EDA365电子论坛网

标题: ARM linux系统调用的实现原理 [打印本页]

作者: uqHZau    时间: 2020-10-10 17:08
标题: ARM linux系统调用的实现原理

大家都知道linux的应用程序要想访问内核必须使用系统调用从而实现从usr模式转到svc模式。下面咱们看看它的实现过程。

系统调用是os操作系统提供的服务,用户程序通过各种系统调用,来引用内核提供的各种服务,系统调用的执行让用户程序陷入内核,该陷入动作由swi软中断完成。


6 E/ z) E0 {" K8 e

at91rm9200处理器对应的linux2.4.19内核系统调用对应的软中断定义如下:
" w, ]# H% A* L" J% [! Z3 v#if defined(__thumb__) //thumb模式# O/ @8 C3 o3 k6 _9 v# f* K8 j/ T3 K* K
#define __syscall(name) /
  i2 D* ^# u9 W* z"push {r7}/n/t" /& P7 o, U9 }  i; \
"mov r7, #" __sys1(__NR_##name) "/n/t" /
! }! o7 H9 a1 X# p+ Q0 W"swi 0/n/t" /
% U% c1 G& b: i" D"pop {r7}"1 I8 F. M3 r2 B( h
#else //arm模式
$ J2 K- p( A2 ~2 k" a/ p: z! C% ~! y+ t#define __syscall(name) "swi/t" __sys1(__NR_##name) "/n/t"
: b2 C+ h, \" c% J) s#endif- P% g2 Z+ L- Q, _1 E3 C( C
: E7 L) _: [5 Y: d! y- l" U
#define __sys2(x) #x
  Y. p% {/ z. g& t. ^#define __sys1(x) __sys2(x)
2 G& K( r7 w" v' u#define __NR_SYSCALL_BASE 0x900000 //此为OS_NUMBER << 20运算值
) X% I' l6 p/ a#define __NR_open (__NR_SYSCALL_BASE+ 5) //0x900005


. {1 u3 r! R5 d# E5 ~

举一个例子来说: open系统调用,库函数最终会调用__syscall(open),宏展开之后为swi #__NR_open,即,swi #0x900005触发中断,中断号0x900005存放在[lr,#-4]地址中,处理器跳转到arch/arm/kernel/entry-common.S中vector_swi读取[lr,#-4]地址中的中断号,之后查询arch/arm/kernel/entry-common.S中的sys_call_table系统调用表,该表内容在arch/arm/kernel/calls.S中定义,__NR_open在表中对应的顺序号为
( W( R) I1 g( m+ ^8 Q$ [__syscall_start:/ e3 D3 o* u$ D( p7 |
...
/ g& Q9 I9 z' `7 g# z. O. T.long SYMBOL_NAME(sys_open) //第5个
! e( V' Y0 u  b2 D...

将sys_call_table[5]中内容传给pc,系统进入sys_open函数,处理实质的open动作

注:用到的一些函数数据所在文件,如下所示

arch/arm/kernel/calls.S声明了系统调用函数

include/asm-arm/unistd.h定义了系统调用的调用号规则4 L' A* p' `( ^3 a
vector_swi定义在arch/arm/kernel/entry-common.S% z4 M+ v4 f; s( b/ N& a* c
vector_IRQ定义在arch/arm/kernel/entry-armv.S
9 ~' V5 R2 M  x2 L6 C1 p' h  d1 vvector_FIQ定义在arch/arm/kernel/entry-armv.S
! |  x1 ?! k' karch/arm/kernel/entry-common.S中对sys_call_table进行了定义:
" |7 [6 {0 T) L( U.type sys_call_table, #object
# {' Q0 w6 W* a2 m, {ENTRY(sys_call_table), M/ ?3 k! g! P" c6 D' h
#include "calls.S" //将calls.S中的内容顺序链接到这里% C2 [+ l4 b0 @# v
源程序:  R8 g6 D9 }: ^/ G8 _( I
ENTRY(vector_swi)
3 m5 X! ~; U& Y& p6 Hsave_user_regs2 s/ K! ^6 h! U9 c  T% f) S% F
zero_fp, [6 ^& B# ^- T, q2 m' d' I; \
get_scno //将[lr,#-4]中的中断号转储到scno(r7)
  E+ N+ E. x3 p% ?; R. farm710_bug_check scno, ip! C  L. z( E: b8 {$ @# P
#ifdef CONFIG_ALIGNMENT_TRAP
6 C( y) J$ n8 X# J4 Ildr ip, __cr_alignment: X$ [2 {& _. U/ `, T2 G0 z
ldr ip, [ip]
6 @& b+ s$ B/ T- ]/ Emcr p15, 0, ip, c1, c0        @ update control register
' c8 Q4 ^* S  G$ V0 C0 D#endif
0 d; n' C7 w% L& e5 i0 aenable_irq ip7 L4 k' E: _. a" r' p. j4 i4 z
  f8 J, \" X. d% r( S
str r4, [sp, #-S_OFF]!        @ push fifth arg! \7 n' z* F: W' v+ w

