|
|
EDA365欢迎您登录!
您需要 登录 才可以下载或查看,没有帐号?注册
x
$ K* o. k; e, U/ G# P
大家都知道linux的应用程序要想访问内核必须使用系统调用从而实现从usr模式转到svc模式。下面咱们看看它的实现过程。1 N6 ?9 g$ O* \: G% b% q; O6 G
8 R1 i* y9 T, L( j( G2 L8 _4 j
系统调用是os操作系统提供的服务,用户程序通过各种系统调用,来引用内核提供的各种服务,系统调用的执行让用户程序陷入内核,该陷入动作由swi软中断完成。3 _" S& o0 s1 `9 V; e3 b) {( _
5 h9 G% ~" a- rat91rm9200处理器对应的linux2.4.19内核系统调用对应的软中断定义如下:
% F: P: r, |4 z& w! t1 T- G1 ~#if defined(__thumb__) //thumb模式
4 i9 q# I& d3 ]; L* M! U6 t% w( e#define __syscall(name) /* j3 v8 {- U" ~6 ^4 F- {
"push {r7}/n/t" // W5 J4 w6 J7 Q1 p; @
"mov r7, #" __sys1(__NR_##name) "/n/t" /( ~6 j3 Q/ F4 ~, P
"swi 0/n/t" /) N# S2 {) @+ z; r7 R! e
"pop {r7}"- q i+ P' K. L3 J/ D
#else //ARM模式
" \3 m7 E, M1 z2 R" f$ @! l#define __syscall(name) "swi/t" __sys1(__NR_##name) "/n/t"
# r" V) c) e* t+ ]1 A#endif# B3 D+ e* E0 t$ h2 ^. ]
% B0 A' h5 W$ O#define __sys2(x) #x' N- a8 l0 l$ y2 g$ `+ ?
#define __sys1(x) __sys2(x)" m7 P* h5 X7 I2 v
#define __NR_SYSCALL_BASE 0x900000 //此为OS_NUMBER << 20运算值
, H( P( [+ j/ E K x g W" m$ G G#define __NR_open (__NR_SYSCALL_BASE+ 5) //0x900005
+ @) r9 {& u/ ]# j! k* M
+ _! F# h6 J6 r2 ~% I / Y! q& M1 }# [( J4 q9 {
9 d; j! R. L. Z S7 x* p4 ^举一个例子来说:open系统调用,库函数最终会调用__syscall(open),宏展开之后为swi #__NR_open,即,swi #0x900005触发中断,中断号0x900005存放在[lr,#-4]地址中,处理器跳转到arch/arm/kernel/entry-common.S中vector_swi读取[lr,#-4]地址中的中断号,之后查询arch/arm/kernel/entry-common.S中的sys_call_table系统调用表,该表内容在arch/arm/kernel/calls.S中定义,__NR_open在表中对应的顺序号为4 C' r* e1 d- S; ~5 J
__syscall_start:
" K1 N- O* R/ q/ U...! X) j; S. r; g, C, h
.long SYMBOL_NAME(sys_open) //第5个9 i+ x# f4 S3 r2 ~" o
...- l; k% z- ?& r; ?$ p5 J! j
+ [9 ^- b% X; h1 C3 T6 u$ n, G9 D将sys_call_table[5]中内容传给pc,系统进入sys_open函数,处理实质的open动作
. M- B. [- }( q z! l, @% ~! G4 i5 k* K+ Y* B
注:用到的一些函数数据所在文件,如下所示2 ~( {1 W9 g( T! B/ K% K8 L
+ B" z" y) o6 q1 C) j! [
arch/arm/kernel/calls.S声明了系统调用函数' y, _3 L! P/ l$ H& z5 O
# {* G& m/ v& f& Z$ Y* q
include/asm-arm/unistd.h定义了系统调用的调用号规则5 u0 k; T! Z: z0 v
vector_swi定义在arch/arm/kernel/entry-common.S
6 W2 `% @3 B! @: kvector_IRQ定义在arch/arm/kernel/entry-armv.S
5 {6 L$ u5 E. M7 A+ m4 Vvector_FIQ定义在arch/arm/kernel/entry-armv.S! z& o6 @* C- S' F% c0 N! m
arch/arm/kernel/entry-common.S中对sys_call_table进行了定义:
( O* d* U0 P& f, {" q.type sys_call_table, #object
. n1 W, x% @7 k/ q0 o* EENTRY(sys_call_table)8 L( Z2 m M( j& E% w9 N9 ?2 @
#include "calls.S" //将calls.S中的内容顺序链接到这里
5 W% V# E& h# Y源程序:, W7 M5 a" A2 D' M) W
ENTRY(vector_swi)
1 r" u- E/ D; H% f/ Ssave_user_regs
. L$ a2 _% `! T& j! z+ Z, z Ezero_fp, }: J3 }! M6 J# d% R
get_scno //将[lr,#-4]中的中断号转储到scno(r7)
3 N) D' v4 T) T Xarm710_bug_check scno, ip$ X- H, y. _; X4 `8 [4 @. g
#ifdef CONFIG_ALIGNMENT_TRAP# r; C5 Q4 @1 Q& ^
ldr ip, __cr_alignment0 O3 I& z8 D4 ~
ldr ip, [ip]
# `! i. k# r( Mmcr p15, 0, ip, c1, c0 @ update control register
9 y% M# k: R2 W3 d/ F7 n: I#endif
, l/ l* i4 z6 jenable_irq ip
/ l$ Z, m/ d/ X, Q G. @( J1 i
/ E: r/ H: R S+ H2 dstr r4, [sp, #-S_OFF]! @ push fifth arg
! r. {! Y s- m( E R' c/ h6 M; G6 d
get_current_task tsk
. e! X( t) O x* j- K9 A: jldr ip, [tsk, #TSK_PTRACE] @ check for syscall tracing
" M$ H9 w3 ]! j* t% P# P, Mbic scno, scno, #0xff000000 @ mask off SWI op-code
