LECTURE NOTE 5: the MEMORY MANAGEMENT REAL MODE Allows the Microprocessor to Address Only the First 1Mbyte of Memory Even If Its Pentium II Microprocessor

Total Page:16

File Type:pdf, Size:1020Kb

LECTURE NOTE 5: the MEMORY MANAGEMENT REAL MODE Allows the Microprocessor to Address Only the First 1Mbyte of Memory Even If Its Pentium II Microprocessor LECTURE NOTE 5: THE MEMORY MANAGEMENT REAL MODE Allows the microprocessor to address only the first 1Mbyte of memory even if its Pentium II microprocessor. The first 1Mbyte of memory is called either the real mode or conventional memory system. The DOS operating system requires the microprocessor to operate in this mode. It allows application software. Segment and Offset Through the combination of these two, a memory location is accessed in the real mode. All real mode memory address must consist of a segment address plus an offset address. Segment Address Defines the beginning address of any 64k-byte memory segment. Offset Address Sometimes called displacement or relative. Selects any location within the 64k-byte memory segment. It is the distance above the start of the segment. Note: Each segment register is internally appended with a 0H on its right end. The segment address can begin only at a 16-byte boundary, which is called paragraph. Once the beginning address in known, an ending address is known, by adding FFFFH. The code segment register defines the start of the code segment and the instruction pointer to locate the next instruction within the code segment. This combination (CS:IP or CS:EIP) locates the next instruction executed by the microprocessor. Stack data are referenced through the stack segment at the memory location addressed by either the stack pointer (SP/ESP) or the base pointer (BP/EBP). These combinations are referred to as SS:SP (SS:ESP) or SS:BP (SS:EBP). Addressing Modes 1. Register Addressing Mode transfer a copy of a byte or word from the source register or memory location to the destination register or memory location. EX. Given: AX=3367; BX=2423 a. MOV AL, BL b. MOV AX, BX 2. Immediate Addressing Mode transfers the source immediate byte or word of data into the destination register or memory location. EX. Given: AX=3367 a. MOV AL, 34H b. MOV AX, 3456H 3. Direct Addressing Mode moves a byte or a word between a memory location and a register. The instruction set does not support a memory-to-memory transfer, except for the MOVS instruction. EX. Given: DS=1000; MAPUA=1023; AL=CA a. MOV AL, [500] b. MOV CL, MAPUA c. MOV [0500], AL 4. Register Indirect Addressing Mode transfers a byte or a word between a register and a memory location addressed by an index or base register. The index and base registers are BP, BX, DI and SI. EX. Given: DS=1000; BX=55; DI=36; DH=FE a. MOV AX, [BX] b. MOV [DI], DH 5. Base-Plus-Index Addressing Mode transfers a byte or a word between a register and the memory location addressed by a base register (BP or BX) plus an index register (DI or SI). EX. Given: DS=1000; BX=55; SI=BA a. MOV CX, [BX+SI] 6. Register Relative Addressing Mode moves a byte or a word between a register and the memory location addressed by an index or base register plus a displacement. EX. Given: DS=1000; BX=55 a. MOV DX, [BX+500] 7. Base-Relative-Plus Index Addressing Mode transfers a byte or a word between a register and the memory location addressed by a base and an index register plus a displacement. EX. Given: DS=1000; BX=55; SI=BA a. MOV AX, [BX+SI+500] PROTECTED MODE Allows access to data and programs located above the first 1Mbyte of memory as well as within the first 1Mbyte of memory. Segment address is no longer present in this mode. In place of the segment address, the segment register contains a selector that selects a descriptor from a descriptor table. The descriptor describes the memory segment location, length and access rights. Most function in the real mode will function without change in the protected mode. The difference between modes is in the way that the segment register is interpreted by the microprocessor to access the memory segment. Global Descriptor Contains segment definitions that apply to all programs. Other term is system descriptor. Local Descriptor Usually unique to an application. Other term is application program. Each table contains 8192 descriptors. The base address portion of the descriptor indicates the starting location of the memory segment. The segment limit contains the last offset address found in a segment. There is another feature found in the 80386 through the Pentium II descriptor that is not found in the 80286 descriptor: the G bit or granularity bit. 7 0000 0000 0000 0000 6 7 Base (B31-B24) G D 0 A Limit 