* [% x, w: N4 I2 M6 T  ]  l3 a' o# n$ _get_current_task tsk) \4 x. f  b+ E# C3 q: [
ldr ip, [tsk, #TSK_PTRACE]        @ check for syscall tracing
- j0 R, w7 T8 M0 t9 l, Sbic scno, scno, #0xff000000        @ mask off SWI op-code
% @# \8 I, o( j, P, r6 p! L+ `# S- J//#define OS_NUMBER 9[entry-header.S]
- Z  _1 |5 S% s0 O7 m" |# K//所以对于上面示例中open系统调用号scno=0x9000059 `+ f4 z5 ], Z3 P, `! @7 t% Q) ^& S
//eor scno,scno,#0x900000$ Y$ C7 h2 p" ^& y& R. C) `
//之后scno=0x053 ]8 O1 k# q9 u
eor scno, scno, #OS_NUMBER << 20        @ check OS number. @. a  H$ k5 [; O
//sys_call_table项为calls.S的内容8 r1 }/ @! e4 j
adr tbl, sys_call_table        @ load syscall table pointer+ t* Y3 S8 C3 G
tst ip, #PT_TRACESYS        @ are we tracing syscalls?
$ B9 ^  v' ^% vbne __sys_trace
" l2 j2 n6 D2 N% I# X4 A% H4 T3 H
5 X, Y- B7 `, E& Ladrsvc al, lr, ret_fast_syscall        @ return address2 f% Q4 D- H: j* d. ^) W8 V8 U2 T
cmp scno, #NR_syscalls        @ check upper syscall limit, [$ m% Q  t6 p
//执行sys_open函数
% f% S% w* b; H6 s" f$ p0 Lldrcc pc, [tbl, scno, lsl #2]        @ call sys_* routine8 E% L" j, S: T! z# b. p$ J) M
add r1, sp, #S_OFF
- U' k" n# x5 i  L% R: k, Z2: mov why, #0        @ no longer a real syscall- X1 |1 i$ a# a2 U) A3 z, m
cmp scno, #ARMSWI_OFFSET: B7 G9 H, X' K- Q7 }- R- I
eor r0, scno, #OS_NUMBER << 20        @ put OS number back
, j+ Z3 z7 p+ q# Qbcs SYMBOL_NAME(arm_syscall) 7 F0 G% z2 _9 c. r1 w# J! k' J5 m
b SYMBOL_NAME(sys_ni_syscall)        @ not private func
7 B0 O, C" g; U# c* W6 ^/*
7 P1 }4 q2 r- w6 |: C3 c- Y7 a* This is the really slow path. We're going to be doing# k, e7 T" y( h9 }9 N* D
* context switches, and waiting for our parent to respond.4 b# w6 w; D5 H) s
*/
- Z' [, l; ~9 ^: F. k, p, W__sys_trace:
+ {) h+ Y! N6 d) x1 ~add r1, sp, #S_OFF, j* [3 J% V" T( a3 D2 z% E
mov r0, #0        @ trace entry [IP = 0]: K2 D* {) i. \# C7 Z
bl SYMBOL_NAME(syscall_trace)$ S: m& ]) w% B$ t) z& H- s
/*
- Y! S4 L! W0 p# y' J//2007-07-01 gliethttp [entry-header.S]
1 |% Y- N: z0 p& |//Like adr, but force SVC mode (if required)9 D6 e0 X' o0 V( [& o4 F8 M
.macro adrsvc, cond, reg, label* K- R# G& a* C8 i- c' `! u% I5 B
adr/cond /reg, /label
/ y4 i. W/ f- x' p  b( B.endm
6 h$ i% K; e2 C5 }7 _//对应反汇编:; j7 m, S% F# {( y$ O
//add lr, pc, #16 ; lr = __sys_trace_return
- T# i+ B, f, D*/
# e: g: |6 `4 E$ a' _; Iadrsvc al, lr, __sys_trace_return        @ return address
! R0 A5 m7 m, Z% Oadd r1, sp, #S_R0 + S_OFF        @ pointer to regs
/ \( R2 N3 n3 @7 o) b5 @. ocmp scno, #NR_syscalls        @ check upper syscall limit
2 m, f3 q4 s$ Qldmccia r1, {r0 - r3}        @ have to reload r0 - r3
  }5 B9 U- W1 {ldrcc pc, [tbl, scno, lsl #2]        @ call sys_* routine
" f9 u9 L/ Y1 R. M! \. Wb 2b
3 ]/ s  B  N- y2 n
5 [$ v6 Z. s9 D5 }. v9 y__sys_trace_return:
) i9 L1 A/ f$ i4 Rstr r0, [sp, #S_R0 + S_OFF]!        @ save returned r0
' D3 m! K7 F; K7 k0 L. T4 R8 j5 Cmov r1, sp
' Q! f4 q$ I, F# U& wmov r0, #1        @ trace exit [IP = 1]
1 e( n6 i+ [% }0 y+ K6 v9 j1 D. dbl SYMBOL_NAME(syscall_trace)
6 y9 ]% `# W& `3 D% S$ @b ret_disable_irq
3 \) c2 ^6 Y, Q: P+ ~0 S3 {
2 ~0 @  d" R) s$ X- x.align 5" Z/ l  S6 [( @% }
#ifdef CONFIG_ALIGNMENT_TRAP0 H$ I7 F' h* x$ N0 z
.type __cr_alignment, #object
5 n  C# W8 e' z' \& q7 h3 K) ~/ G__cr_alignment:$ h9 \; O" N% u- n+ Z1 I9 s; e4 }3 r$ a
.word SYMBOL_NAME(cr_alignment)
2 z( G$ b1 Z, m: M#endif5 J3 [. n" s) J4 ]- H
.type sys_call_table, #object
! J: k$ `# ~7 I- {* pENTRY(sys_call_table)
/ H0 l: M+ _4 v0 Q" b/ V6 T9 ]#include "calls.S"

$ e3 v4 U7 T' I) D9 K8 S( X2 [1 Q

作者: CCxiaom    时间: 2020-10-10 18:29
ARM linux系统调用的实现原理




欢迎光临 EDA365电子论坛网 (https://bbs.eda365.com/) Powered by Discuz! X3.2