Assembly Language Programming I: Introduction

Slides:



Advertisements
Similar presentations
Assembly Language – 1.
Advertisements

ITCS 3181 Logic and Computer Systems 2015 B. Wilkinson slides3.ppt Modification date: March 16, Addressing Modes The methods used in machine instructions.
1 COMS 361 Computer Organization Title: Instructions Date: 9/28/2004 Lecture Number: 10.
The Assembly Language Level
Inline Assembly Section 1: Recitation 7. In the early days of computing, most programs were written in assembly code. –Unmanageable because No type checking,
Chapter 3 Assembly Language: Part 1. Machine language program (in hex notation) from Chapter 2.
1 Homework Reading –PAL, pp , Machine Projects –Finish mp2warmup Questions? –Start mp2 as soon as possible Labs –Continue labs with your.
1 Programming & Programming Languages Overview l Machine operations and machine language. l Example of machine language. l Different types of processor.
1 Homework Reading –Professional Assembly Language, pp –Also, study website references: “Using gas” and “gas i386 Assembly Language Guide” Machine.
Chapter 2 Software Tools and Assembly Language Syntax.
ICS312 Set 4 Program Structure. Outline for a SMALL Model Program Note the quiz at the next lecture will be to reproduce this slide.MODEL SMALL.586 ;
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Spring 2011.
Dr. José M. Reyes Álamo 1.  The 80x86 memory addressing modes provide flexible access to memory, allowing you to easily access ◦ Variables ◦ Arrays ◦
Chapter 3 Elements of Assembly Language. 3.1 Assembly Language Statements.
1 Homework Reading –Professional Assembly Language, pp –Also, study website references: “Using gas” and “gas i386 Assembly Language Guide” Machine.
Introduction: Exploiting Linux. Basic Concepts Vulnerability A flaw in a system that allows an attacker to do something the designer did not intend,
Computer Architecture and Operating Systems CS 3230 :Assembly Section Lecture 3 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Assembly Language for x86 Processors 7th Edition Chapter 13: High-Level Language Interface (c) Pearson Education, All rights reserved. You may modify.
CNIT 127: Exploit Development Ch 1: Before you begin.
X86 Programming Memory Accessing Modes, Characters, and Strings Computer Architecture.
Practical Session 8. Position Independent Code- self sufficiency of combining program Position Independent Code (PIC) program has everything it needs.
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Spring 2014.
CC410: System Programming Dr. Manal Helal – Fall 2014 – Lecture 4 - Assembler 1.
Variables Bryce Boe 2012/09/05 CS32, Summer 2012 B.
INC 161 , CPE 100 Computer Programming
Homework / Exam Return and Review Exam #1 Reading Machine Projects
The Machine Model Memory
Homework Reading Lab with your assigned section starts next week
Assembly language.
ECE 3430 – Intro to Microcomputer Systems
Lecture 6: Assembly Programs
Assembly Lab 3.
A bit of C programming Lecture 3 Uli Raich.
Programming the I/O Hardware
Computer Architecture and Assembly Language
Homework Reading Labs PAL, pp
Homework Reading Machine Projects Labs PAL, pp ,
Additional Assembly Programming Concepts
Assembler Directives Code generation flow
Homework Reading Machine Projects Labs
Chapter 3 Machine Language and Assembly Language.
Chapter 3 Machine Language and Assembly Language.
Homework In-line Assembly Code Machine Language
William Stallings Computer Organization and Architecture 8th Edition
High-Level Language Interface
Homework Reading Continue work on mp1
L7 – Assembler Directives
Assembly Language Programming V: In-line Assembly Code
BIC 10503: COMPUTER ARCHITECTURE
Programming the I/O Hardware
Lecture 6 Assembler Directives.
Chapter 7 LC-2 Assembly Language.
Assembly Language Programming II: C Compiler Calling Sequences
Discussions on HW2 Objectives
Homework Reading Machine Projects Labs PAL, pp
Lecture 8 Data structures
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Spring 2015.
CNT4704: Analysis of Computer Communication Network Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Fall 2011.
Week 2: Buffer Overflow Part 1.
Discussions on HW2 Objectives
Mastering Memory Modes
Assemblers CSCI/CMPE 3334 David Egle.
Comp Org & Assembly Lang
Chapter 11 Programming in C
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Spring 2016.
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow : Example of Using GDB to Check Stack Memory Cliff Zou Spring 2013.
Computer Architecture and Assembly Language
Computer Architecture and System Programming Laboratory
Week 5 Computers are like Old Testament gods; lots of rules and no mercy. Joseph Campbell.
Computer Architecture and System Programming Laboratory
Presentation transcript:

Assembly Language Programming I: Introduction

Homework Reading Labs Professional Assembly Language, pp 73-106 Also, study website references: Using gas: http://www.sourceware.org/binutils/docs-2.12/as.info/index.html gas i386 Assembly Language Guide http://www.cs.umb.edu/~cheungr/cs341/Instructions.pdf Labs Continue with labs in your assigned section

C versus Assembly Language C is called a “portable assembly language” Allows low level operations on bits and bytes Allows access to memory via use of pointers Integrates well with assembly language functions Advantages over assembly code Easier to read and understand source code Requires fewer lines of code for same function Does not require knowledge of the hardware

C versus Assembly Language Good reasons for learning assembly language It is a good way to learn how a processor works In time-critical sections of code, it is possible to improve performance with assembly language In writing a new operating system or in porting an existing system to a new machine, there are sections of code which must be written in assembly language such as the cpuid example in this lecture

Best of Both Worlds Integrating C and assembly code Convenient to let C do most of the work and integrate with assembly code where needed Make our gas routines callable from C Use C compiler conventions for function calls Preserve registers that C compiler expects saved

Instruction’s Four Field Format Instruction example: here: movb $0x20, %eax # move a number 0x20 to eax register Label: Can be referred to as a representation of the address Usual practice is to place these on a line by themselves Mnemonic to specify the instruction and size Makes it unnecessary to remember instruction code values Operand(s) on which the instruction operates (if any) Zero, one, or two operands depending on the instruction Comment contains documentation It begins with a # anywhere and goes to the end of the line It is very important to comment assembly code well!!

