBX, ESI, EDI If necessary! EBP Callee saves on stack after prolog! Callee restores from stack before epilog! Caller can assume that values in EBX, ESI, EDI will not be changed by callee! 0 Var 2 Var 1 Saved EBX, ESI,EDI Old EBP Old EIP Param 1 Param Param N Saved EAX, EDX,ECX 42

Problem 5: Return Values" Problem: How does callee function send return value back to caller function?! In principle:! Store return value in stack frame of caller! Or, for efficiency:! Known small size => store return value in register! Other => store return value in stack! int add3(int a, int b, int c) { int d; d = a + b + c; return d; } int foo(void) { return add3(3, 4, 5); } 43

IA-32 Return Values" IA-32 Convention:! Integral type or pointer:! Store return value in EAX! char, short, int, long, pointer! Floating-point type:! Store return value in floatingpoint register! (Beyond scope of course)! Structure:! Store return value on stack! (Beyond scope of course)! int add3(int a, int b, int c) { int d; d = a + b + c; return d; } int foo(void) { return add3(3, 4, 5); } 44

Stack Frames" Summary of IA-32 function handling:! Stack has one stack frame per active function invocation! ESP points to top (low memory) of current stack frame! EBP points to bottom (high memory) of current stack frame! Stack frame contains:! Return address (Old EIP)! Old EBP! Saved register values! Local variables! Parameters to be passed to callee function! 45

A Simple Example" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } /* In some calling function */ x = add3(3, 4, 5); 46

Trace of a Simple Example 1" x = add3(3, 4, 5); Low memory ESP EBP High memory 47

Trace of a Simple Example 2" x = add3(3, 4, 5); Low memory # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx ESP Old EDX Old ECX Old EAX EBP High memory 48

Trace of a Simple Example 3" x = add3(3, 4, 5); Low memory # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 ESP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 49

Trace of a Simple Example 4" x = add3(3, 4, 5); Low memory # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 # Call add3 call add3 ESP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 50

Trace of a Simple Example 5" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } Low memory # Save old EBP pushl %ebp Prolog ESP Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 51

Trace of a Simple Example 6" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } Low memory # Save old EBP pushl %ebp # Change EBP movl %esp, %ebp Prolog ESP EBP Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX High memory 52

Trace of a Simple Example 7" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Save old EBP pushl %ebp # Change EBP movl %esp, %ebp # Save caller-save registers if necessary pushl %ebx pushl %esi pushl %edi Unnecessary here; add3 will not change the values in these registers Low memory ESP EBP Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX High memory 53

Trace of a Simple Example 8" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Save old EBP pushl %ebp # Change EBP movl %esp, %ebp # Save caller-save registers if necessary pushl %ebx pushl %esi pushl %edi # Allocate space for local variable subl $4, %esp Low memory ESP EBP Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX High memory 54

Trace of a Simple Example 9" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Save old EBP pushl %ebp # Change EBP movl %esp, %ebp # Save caller-save registers if necessary pushl %ebx pushl %esi pushl %edi # Allocate space for local variable subl $4, %esp # Perform the addition movl 8(%ebp), %eax addl 12(%ebp), %eax addl 16(%ebp), %eax movl %eax, -16(%ebp) Low memory ESP EBP Access params as positive offsets relative to EBP Access local vars as negative offsets relative to EBP High memory 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX 55

Trace of a Simple Example 10" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Copy the return value to EAX movl -16(%ebp), %eax # Restore callee-save registers if necessary movl -12(%ebp), %edi movl -8(%ebp), %esi movl -4(%ebp), %ebx Low memory ESP EBP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX High memory 56

Trace of a Simple Example 11" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Copy the return value to EAX movl -16(%ebp), %eax # Restore callee-save registers if necessary movl -12(%ebp), %edi movl -8(%ebp), %esi movl -4(%ebp), %ebx # Restore ESP movl %ebp, %esp Epilog Low memory ESP EBP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX High memory 57

Trace of a Simple Example 12" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Copy the return value to EAX movl -16(%ebp), %eax # Restore callee-save registers if necessary movl -12(%ebp), %edi movl -8(%ebp), %esi movl -4(%ebp), %ebx # Restore ESP movl %ebp, %esp # Restore EBP Epilog popl %ebp Low memory ESP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 58

Trace of a Simple Example 13" int add3(int a, int b, int c) { int d; d = a + b + c; return d; } # Copy the return value to EAX movl -16(%ebp), %eax # Restore callee-save registers if necessary movl -12(%ebp), %edi movl -8(%ebp), %esi movl -4(%ebp), %ebx # Restore ESP movl %ebp, %esp # Restore EBP popl %ebp # Return to calling function ret Low memory ESP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 59

Trace of a Simple Example 14" x = add3(3, 4, 5); # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 # Call add3 call add3 # Pop parameters addl $12, %esp Low memory ESP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 60

Trace of a Simple Example 15" x = add3(3, 4, 5); # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 # Call add3 call add3 # Pop parameters addl %12, %esp # Save return value movl %eax, wherever Low memory ESP 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX EBP High memory 61

Trace of a Simple Example 16" x = add3(3, 4, 5); # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 # Call add3 call add3 # Pop parameters addl %12, %esp # Save return value movl %eax, wherever # Restore caller-save registers if necessary popl %edx popl %ecx popl %eax Low memory ESP EBP High memory 12 Old EDI Old ESI Old EBX Old EBP Old EIP 3 4 5 Old EDX Old ECX Old EAX 62

Trace of a Simple Example 17" x = add3(3, 4, 5); Low memory # Save caller-save registers if necessary pushl %eax pushl %ecx pushl %edx # Push parameters pushl $5 pushl $4 pushl $3 # Call add3 call add3 # Pop parameters addl %12, %esp # Save return value movl %eax, wherever # Restore caller-save registers if necessary popl %edx popl %ecx popl %eax # Proceed! ESP EBP High memory 63

Summary" Calling and returning! Call instruction: push EIP onto stack and jump! Ret instruction: pop stack to EIP! Passing parameters! Caller pushes onto stack! Callee accesses as positive offsets from EBP! Caller pops from stack! 64

Summary (cont.)" Storing local variables! Callee pushes on stack! Callee accesses as negative offsets from EBP! Callee pops from stack! Handling registers! Caller saves and restores EAX, ECX, EDX if necessary! Callee saves and restores EBX, ESI, EDI if necessary! Returning values! Callee returns data of integral types and pointers in EAX! 65