X86 assembly programming in protected mode
|
The most frequently used X86 assembly language is x86 assembly programming in protected mode. x86 assembly programming in protected mode utilises 32 bit addressing of registers and memory, and enables other features such as protection and paging. Protected mode is the mode in which most modern operating systems run their code. When the computer boots, it first enters real mode; the operating system is responsible for switching into protected mode.
Contents |
Application registers
In protected mode, there are 8 32-bit general-purpose registers for use:
- data registers
- EAX, the accumulator
- EBX, the base register
- ECX, the counter register
- EDX, the data register
- address registers
- ESI, the source register
- EDI, the destination register
- ESP, the stack pointer register
- EBP, the stack base pointer register
In addition there are non-application registers available, which change the state of the processor:
- control registers
- CR0
- CR1
- CR2
- CR3
- test registers
- TR4
- TR5
- TR6
- TR7
- descriptor registers
- GDTR, the global descriptor table register (see below)
- LDTR, the local descriptor table register (see below)
- IDTR, the interrupt descriptor table register (see below)
- task register
- TR
All of them can be used both for segmented addressing of memory and for holding data. Some of these registers are however better to use for certain operations than others. This is because mnemonics using certain registers could be translated into shorter opcodes than if they used other registers.
The lower 16 bits of each 32 bit register can be addressed separately and like a register in its own right, and these 16 bit registers can be broken up into two eight-bit registers - that is 16 bits of data in a 16 bit register can be addressed 8 bits at a time: the upper eight and the lower eight bits, and can be treated as registers in their own right.
If we take the EAX register, this register contains 32 bits and the lower 16 bits can be addressed by the AX register. The upper 8 bits of the AX register can be addressed by the AH register and the lower 8 bits of the AX register can be addressed by the AL register.
For example, if ECX initially contains the number 0x3A3F901D and CH changes to 0x44, then ECX will also change to contain 0x3A3F441D.
There is also a 32-bit wide flags register, named EFLAGS, which contain the processor state. Each flag is one bit - and thus set 0 or 1, also called set, high, and unset or low. Important flags in the EFLAGS register is: carry (bit 0), zero (bit 6), sign flag (bit 7) and overflow (bit 11).
Flags are notably used in the x86 architecture for comparisons. A comparison is made between two registers, for example, and in comparison of their difference a flag is raised. A jump instruction then checks the respective flag and jumps if the flag has been raised: for example
cmp ax, bx jne do_something
first compares the AX and BX registers, and if they are unequal, the code branches off to the do_something label.
There is also a 32-bit instruction pointer, named EIP. The IP register points to where in the program the processor is currently executing its code. The IP register cannot be accessed by the programmer directly.
Mnemonics for opcodes
In protected mode, the following mnemonics are available: aaa, aad, aam, aas, adc, add, and, arpl, bound, bsp, bsr, bt, btc, btr, bts, call, cbw, cwde, clc, cld, cli, clts, cmc, cmp, cmps, cmpsb, cmpsw, cmpsd, cwd, cdq, daa, das, dec, div, enter, hlt, idiv, imul, in, inc, ins, insb, insw, insd, int, into, iret, iretd, ja, jae, jb, jbe, jc, jcxz, jecxz, je, jz, jg, jge, jl, jle, jmp, jna, jnae, jnb, jnbe, jnc, jne, jng, jnge, jnl, jnle, jno, jnp, jns, jnz, jo, jp, jpe, jpo, js, jz, lahf, lar, lea, leave, lgdt, lidt, lgs, lss, lds, les, lfs, lldt, lmsw, lock, lods, lodsb, lodsw, lodsd, loop, loope, loopz, loopne, loopnz, lsl, ltr, mov, movsx, movzx, mul, neg, nop, not, or, out, outs, outsb, outsw, outsd, pop, popa, popad, popf, popfd, push, pusha, pushad, pushf, pushfd, rcl, rcr, rol, ror, rep, repe, repz, repne, repnz, ret, sahf, sal, sar, shl, shr, sbb, scas, scasb, scasw, scasd, seta, setae, setb, setbe, setc, sete, setg, setge, setl, setle, setna, setnae, setnb, setnbe, setnc, setne, netng, setnl, setnle, setno, setnp, setpe, setpo, sets, setz, sgtd, sidt, shld, shrd, sldt, smsw, stc, std, sti, stos, stosb, stosw, stosd, str, sub, test, verr, verw, wait, xchg, xlat, xlatb, xor.