6 V (L19-L16) 5 Access Rights Base (B23-B16) 4 5 Access Rights Base (B23-B16) 4 3 Base (B15-B0) 2 3 Base (B15-B0) 2 1 Limit (L15-L0) 0 1 Limit (L15-L0) 0 80286 80386/80486/Pentium/PentiumPro/Pentium II FIGURE 1 FIGURE 2 AV bit 1 segment is available 0 segment is not available D bit 0 instructions are 16-bit compatible with the 8086-80286 1 instructions are 32-bit G bit – Granularity 0 the limit specifies the segment limit of 00000H to FFFFFH 1 the value of the limit is multiplied by 4K bytes (appended with XXXH) 00000 FF 0L 00 1L 00 2B 00 3B 10 4B 92 5ARB 00 6GD0AV/L 00 7B FFFF FIGURE 3 (Sample Descriptor) TI bit 0 selects the global descriptor table 1 selects the local descriptor table RPL –Requested Privilege Level 00 highest 11 lowest 15 3 2 1 0 SELECTOR TI RPL RPL – Requested Privilege Level 00 is the highest and 11 is the lowest TI = 0 Global Descriptor Table TI = 1 Local Descriptor Table Selects one descriptor from 8192 descriptors in either the global or the local descriptor table FIGURE 4 Access Rights Byte Controls access to the protected mode memory segment Describes how the segment functions in the system Allows complete control over the segment P DPL S E ED R/ A /C W A = 0 Segment not accessed A = 1 Segment has been accessed E = 0 Descriptor describes a Data Segment ED = 0 Segment expands upward (DS) ED = 1 Segment expands downward (SS) W = 0 Data may not be written W = 1 Data may be written E = 1 Descriptor describes a Code Segment C = 0 Ignore descriptor privilege level C = 1 Abide by privilege level R = 0 Code Segment may not be read R = 1 Code Segment may be read S = 0 System Descriptor S = 1 Code or Data Segment Descriptor DPLP = 0 =Descriptor Sets the Descriptor is undefined Privilege Level FIGURE 5 P = 1 Segment contains a Valid Base and Limit PROGRAM MEMORY ADDRESSING 1. DIRECT PROGRAM MEMORY ADDRESSING Intersegment Jump – is a jump to any memory location within the entire memory system. Direct Jump is often called a far jump. Label – refers to the location that is called or jumped to instead of the actual numeric address EX. JMP [10000H] CS:IP 2. RELATIVE PROGRAM MEMORY ADDRESSING Relative – relative to the instruction pointer Intrasegment Jump – a jump anywhere within the current code segment Short Jump – contain an 8-bit displacement Near Jump – contain a 16-bit displacement EX. JMP [02] short JMP [1122] near 3. INDIRECT PROGRAM MEMORY ADDRESSING Indirect Jump – if a relative register holds the address Indirect-indirect or Double-Indirect Jump – if the register is considered to be relative EX. JMP BX axcxdxsidi JMP [BX] 4. STACK PROGRAM MEMORY ADDRESSING Stack Segment and Stack Pointer - maintains the stack memory Whenever a word of data is pushed onto the stack, the higher-order-8-bits are placed in the location addressed by SP-1. The low-order-8-bits are placed in the location addressed by SP-2. SP is decremented by 2 so that the next word of data is stored in the next available stack memory location. Whenever data are popped from the stack, the low-order-8-bits are removed from the location addressed by SP. The high-order-8-bits are removed from the location addressed by Sp+1. The Sp register is then incremented by 2. EX. PUSH BX POP CX QUESTIONS: REAL MODE A. In the real mode, show the starting and ending address of the segment located by the following segment register values: SEGMENT ADDRESS STARTING ADDRESS ENDING ADDRESS 1. 1234H 2. 3456H 3. ABCDH B. Find the memory address of the next instruction executed by the microprocessor, when operated in the real mode, for the following CS:IP and 80286 register combinations: 1. CS=EADEH & IP=7325H 2. DS=1111H & AX=23H 3. SS=DEEEH& BP=657H PROTECTED MODE 1. For an 80286 descriptor that contains a base address A00000H and a limit of 1000H, what starting and ending locations are addressed by this descriptor? 2. For an 80486 descriptor that contains a base address of 01000000H, a limit of 0FFFFH, and G = 0, what starting and ending locations are addressed by this descriptor? 3. For a Pentium II descriptor that contains a base address of 00280000H, a limit of 00010H, and G = 1, what starting and ending locations are addressed by this descriptor? 4. If DS = 0103H is a protected mode system, the requested privilege level is? 5. If DS = 0105 is a protected mode system, which entry, table and requested privilege level are selected? 6. Code a descriptor that describes a memory segment that begins at location 210000H and ends at location 21001FH. This memory segment is a code segment that can be read. The descriptor is for an 80286 microprocessor. 7. Code a descriptor that describes a memory segment that begins at location 03000000H and ends at location 05FFFFFFH.