. \0 F, P& |8 ?2 R# N) S//#define OS_NUMBER 9[entry-header.S]
h' \( }/ {7 c% d$ `( w$ h//所以对于上面示例中open系统调用号scno=0x900005: \( Y. e2 ?! R3 N( e
//eor scno,scno,#0x900000. J: ^" I. K+ l$ Q B
//之后scno=0x05
3 n- ~0 Z8 `4 j6 b ceor scno, scno, #OS_NUMBER << 20 @ check OS number
& X7 R8 W: q% `* D$ v//sys_call_table项为calls.S的内容
+ d% M; f- ~- l6 x Dadr tbl, sys_call_table @ load syscall table pointer( W( W8 h% z. k. |9 u& D. F/ z
tst ip, #PT_TRACESYS @ are we tracing syscalls?* p3 D. f) G n/ n" I5 _% `
bne __sys_trace
, x6 c4 j0 C- ^/ U% w3 {5 ]& g* o* @8 {! Q" I
adrsvc al, lr, ret_fast_syscall @ return address5 e. I% _. `) u, }
cmp scno, #NR_syscalls @ check upper syscall limit
8 J. C l, O& C8 K//执行sys_open函数, u* v+ y3 [) @' o3 w8 \
ldrcc pc, [tbl, scno, lsl #2] @ call sys_* routine
# q! r' i- \- Z I" j, Jadd r1, sp, #S_OFF
. B# Z' Q* i% \: l8 F2: mov why, #0 @ no longer a real syscall
' j& `& W4 `* \" Qcmp scno, #ARMSWI_OFFSET
% ^; W9 u O t: R+ E5 Deor r0, scno, #OS_NUMBER << 20 @ put OS number back' s% D# l7 j3 H- m
bcs SYMBOL_NAME(arm_syscall)
( e/ c; P& l2 Hb SYMBOL_NAME(sys_ni_syscall) @ not private func
- n$ u, A! L& N: j/*/ h4 S1 E' o' i& n, |% b$ f
* This is the really slow path. We're going to be doing
$ ^0 W/ p: k+ H7 X( W1 V* context switches, and waiting for our parent to respond.
# s6 L" s! \" m# m& C4 k*/( U( \$ f3 ~0 w7 P; P7 x9 a+ S
__sys_trace:
4 C y: H* v7 ]2 A) b" [add r1, sp, #S_OFF' j/ m! U3 ?$ M; O0 Y; R
mov r0, #0 @ trace entry [IP = 0]
' j g7 q' g6 M! }. A% Nbl SYMBOL_NAME(syscall_trace)
?4 x9 {$ H) j+ E8 y/*& v/ j ]% V% g! i
//2007-07-01 gliethttp [entry-header.S]- O! ?2 R- W6 q7 {# U7 Y+ `
//Like adr, but force SVC mode (if required)! `! K# M" ?3 Y& H: O; p! J. w
.macro adrsvc, cond, reg, label
5 V) H L5 H" Z- D' r" _0 i$ O+ [adr/cond /reg, /label
D8 U( |1 n) e# ].endm
' J! ~& b- ^# J$ U1 U* v6 i//对应反汇编:
3 t$ T1 a& b. }- m y//add lr, pc, #16 ; lr = __sys_trace_return& _# H7 t) q0 u/ T% q
*/) I: [2 {) Z+ J, U5 i
adrsvc al, lr, __sys_trace_return @ return address: V: T( m; v: z$ r
add r1, sp, #S_R0 + S_OFF @ pointer to regs; e- O# ?* P4 y j7 p/ ~
cmp scno, #NR_syscalls @ check upper syscall limit
* l2 {* q/ |. u9 b6 g# Aldmccia r1, {r0 - r3} @ have to reload r0 - r34 r0 E& c, ^- Z, I
ldrcc pc, [tbl, scno, lsl #2] @ call sys_* routine1 Q# q- L- |' Q& d; ?. W8 w1 q& s
b 2b( |9 f' t9 B% I, T
7 [0 F/ ^7 h$ T4 p1 M__sys_trace_return:
0 Y# h! \/ I( T' U, y; y Dstr r0, [sp, #S_R0 + S_OFF]! @ save returned r0
; j4 q+ C0 w" u% \6 c7 pmov r1, sp
" G* T) { A1 A( f# Wmov r0, #1 @ trace exit [IP = 1]
" s0 O. F" d' A7 }- dbl SYMBOL_NAME(syscall_trace)
. e" h7 V# X% ]# Jb ret_disable_irq
: c R; y- Q" t7 B5 c
2 E- `; c& O3 E9 o9 j4 j' F.align 59 C, P0 |$ ?0 _# Z$ G
#ifdef CONFIG_ALIGNMENT_TRAP2 _- i- |5 ^* {4 L+ H8 V& s
.type __cr_alignment, #object5 f; r# |. w& \
__cr_alignment:; @1 h+ I( G& l: ~: x; k
.word SYMBOL_NAME(cr_alignment)
; Z. z$ J0 J/ H* a. x( H; n* P2 R5 x#endif
6 h5 j+ u) |, u: G.type sys_call_table, #object
9 U+ R3 t$ [, V/ n3 pENTRY(sys_call_table)
8 V1 _# d* w/ _7 B# E#include "calls.S"
. W% ~ |; x U% |! o
. u8 ^4 D* j% D/ [1 O4 E/ v. { |
|