學(xué)習(xí)筆記
使用教材(配書(shū)源碼以及使用方法)
《一個(gè)64位操作系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)》
http://www.ituring.com.cn/book/2450
http://www.reibang.com/p/28f9713a9171
源碼結(jié)構(gòu)
- 配書(shū)代碼包 :第5章 \ 程序 \ 程序5-1
程序5-1 運(yùn)行
ls
cd bootloader
make clean
make
cd ../
cd kernel
make clean
make
cd ../
sudo mount boot.img media -t vfat -o loop
sudo cp bootloader/loader.bin media
sync
sudo cp bootloader/boot.bin media
sync
sudo cp kernel/kernel.bin media
sync
bochs -f ./bochsrc
程序 5-1 源碼執(zhí)行流程
1攒至、到函數(shù) init 為止的流程硕蛹,可以參考:
[OS64][026]源碼閱讀:程序4-11 切換到第二個(gè)進(jìn)程 ,程序執(zhí)行過(guò)程示意圖
http://www.reibang.com/p/9bcc6d573978
2嗓蘑、進(jìn)入程序5-1的 函數(shù) init(task.c):
unsigned long init(unsigned long arg)
{
struct pt_regs *regs;
color_printk(RED,BLACK,"init task is running,arg:%#018lx\n",arg);
current->thread->rip = (unsigned long)ret_system_call;
current->thread->rsp = (unsigned long)current + STACK_SIZE - sizeof(struct pt_regs);
regs = (struct pt_regs *)current->thread->rsp;
__asm__ __volatile__ ( "movq %1, %%rsp \n\t"
"pushq %2 \n\t"
"jmp do_execve \n\t"
::"D"(regs),"m"(current->thread->rsp),"m"(current->thread->rip):"memory");
return 1;
}
pushq %2
就是push current->thread->rip
施戴,就是將ret_system_call
的入口地址壓棧,在函數(shù)do_execve
返回時(shí),是返回到ret_system_call
"D"(regs)
就是RDI=regs
和悦,之后接函數(shù)的jmp do_execve
的第一個(gè)參數(shù)
3、跳轉(zhuǎn)到函數(shù) do_execve(task.c) :
// task.c
void user_level_function()
{
color_printk(RED,BLACK,"user_level_function task is running\n");
while(1);
}
unsigned long do_execve(struct pt_regs * regs)
{
regs->rdx = 0x800000; //RIP
regs->rcx = 0xa00000; //RSP
regs->rax = 1;
regs->ds = 0;
regs->es = 0;
color_printk(RED,BLACK,"do_execve task is running\n");
memcpy(user_level_function,(void *)0x800000,1024);
return 0;
}
// lib.h
/*
From => To memory copy Num bytes
*/
inline void * memcpy(void *From,void * To,long Num)
{
. . .
return To;
}
memcpy(user_level_function,(void *)0x800000,1024);
把函數(shù)user_level_function
的全部機(jī)器碼復(fù)制到線性地址0x800000
起始處這里要注意區(qū)分燎窘,首先摹闽,沒(méi)錯(cuò),上面的代碼函數(shù)
user_level_function
的確是位于源碼文件task.c
中褐健,的確是位于內(nèi)核層付鹿,但是,執(zhí)行了語(yǔ)句memcpy
之后,這些機(jī)器碼就被復(fù)制到線性地址0x800000處了蚜迅,我們是說(shuō)那些位于線性地址0x800000的機(jī)器碼是用戶(hù)層這里在
regs
的RDX
字段以及RCX
字段填上的數(shù)值舵匾,0x800000
就是用戶(hù)層代碼段的起始地址,0xa00000
就是用戶(hù)層的椝唬基地址坐梯,這是作者順便選的空閑物理頁(yè),只要保證兩個(gè)值在同一個(gè)空閑物理頁(yè)即可這里填的是
regs
的RDX
字段以及RCX
字段刹帕,是為了滿(mǎn)足后面匯編指令sysexit
的參數(shù)要求吵血,RDX = 目標(biāo)代碼段的第一條指令地址、RCX=目標(biāo)代碼段的椡的纾基地址蹋辅,我們現(xiàn)在的目標(biāo)是3
特權(quán)級(jí)的用戶(hù)層
3、從do_execve(task.c) 返回挫掏,實(shí)則進(jìn)入函數(shù) ret_system_call(entry.S):
ENTRY(ret_system_call)
movq %rax, 0x80(%rsp)
popq %r15
popq %r14
popq %r13
popq %r12
popq %r11
popq %r10
popq %r9
popq %r8
popq %rbx
popq %rcx
popq %rdx
popq %rsi
popq %rdi
popq %rbp
popq %rax
movq %rax, %ds
popq %rax
movq %rax, %es
popq %rax
addq $0x38, %rsp
.byte 0x48
sysexit
// ptrace.h
struct pt_regs
{
unsigned long r15;
. . .