Recommended publications
  • The Pentium Processor
    Chapter 7 The Pentium Processor 7–1 The main purpose of registers is to provide a scratch pad so that the processor can keep data on a temporary basis. For example, the processor may keep the procedure return address, stack pointer, instruction pointer, and so on. Registers are also used to keep the data handy so that it can avoid costly memory accesses. Keeping frequently accessed data in registers is a common compiler optimization technique. 7–2 Pentium supports the following three address spaces: 1. Linear address space 2. Physical address space 3. I/O address space (from discussion in Section 1.7) 7–3 In segmented memory organization, memory is partitioned into segments, where each segment is a small part of the memory. In the real mode, each segment of memory is a linear contiguous sequence of up to 64 KB. In the protected mode, it can be up to 4 GB. Pentium supports segmentation largely to provide backward compatibility to 8086. Note that 8086 is a 16-bit processor with 20 address lines. This mismatch between the processor’s 16-bit registers and 20-bit addresses is solved by using the segmented memory architecture. This segmented architecture has been carried over to Pentium. However, in the protected mode, it is possible to consider the entire memory as a single segment; thus, segmentation is completely turned off. 7–4 In the real mode, a segment is limited to 64 KB due to the fact that 16 bits are used to indicate the offset value into a segment. This magic number 16 is due to the 16-bit registers used 8086 processor.
    [Show full text]
  • Xv6 Booting: Transitioning from 16 to 32 Bit Mode
    238P Operating Systems, Fall 2018 xv6 Boot Recap: Transitioning from 16 bit mode to 32 bit mode 3 November 2018 Aftab Hussain University of California, Irvine BIOS xv6 Boot loader what it does Sets up the hardware. Transfers control to the Boot Loader. BIOS xv6 Boot loader what it does Sets up the hardware. Transfers control to the Boot Loader. how it transfers control to the Boot Loader Boot loader is loaded from the 1st 512-byte sector of the boot disk. This 512-byte sector is known as the boot sector. Boot loader is loaded at 0x7c00. Sets processor’s ip register to 0x7c00. BIOS xv6 Boot loader 2 source source files bootasm.S - 16 and 32 bit assembly code. bootmain.c - C code. BIOS xv6 Boot loader 2 source source files bootasm.S - 16 and 32 bit assembly code. bootmain.c - C code. executing bootasm.S 1. Disable interrupts using cli instruction. (Code). > Done in case BIOS has initialized any of its interrupt handlers while setting up the hardware. Also, BIOS is not running anymore, so better to disable them. > Clear segment registers. Use xor for %ax, and copy it to the rest (Code). 2. Switch from real mode to protected mode. (References: a, b). > Note the difference between processor modes and kernel privilege modes > We do the above switch to increase the size of the memory we can address. BIOS xv6 Boot loader 2 source source file executing bootasm.S m. Let’s 2. Switch from real mode to protected mode. expand on this a little bit Addressing in Real Mode In real mode, the processor sends 20-bit addresses to the memory.