(not including the floating point, SIMD and some other instructions)
There is also some undocumented instructions, like the umov instruction that could be used for in circuit emulators. (umov stands for "user move", and with the knowledge of that instruction it becomes much easier to write certain types of software debuggers.)
The addressing model in protected mode
It is important to differ addresses from each other in protected mode. There are physical addresses, linear addresses and logic addresses.
A logic address is a segment-register and a offset-register paired together. However, only the offset address matters because nearly all operating systems use flat addressing (see below). With other words: A logic address is a pointer inside a program.
A linear address is a logic address that has gone through the descriptor-mechanism. (see Descriptors below.)
A physical address is a logic address that has gone through the paging mechanism. (see Paging below.)
That means that inside protected mode, each address has to go through two layers of redirectioning before it gets through to the real memory.
Descriptors
There is a Global Description Table (GDT) and a Local Description Table (LDT) that holds information about how the memory should look and behave. The GDT is pointed to by the GDT-register (GDTR) and the LDT is pointed to by the LDT-register (LDTR). The pointers to these tables are 48 bits wide, and contains two fields; A pointer to the beginning of the table (base), and a part that describes how large the table is in bytes (limit).
The base can be either 16- or 32-bits wide. It is only 16 bits wide when used to control a realmode environment.
To address some point in the memory, a segment register and a offset register is used. Segment registers are:
CS, DS, ES, FS, GS and SS.
CS points to the segment containing code and DS to the data segment. ES, FS and GS points to extra-segments that could be used to store additional data. The SS-segment is used to hold the stack.
Each segment-register points to a descriptor. Each descriptor points to a well defined data area. If the descriptor that GS points defines its data area to starts at 0x000A0010, and to end at 0x000C0000, and the EAX-register contains the value 0x0001C234, then the combination GS:EAX will point to 0x000BC244.
The GDT and LDT contains descriptors that points to data areas that has different properties. Most often, there is one null-descriptor, 2 data descriptors, 2 code descriptors and a multiply of TSS-descriptors. Most often, the code- and data-descriptors points to an area in the memory that starts at 0 and ends at 4 gigabytes. This way, descriptors and segment registers becomes almost invisible for the application programmer. This is called flat memory-model. In flat memory, segment registers lose their importance. Only offset-registers is used to point out the addresses.
TSS-descriptors is used to hold information about tasks. TSS-descriptors are part of the hardware support for multitasking that x86-processors enables.
If a segment register points to a descriptor in the GDT or LDT that has a 32-bit base while switching back to realmode, the segmentregister will continiue to point to the 32-bit descriptor for as long as it stays unmodified. If the descriptor has a base pointing to 0, a limit of 4 gigabytes, and the D-flag set, then it will become possible to use 32-bit addressing in realmode. This is sometimes called unreal mode as this is not entirely ordinary realmode behaviour.
Pages
Paging can be turned on and off with the help of bit 31 in the CR0-register. Register CR3 is used to point to the page directory table. See paging.
Memory layout for PCs in protected mode
The memory layout for computers in protected mode is similar to that of real mode. Alas, some PCs have the 15th megabyte occupied by the video-card.
0-3FF Application RAM 400-5FF BDA (BIOS Data Area) * 600-9FFFF Application RAM A0000-BFFFF VGA Video memory C0000-EFFFF Optional ROMs (The VGA ROM is usually located at C0000) F0000-FFFFF BIOS ROM
* = The BIOS is inactive in protected mode, therefor this area could be considered to be "application RAM" as well.
Supervisor mode
See supervisor mode
Interrupts in protected mode
Interrupts is mostly much the same as in realmode, with the exception of being capable of performing more complicated switches. For example, an interrupt in protected mode can be programmed to automatically switch into a specific process or thread.
The Interrupt Description Table (IDT) is pointed by the IDT-register (IDTR), which is 48 bits wide and works just like the GDTR/LDTR. (See above.)
How to switch to protected mode
- load GDTR with the pointer to the GDT-table.
- load IDTR with the pointer to the IDT OR disable interrupts ("cli").
- set the PE-bit in the CR0-register.
- make a far jump to the 32-bit code to flush the PIQ.
- initialize TR with the selector of a valid TSS.
- optional: load LDTR with the pointer to the LDT-table.