unsigned long rax;
unsigned long func;
unsigned long errcode;
unsigned long rip;
unsigned long cs;
unsigned long rflags;
unsigned long rsp;
unsigned long ss;
};
- 函數(shù)
do_execve
是return 0;
侦另,那么這里一開(kāi)始的RAX=0
- 這里依次將結(jié)構(gòu)體pt_regs的數(shù)值彈出到CPU的寄存器里面,成就了下面的匯編指令的執(zhí)行條件
RDX = 0x800000
RCX = 0xa00000
.byte 0x48
sysexit
- 指令
sysexit
能且只能從0
特權(quán)級(jí)向3
特權(quán)級(jí)進(jìn)行跳轉(zhuǎn)
執(zhí)行完之后,相當(dāng)于 RIP =0x800000褒傅,跳轉(zhuǎn)到用戶(hù)層開(kāi)始執(zhí)行
并且設(shè)置了RSP=0xa00000 將用戶(hù)層的椘瘢基地址設(shè)置在0xa00000
4、用戶(hù)層線性地址0x80000:
|----- -----|---- kernel -----|---- ----|. . . . . . . . .|--- user ----|
0 1MB 2MB 8MB
- 輸出黑底紅字的字符串
"user_level_function task is running\n"
程序5-1 調(diào)試過(guò)程
- 1殿托、運(yùn)行到
00104052: sysexit
為止霹菊,現(xiàn)在退出,還是處在0特權(quán)級(jí)(CS段選擇子的RPL字段是0)
Please choose one: [6] 6
<bochs:1> b 0x10ae30
<bochs:2> c
(0) Breakpoint 1, 0xffff80000010ae30 in ?? ()
Next at t=63148016
(0) [0x00000010ae30] 0008:ffff80000010ae30 (unk. ctxt): push rbp ; 55
<bochs:3> b 0x10af0a
<bochs:4> c
00063152000i[XGUI ] GFX snapshot: 1440 x 900 x 32 bpp (5184000 bytes)
(0) Breakpoint 2, 0xffff80000010af0a in ?? ()
Next at t=63245704
(0) [0x00000010af0a] 0008:ffff80000010af0a (unk. ctxt): mov rsp, qword ptr ds:[rbx+16] ; 488b6310
<bochs:5> s
Next at t=63245705
(0) [0x00000010af0e] 0008:ffff80000010af0e (unk. ctxt): push qword ptr ds:[rdx+8] ; ff7208
<bochs:6> s
Next at t=63245706
(0) [0x00000010af11] 0008:ffff80000010af11 (unk. ctxt): jmp .-381 (0xffff80000010ad99) ; e983feffff
<bochs:7> print-stack
Stack address size 8
| STACK 0xffff800000207f38 [0xffff8000:0x00104027]
<bochs:8> s
Next at t=63245707
(0) [0x00000010ad99] 0008:ffff80000010ad99 (unk. ctxt): push rbp ; 55
<bochs:9> b 0x10ae2f
<bochs:10> c
(0) Breakpoint 3, 0xffff80000010ae2f in ?? ()
Next at t=63302538
(0) [0x00000010ae2f] 0008:ffff80000010ae2f (unk. ctxt): ret ; c3
<bochs:11> s
Next at t=63302539
(0) [0x000000104027] 0008:ffff800000104027 (unk. ctxt): mov qword ptr ss:[rsp+128], rax ; 4889842480000000
<bochs:16> u 0x104027 0x104055
00104027: ( ): mov qword ptr ss:[rsp+128], rax ; 4889842480000000
0010402f: ( ): pop r15 ; 415f
00104031: ( ): pop r14 ; 415e
00104033: ( ): pop r13 ; 415d
00104035: ( ): pop r12 ; 415c
00104037: ( ): pop r11 ; 415b
00104039: ( ): pop r10 ; 415a