    [Show full text]
  • X86 Memory Protection and Translation
    2/5/20 COMP 790: OS Implementation COMP 790: OS Implementation Logical Diagram Binary Memory x86 Memory Protection and Threads Formats Allocators Translation User System Calls Kernel Don Porter RCU File System Networking Sync Memory Device CPU Today’s Management Drivers Scheduler Lecture Hardware Interrupts Disk Net Consistency 1 Today’s Lecture: Focus on Hardware ABI 2 1 2 COMP 790: OS Implementation COMP 790: OS Implementation Lecture Goal Undergrad Review • Understand the hardware tools available on a • What is: modern x86 processor for manipulating and – Virtual memory? protecting memory – Segmentation? • Lab 2: You will program this hardware – Paging? • Apologies: Material can be a bit dry, but important – Plus, slides will be good reference • But, cool tech tricks: – How does thread-local storage (TLS) work? – An actual (and tough) Microsoft interview question 3 4 3 4 COMP 790: OS Implementation COMP 790: OS Implementation Memory Mapping Two System Goals 1) Provide an abstraction of contiguous, isolated virtual Process 1 Process 2 memory to a program Virtual Memory Virtual Memory 2) Prevent illegal operations // Program expects (*x) – Prevent access to other application or OS memory 0x1000 Only one physical 0x1000 address 0x1000!! // to always be at – Detect failures early (e.g., segfault on address 0) // address 0x1000 – More recently, prevent exploits that try to execute int *x = 0x1000; program data 0x1000 Physical Memory 5 6 5 6 1 2/5/20 COMP 790: OS Implementation COMP 790: OS Implementation Outline x86 Processor Modes • x86
    [Show full text]
  • Microprocessor Architecture
    MICROPROCESSOR ARCHITECTURE UOP S.E.COMP (SEM-I) OPERATING IN REAL MODE Prof.P.C.Patil Department of Computer Engg Matoshri College of Engg.Nasik [email protected]. Introduction 2 Introduction . The 80386 microprocessor can operate basically in either Real Mode or Protected Mode. When 80386 is reset or powered up it is initialized in Real Mode. The 80386 maintains the compatibility of the object code with 8086 and 80286 running in real mode. In this mode, the 80386 supports same architecture as the 8086, but it can access the 32-bit register set of 80386DX. In real mode, it is also possible to use addressing modes with the 32-bit override instruction prefixes. 3 Real Mode Programming Model 4 Real Mode Programming Model . The programming model makes it easier to understand the microprocessor in a programming environment. The real mode programming model gives the programming environment for 80386DX in real mode. It shows only those parts of the microprocessor which the programmer can use such as various registers within the microprocessor. 5 6 Real Mode Programming Model . In the diagram, only the shaded portion is a part of real mode. It consists of eight 16-bit registers (IP, CS, DS, SS, ES, FS, GS and Flag register) and eight 32-bit registers (EAX, EBX, ECX, EDX, ESP, EBP, ESI, EDI). In Real mode 80386DX can access the Protection Enable (PE) bit from CR0 which is used to enter into the protected mode. 7 Real Mode Programming Model . 80386DX in real mode is a 8086 with extended registers and two additional data segment registers such as FS and GS.
    [Show full text]
  • Virtual Memory in X86
    Fall 2017 :: CSE 306 Virtual Memory in x86 Nima Honarmand Fall 2017 :: CSE 306 x86 Processor Modes • Real mode – walks and talks like a really old x86 chip • State at boot • 20-bit address space, direct physical memory access • 1 MB of usable memory • No paging • No user mode; processor has only one protection level • Protected mode – Standard 32-bit x86 mode • Combination of segmentation and paging • Privilege levels (separate user and kernel) • 32-bit virtual address • 32-bit physical address • 36-bit if Physical Address Extension (PAE) feature enabled Fall 2017 :: CSE 306 x86 Processor Modes • Long mode – 64-bit mode (aka amd64, x86_64, etc.) • Very similar to 32-bit mode (protected mode), but bigger address space • 48-bit virtual address space • 52-bit physical address space • Restricted segmentation use • Even more obscure modes we won’t discuss today xv6 uses protected mode w/o PAE (i.e., 32-bit virtual and physical addresses) Fall 2017 :: CSE 306 Virt. & Phys. Addr. Spaces in x86 Processor • Both RAM hand hardware devices (disk, Core NIC, etc.) connected to system bus • Mapped to different parts of the physical Virtual Addr address space by the BIOS MMU Data • You can talk to a device by performing Physical Addr read/write operations on its physical addresses Cache • Devices are free to interpret reads/writes in any way they want (driver knows) System Interconnect (Bus) : all addrs virtual DRAM Network … Disk (Memory) Card : all addrs physical Fall 2017 :: CSE 306 Virt-to-Phys Translation in x86 0xdeadbeef Segmentation 0x0eadbeef Paging 0x6eadbeef Virtual Address Linear Address Physical Address Protected/Long mode only • Segmentation cannot be disabled! • But can be made a no-op (a.k.a.