Assembly Framework for a Function General form for a function in assembly is: .globl _mycode .text _mycode: . . . ret .data mydata: .long 17 .end Assembler Directives

Assembler Directives Defining a label for external reference (call) .globl _mycode Defining the code section of program (ROM) .text Defining the static data section of program (RAM) .data End of the Assembly Language .end

Assembler Directives for Sections These directives designate sections where we want our assembler output placed into memory .text places the assembler output into program memory space (e.g. where PROM will be located) .data places the assembler output into a static initialized memory space (e.g. where RAM will be located) .bss allows assembler to set labels for uninitialized memory space (we won’t be using this section) .section ignore/omit this directive with our assembler In builds, ld is given addresses for the sections

Assembler Directives Defining / initializing static storage locations: label1: .long 0x12345678 # 32 bits label2: .word 0x1234 # 16 bits label3: .byte 0x12 # 8 bits

Assembler Directives Defining / initializing a string label1: .ascii “Hello World\n\0” label2: .asciz “Hello World\n” 11

Defining Constant Values Constant definitions follow C conventions: $123 # decimal constant $0x123 # hex constant $‘a’ # character constant $‘\n’ # character escape sequence With the following exception: $‘\0’ #this results in‘0’ instead of 0 # to get around problem, use $0

Symbolic Constant Names Allow use of symbols for numeric values Perform same function as C preprocessor #define Unfortunately not the same format as used in C preprocessor so can’t just include .h files to define symbols across combination of C/assembly code Format is: SYMBOL = value Example: NCASES = 8 movl $NCASES, %eax

Addressing Memory Direct addressing for memory Gas allows use of hard coded memory addresses Not recommended except for HW based addresses Examples: .text movb %al, 0x1234 movb 0x1234, %dl . . .

Addressing Memory Direct addressing for memory Gas allows use of a label for memory address Examples: .text movb %al, total movb total, %dl . . . .data total: .byte 0

Addressing Memory Indirect - like *pointer in C Defined as using a register as the address of the memory location to access in an instruction movl $0x1234, %ebp movb (%ebp), %al Memory %ebp address 0x00001234 One byte %al

Addressing Memory Indirect with Offset - like *(pointer+4) in C May also be done with a fixed offset, e.g. 4 movl $0x1234, %ebp movb 4(%ebp), %al Memory address Low Address %ebp 0x00001234 + 4 High address One byte %al

Addressing Memory Memory-memory addressing restrictions Why can’t we write instructions such as these? movl first, second # direct movl (%eax), (%ebx) # indirect Intel instruction set does not support instructions to move a value from memory to memory! Must always use a register as an intermediate location for the value being moved, e.g. movl first, %eax # direct from mem movl %eax, second # direct to mem

Integrating C and Assembly example Pick up the makefile from $pcbook Always read the makefile for a program first! The makefile in $pcbook expects a “matched pair” C driver filename is mycodec.c Assembly filename is mycode.s The make file uses macro substitutions for input: The format of the make command is: make A=mycode

Example: Function cpuid C “driver” in file cpuidc.c to execute code in cpuid.s /* cpuidc.c - C driver to test cpuid function * bob wilson - 1/15/2012 */ #include <stdio.h> extern char *cpuid(); /* our .s file is external*/ int main(int argc, char **argv) { printf("The cpu ID is: %s\n", cpuid()); return 0; }

Example: Function cpuid Assembly code for function in file cpuid.s # cpuid.s C callable function to get cpu ID value .data buffer: .asciz "Overwritten!" # overwritten later .text .globl _cpuid _cpuid: movl $0,%eax # zero to get Vendor ID cpuid # get it movl $buffer, %eax # point to string buffer movl %ebx, (%eax) # move four chars movl %edx, 4(%eax) # move four chars movl %ecx, 8(%eax) # move four chars ret # string pointer is in %eax .end

Self Modifying Code  Our assembler does not actually support cpuid instruction, so I made the code self-modifying: . . . _cpuid: movb $0x0f, cpuid1 # patch in the cpuid first byte movb $0xa2, cpuid2 # patch in the cpuid second byte movl $0,%eax # input to cpuid for ID value cpuid1: # hex for cpuid instruction here nop # 0x0f replaces 0x90 cpuid2: nop # 0xa2 replaces 0x90

Self Modifying Code  Obviously, the self modifying code I used for this demonstration would not work if: The code is physically located in PROM/ROM There is an O/S like UNIX/Linux that protects the code space from being modified (A problem that we avoid using Tutor on our SAPC’s) Try justifying this “kludge” to the maintenance programmer!!

Self Modifying Code  Here is self-modifying code in C: int main(int argc, char **args) { // array to hold the machine code bytes of the function static char function [100]; // I used static memory for the array so I could find its address in syms file // now put some machine code instructions byte by byte into the function array // must put the address of a return string in the %eax before returning // must put the machine code for an assembly ret instruction (0xc3)at the end function[0] = 0xb8; // move address of the string to %eax . . . function[5] = 0xc3; // and return // execute the function whose address is the array printf("%s\n", (* (char * (*)()) function) ()); return 0; }