0010403b: ( ): pop r9 ; 4159
0010403d: ( ): pop r8 ; 4158
0010403f: ( ): pop rbx ; 5b
00104040: ( ): pop rcx ; 59
00104041: ( ): pop rdx ; 5a
00104042: ( ): pop rsi ; 5e
00104043: ( ): pop rdi ; 5f
00104044: ( ): pop rbp ; 5d
00104045: ( ): pop rax ; 58
00104046: ( ): mov ds, ax ; 488ed8
00104049: ( ): pop rax ; 58
0010404a: ( ): mov es, ax ; 488ec0
0010404d: ( ): pop rax ; 58
0010404e: ( ): add rsp, 0x0000000000000038 ; 4883c438
00104052: ( ): sysexit ; 480f35
<bochs:21> q
00063302539i[ ] dbg: Quit
00063302539i[CPU0 ] CPU is in long mode (active)
00063302539i[CPU0 ] CS.mode = 64 bit
00063302539i[CPU0 ] SS.mode = 64 bit
00063302539i[CPU0 ] | RCX=0000000000000000 RDX=0000000000000400
00063302539i[CPU0 ] | RSP=ffff800000207f40
00063302539i[CPU0 ] | SEG sltr(index|ti|rpl) base limit G D
00063302539i[CPU0 ] | CS:0008( 0001| 0| 0) 00000000 00000000 0 0
00063302539i[CPU0 ] | DS:0010( 0002| 0| 0) 00000000 00000000 0 0
00063302539i[CPU0 ] | SS:0010( 0002| 0| 0) 00000000 00000000 0 0
00063302539i[CPU0 ] | RIP=ffff800000104027 (ffff800000104027)
00063302539i[CMOS ] Last time is 1561038347 (Thu Jun 20 21:45:47 2019)
00063302539i[XGUI ] Exit
00063302539i[SIM ] quit_sim called with exit code 0
- 2碌尔、重新運(yùn)行一次浇辜,這一次執(zhí)行了
sysexit
指令,就去到了線性地址0x800000
處開(kāi)始的用戶(hù)層唾戚,CS段選擇子的RPL變成3了
Please choose one: [6] 6
(0) [0x0000fffffff0] f000:fff0 (unk. ctxt): jmpf 0xf000:e05b ; ea5be000f0
<bochs:1> b 0x104052
<bochs:2> c
(0) Breakpoint 1, 0xffff800000104052 in ?? ()
Next at t=63285312
(0) [0x000000104052] 0008:ffff800000104052 (unk. ctxt): sysexit ; 480f35
<bochs:10> q
00063285313i[ ] dbg: Quit
00063285313i[CPU0 ] CPU is in long mode (active)
00063285313i[CPU0 ] CS.mode = 64 bit
00063285313i[CPU0 ] SS.mode = 64 bit
00063285313i[CPU0 ] | RCX=0000000000a00000 RDX=0000000000800000
00063285313i[CPU0 ] | RSP=0000000000a00000
00063285313i[CPU0 ] | SEG sltr(index|ti|rpl) base limit G D
00063285313i[CPU0 ] | CS:002b( 0005| 0| 3) 00000000 ffffffff 1 0
00063285313i[CPU0 ] | DS:0000( 0000| 0| 0) 00000000 00000000 0 0
00063285313i[CPU0 ] | SS:0033( 0006| 0| 3) 00000000 ffffffff 1 1
00063285313i[CPU0 ] | RIP=0000000000800000 (0000000000800000)
00063285313i[CMOS ] Last time is 1561039536 (Thu Jun 20 22:05:36 2019)
00063285313i[XGUI ] Exit
00063285313i[SIM ] quit_sim called with exit code 0