    [Show full text]
  • X86 Memory Protection and Translation
    x86 Memory Protection and Translation Don Porter CSE 506 Lecture Goal ò Understand the hardware tools available on a modern x86 processor for manipulating and protecting memory ò Lab 2: You will program this hardware ò Apologies: Material can be a bit dry, but important ò Plus, slides will be good reference ò But, cool tech tricks: ò How does thread-local storage (TLS) work? ò An actual (and tough) Microsoft interview question Undergrad Review ò What is: ò Virtual memory? ò Segmentation? ò Paging? Two System Goals 1) Provide an abstraction of contiguous, isolated virtual memory to a program 2) Prevent illegal operations ò Prevent access to other application or OS memory ò Detect failures early (e.g., segfault on address 0) ò More recently, prevent exploits that try to execute program data Outline ò x86 processor modes ò x86 segmentation ò x86 page tables ò Software vs. Hardware mechanisms ò Advanced Features ò Interesting applications/problems x86 Processor Modes ò Real mode – walks and talks like a really old x86 chip ò State at boot ò 20-bit address space, direct physical memory access ò Segmentation available (no paging) ò Protected mode – Standard 32-bit x86 mode ò Segmentation and paging ò Privilege levels (separate user and kernel) x86 Processor Modes ò Long mode – 64-bit mode (aka amd64, x86_64, etc.) ò Very similar to 32-bit mode (protected mode), but bigger ò Restrict segmentation use ò Garbage collect deprecated instructions ò Chips can still run in protected mode with old instructions Translation Overview 0xdeadbeef Segmentation 0x0eadbeef Paging 0x6eadbeef Virtual Address Linear Address Physical Address Protected/Long mode only ò Segmentation cannot be disabled! ò But can be a no-op (aka flat mode) x86 Segmentation ò A segment has: ò Base address (linear address) ò Length ò Type (code, data, etc).
    [Show full text]
  • Virtual-To-Emulation (V2E): Real-Mode Support
    Virtual-To-Emulation (V2E): Real-Mode Support September 2006 Leendert van Doorn, IBM Research Khoa Huynh, IBM Linux Technology Center IBM Confidential 1 Agenda • Goals and References • Real-mode support with V2E • Current Status • Possible Future Work IBM Confidential 2 Project Goals • Goals: – Use the concept of “demand emulation” to provide real-mode support for HVM (unmodified) guests • Switch to a full instruction emulator (running in domain 0 inside qemu-dm) for real-mode support • Switch back to HVM guest when in protect mode – A similar concept of “demand emulation” was used for tracking tainted code as described in a Eurosys 2006 paper • Practical Taint-Based Protection using Demand Emulation – Authors: Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, and Steven Hand – This work replaces the existing VMXASSIST code in the hypervisor IBM Confidential 3 V2E Overview • Adding QEMU instruction emulation code back into QEMU device model (qemu-dm) • Communication between Xen hypervisor and qemu-dm – Transfer HVM context between Xen hypervisor and instruction emulator in qemu-dm • Criteria for switching between Xen hypervisor and qemu-dm IBM Confidential 4 V2E: Real-Mode Support Instruction Emulator App App -Full QEMU emulator … Device Model CR0.PE=0 -Evtchn interface (VMCALL) Unmodified -I/O device model Guest OS -Call Emulator for EMULATE reqs Evtchn (Shared Domain 0 I/O page) HVM Guest Hypervisor -Invoked when HVM guest enters real-mode (CR0.PE = 0) -Generate EMULATE req and send it to qemu-dm (via evtchn) -Block HVM guest -Restart HVM guest following return from qemu-dm IBM Confidential 5 QEMU Instruction Emulator • Merge code in ioemu/target-i386 into ioemu/target- i386-dm – Most of the merged code is for handling processor state and instruction emulator initialization (e.g.
    [Show full text]
  • Programming with the Intel Architecture in the Flat Memory Model
    Author: Steve Gorman Title: Programming with the Intel architecture in the flat memory model Abstract: As the Intel architecture moves off the desktop into a variety of other computing applications, developers will need to design their systems to take full advantage of the architecture’s performance and extended addressing. Intel architecture’s flat memory model provides for the fastest code execution and simplest system configuration. This paper will discuss: · How to initialize the Intel386Ô and Intel486Ô processors to run in protected mode using the flat memory model. · Issues, benefits and drawbacks associated with using the flat memory model. · Tools available for programming in the flat memory model. The flat memory model is Intel architecture’s answer to “No more segmentation.” This paper will cover how to initialize a system as well as the advantages, and tools available for running in the flat memory model. The paper will also compare flat memory model performance to real-mode and segmented protected mode operation. What is Flat Memory Model When running in the flat memory model the system designer essentially “Turns-Off” the segmentation feature of the 80386 architecture, by loading the segment registers with selectors for descriptors that have a base addresses of 0, privilege level set to 0 (full access rights), and by setting the limits to allow access the entire 32-bit address space. Once this is done there is no longer a need to change the segment registers. The 32-bit offsets used by the 80386 instructions, in protected mode, are sufficient to access the entire linear address space.
    [Show full text]
  • X86 Assembly Language: AT&T and Intel
    x86_16 real mode (or at least enough for cos318 project 1) Overview Preliminary information - How to find help The toolchain The machine If you only remember one thing: gcc -S the -S (capital S) flag causes gcc to ouput assembly. Preliminary Information Assembly can be hard Development strategies conquer risk: Write small test cases. Write functions, test each separately. Print diagnostics frequently. Think defensively! and the interweb is helpful too. The Interwebs as a resource. The internet offers much information that seems confusing or contradictory. How do you sort out information "in the wild?" Syntax There are (at least) two different syntaxes for x86 assembly language: AT&T and Intel. AT&T: opcodes have a suffix to denote data type, use sigils, and place the destination operand on the right. Intel: operands use a keyword to denote data type, no sigils, destination operand is leftmost. Example: AT&T vs Intel push %bp push bp mov %sp,%bp mov bp,sp sub $0x10,%sp sub sp,0x10 movw mov si,WORD 0x200b(%bx),%si PTR [bx+0x200b] mov $0x4006,%di mov di,0x4006 mov $0x0,%ax mov ax,0x0 call printf call printf leaveq leave retq ret In this class, use AT&T! Versions of the architecture x86 won't die. All backwards compatible. 8086 -> 16bit, Real 80386 / ia32 -> 32bit, Protected x86_64 -> 64bit, Protected If you find an example: For which architecture was it written? The Register Test If you see "%rax", then 64-bit code; else If you see "%eax", then 32-bit code; else You are looking at 16-bit code.
    [Show full text]
  • Intel X86 Assembly Language & Microarchitecture
    Intel x86 Assembly Language & Microarchitecture #x86 Table of Contents About 1 Chapter 1: Getting started with Intel x86 Assembly Language & Microarchitecture 2 Remarks 2 Examples 2 x86 Assembly Language 2 x86 Linux Hello World Example 3 Chapter 2: Assemblers 6 Examples 6 Microsoft Assembler - MASM 6 Intel Assembler 6 AT&T assembler - as 7 Borland's Turbo Assembler - TASM 7 GNU assembler - gas 7 Netwide Assembler - NASM 8 Yet Another Assembler - YASM 9 Chapter 3: Calling Conventions 10 Remarks 10 Resources 10 Examples 10 32-bit cdecl 10 Parameters 10 Return Value 11 Saved and Clobbered Registers 11 64-bit System V 11 Parameters 11 Return Value 11 Saved and Clobbered Registers 11 32-bit stdcall 12 Parameters 12 Return Value 12 Saved and Clobbered Registers 12 32-bit, cdecl — Dealing with Integers 12 As parameters (8, 16, 32 bits) 12 As parameters (64 bits) 12 As return value 13 32-bit, cdecl — Dealing with Floating Point 14 As parameters (float, double) 14 As parameters (long double) 14 As return value 15 64-bit Windows 15 Parameters 15 Return Value 16 Saved and Clobbered Registers 16 Stack alignment 16 32-bit, cdecl — Dealing with Structs 16 Padding 16 As parameters (pass by reference) 17 As parameters (pass by value) 17 As return value 17 Chapter 4: Control Flow 19 Examples 19 Unconditional jumps 19 Relative near jumps 19 Absolute indirect near jumps 19 Absolute far jumps 19 Absolute indirect far jumps 20 Missing jumps 20 Testing conditions 20 Flags 21 Non-destructive tests 21 Signed and unsigned tests 22 Conditional jumps 22 Synonyms and terminology 22 Equality 22 Greater than 23 Less than 24 Specific flags 24 One more conditional jump (extra one) 25 Test arithmetic relations 25 Unsigned integers 25 Signed integers 26 a_label 26 Synonyms 27 Signed unsigned companion codes 27 Chapter 5: Converting decimal strings to integers 28 Remarks 28 Examples 28 IA-32 assembly, GAS, cdecl calling convention 28 MS-DOS, TASM/MASM function to read a 16-bit unsigned integer 29 Read a 16-bit unsigned integer from input.
    [Show full text]
  • Hardware & Booting
    PC Hardware & Booting Chester Rebeiro IIT Madras Outline • Memory and Device Addresses • PC Organization • x86 Evolution • Powering up • Booting xv6 • Multiprocessor booting 2 CPUs Processor i386 3 Everything has an address 0x3c0:0x3cf 0x60:0x6f Processor i386 0x1f0:0x1f7 0x0 : 0x200000 0x60:0x6f 4 Address Types • Memory Addresses • IO Addresses • Memory Mapped IO Addresses 5 Address Types : (Memory Addresses) • Range : 0 to (RAM size or 232-1) • Where main memory is mapped – Used to store data for code, heap, stack, OS, etc. • Accessed by load/store instructions Memory Map 6 Low and Extended Memory (Legacy Issues) • Why study it? – Backward compatibility • 8088 has 20 address lines; can address 220 bytes (1MB) • Memory Ranges – 0 to 640KB used by IBM PC MSDOS • Other DOS versions have a different memory limit – 640 KB to 1MB used by video buffers, expansion ROMS, BIOS ROMs – 1 MB onwards called extended memory • Modern processors have more usable memory – OSes like Linux and x86 simply ignore the first 1MB and load kernel in extended memory 7 Address Types : (IO Ports) • Range : 0 to 216-1 • Used to access devices • Uses a different bus compared to RAM memory access – Completely isolated from memory • Accessed by in/out instructions inb $0x64, %al outb %al, $0x64 ref : http://bochs.sourceforge.net/techspec/PORTS.LST 8 Memory Mapped I/O • Why? – More space • Devices and RAM share the same address space • Instructions used to access RAM can also be used to access devices. – Eg load/store Memory Map 9 Who decides the address ranges? • Standards / Legacy – Such as the IBM PC standard – Fixed for all PCs.
    [Show full text]
  • CIS 3207 - Operating Systems CPU Mode
    CIS 3207 - Operating Systems CPU Mode Professor Qiang Zeng Spring 2018 CPU Modes • Two common modes – Kernel mode • The CPU has to be in this mode to execute the kernel code – User mode • The CPU has to be in this mode to execute the user code CIS 3207 – Operating Systems 2 Important questions • How are CPU modes implemented? • Why are CPU modes needed? • Difference between Kernel mode and User mode • How are system calls implemented? • Advanced topic: Virtualization CIS 3207 – Operating Systems 3 How CPU Modes are implemented • Implemented through protection rings – A modern CPU typical provides different protection rings, which represent different privilege levels • A ring with a lower number has higher privileges – Introduced by Multics in 60’s – E.g., an X86 CPU usually provides four rings, and a Linux/Unix/Windows OS uses Ring 0 for the kernel mode and Ring 3 for the user mode CIS 3207 – Operating Systems 4 Why are Protection Rings needed? • Fault isolation: a fault (e.g., divided by 0) in the code running in a less-privileged ring can be captured and handled by code in a more-privileged ring • Privileged instructions: certain instructions can only be issued in a privileged ring; thus an OS can implement resource management and isolation here • Privileged memory space: certain memory can only be accessed in a privileged ring All these are demonstrated in the difference between the kernel mode and the user mode CIS 3207 – Operating Systems 5 Kernel Mode vs. User Mode? • A fault in the user space (e.g., divided by zero, invalid access,
    [Show full text]