使用skyeye运行《Linux设备驱动开发详解》的实例(二)

编译和安装

选中三个模块:

─── driver examples in 'Explain Linux Device Drivers in detail' ─────────────────────────────┐
  │  Arrow keys navigate the menu.  <Enter> selects submenus ---&gt;.  Highlighted letters are hotkeys.  Pressing <Y>        │ 
  │  includes, <N> excludes, <M> modularizes features.  Press <Esc><Esc> to exit, <?> for Help, </> for Search.  Legend:  │ 
  │  [*] built-in  [ ] excluded  <M> module  < > module capable                                                           │ 
  │                                                                                                                       │ 
  │ ┌───────────────────────────────────────────────────────────┐ │ 
  │ │                      --- driver examples in 'Explain Linux Device Drivers in detail'                              │ │ 
  │ │                      <M>   Hello World                                                                            │ │ 
  │ │                      <M>   globalmem                                                                              │ │ 
  │ │                      <M>   globalfifo                                                                             │ │ 
  │ │                                                                                                                   │ │

在linux-2.6.31下运行:

bhsong@bhsong-laptop:~/develop/svn/ldd6410/linux-2.6.31$ make modules

以loopback方式mount根文件系统,譬如对于skyeye的initrd.img运行如下命令:

...skyeye/training-simulation$ sudo mount -o loop initrd.img initrd

将所有模块安装到根文件系统:

make INSTALL_MOD_PATH=/home/bhsong/develop/training/skyeye/training-simulation/initrd modules_install

请根据你的路径,正确的设置INSTALL_MOD_PATH。安装之后,所有模块以及模块间依赖关系进入根文件系统:

initrd/lib/modules$ tree
.
`-- 2.6.31.6-svn79
    |-- build -&gt; /home/bhsong/develop/svn/ldd6410/linux-2.6.31
    |-- kernel
    |   |-- drivers
    |   |   |-- cdrom
    |   |   |   `-- cdrom.ko
    |   |   |-- char
    |   |   |   `-- driver_examples
    |   |   |       |-- globalfifo.ko
    |   |   |       |-- globalmem.ko
    |   |   |       `-- hello.ko
    |   |   |-- input
    |   |   |   `-- gameport
    |   |   |       `-- gameport.ko
    |   |   `-- scsi
    |   |       |-- ch.ko
    |   |       |-- scsi_wait_scan.ko
    |   |       |-- sr_mod.ko
    |   |       `-- st.ko
    |   |-- lib
    |   |   |-- ts_bm.ko
    |   |   |-- ts_fsm.ko
    |   |   `-- ts_kmp.ko
    |   `-- net
    |       |-- ipv4
    |       |   |-- netfilter
    |       |   |   |-- arp_tables.ko
    |       |   |   |-- arpt_mangle.ko
    |       |   |   |-- arptable_filter.ko
    |       |   |   |-- ip_queue.ko
    |       |   |   |-- ip_tables.ko
    |       |   |   |-- ipt_ECN.ko
    |       |   |   |-- ipt_LOG.ko
    |       |   |   |-- ipt_MASQUERADE.ko
    |       |   |   |-- ipt_NETMAP.ko
    |       |   |   |-- ipt_REDIRECT.ko
    |       |   |   |-- ipt_REJECT.ko
    |       |   |   |-- ipt_ULOG.ko
    |       |   |   |-- ipt_addrtype.ko
    |       |   |   |-- ipt_ah.ko
    |       |   |   |-- ipt_ecn.ko
    |       |   |   |-- iptable_filter.ko
    |       |   |   |-- iptable_mangle.ko
    |       |   |   |-- iptable_nat.ko
    |       |   |   |-- iptable_raw.ko
    |       |   |   |-- nf_conntrack_ipv4.ko
    |       |   |   |-- nf_defrag_ipv4.ko
    |       |   |   |-- nf_nat.ko
    |       |   |   |-- nf_nat_amanda.ko
    |       |   |   |-- nf_nat_ftp.ko
    |       |   |   |-- nf_nat_h323.ko
    |       |   |   |-- nf_nat_irc.ko
    |       |   |   |-- nf_nat_pptp.ko
    |       |   |   |-- nf_nat_proto_gre.ko
    |       |   |   |-- nf_nat_proto_udplite.ko
    |       |   |   |-- nf_nat_sip.ko
    |       |   |   |-- nf_nat_snmp_basic.ko
    |       |   |   `-- nf_nat_tftp.ko
    |       |   |-- tcp_bic.ko
    |       |   |-- tcp_htcp.ko
    |       |   `-- tcp_westwood.ko
    |       `-- netfilter
    |           |-- ipvs
    |           |   `-- ip_vs.ko
    |           |-- nf_conntrack.ko
    |           |-- nf_conntrack_amanda.ko
    |           |-- nf_conntrack_ftp.ko
    |           |-- nf_conntrack_h323.ko
    |           |-- nf_conntrack_irc.ko
    |           |-- nf_conntrack_netbios_ns.ko
    |           |-- nf_conntrack_netlink.ko
    |           |-- nf_conntrack_pptp.ko
    |           |-- nf_conntrack_proto_gre.ko
    |           |-- nf_conntrack_proto_udplite.ko
    |           |-- nf_conntrack_sip.ko
    |           |-- nf_conntrack_tftp.ko
    |           |-- nfnetlink.ko
    |           |-- nfnetlink_log.ko
    |           |-- nfnetlink_queue.ko
    |           |-- x_tables.ko
    |           |-- xt_CLASSIFY.ko
    |           |-- xt_CONNMARK.ko
    |           |-- xt_HL.ko
    |           |-- xt_MARK.ko
    |           |-- xt_NFLOG.ko
    |           |-- xt_NFQUEUE.ko
    |           |-- xt_RATEEST.ko
    |           |-- xt_TCPMSS.ko
    |           |-- xt_cluster.ko
    |           |-- xt_comment.ko
    |           |-- xt_connbytes.ko
    |           |-- xt_connlimit.ko
    |           |-- xt_connmark.ko
    |           |-- xt_conntrack.ko
    |           |-- xt_dccp.ko
    |           |-- xt_dscp.ko
    |           |-- xt_esp.ko
    |           |-- xt_hashlimit.ko
    |           |-- xt_helper.ko
    |           |-- xt_hl.ko
    |           |-- xt_iprange.ko
    |           |-- xt_length.ko
    |           |-- xt_limit.ko
    |           |-- xt_mac.ko
    |           |-- xt_mark.ko
    |           |-- xt_multiport.ko
    |           |-- xt_owner.ko
    |           |-- xt_pkttype.ko
    |           |-- xt_policy.ko
    |           |-- xt_quota.ko
    |           |-- xt_rateest.ko
    |           |-- xt_realm.ko
    |           |-- xt_recent.ko
    |           |-- xt_state.ko
    |           |-- xt_statistic.ko
    |           |-- xt_string.ko
    |           |-- xt_tcpmss.ko
    |           |-- xt_tcpudp.ko
    |           |-- xt_time.ko
    |           `-- xt_u32.ko
    |-- modules.alias
    |-- modules.ccwmap
    |-- modules.dep
    |-- modules.ieee1394map
    |-- modules.inputmap
    |-- modules.isapnpmap
    |-- modules.ofmap
    |-- modules.order
    |-- modules.pcimap
    |-- modules.seriomap
    |-- modules.symbols
    |-- modules.usbmap
    `-- source -&gt; /home/bhsong/develop/svn/ldd6410/linux-2.6.31

17 directories, 116 files 运行

启动Linux,对于skyeye为:

sudo skyeye -e vmlinux -c skyeye-standalone.conf
...
Welcome to
     _      _____      __   __    _      _
    / \    /  __ \    /  \_/  \  | |    |_|                
   / _ \   | |  | |  / /\   /\ \ | |     _ ____  _   _  _  _
  / /_\ \  | |__| | / /  \_/  \ \| |    | |  _ \| | | |\ \/ /
/ /___\ \ | |__\ \ | |       | || |___ | | |_| | |_| |/    \
/_/     \_\| |   \_\|_|       |_||_____||_|_| |_|\____|\_/\_/
          
ARMLinux for Lihacker LDD6410

For further information please check:
http://www.lihacker.com/
http://www.linuxdriver.cn/
For technical support, please subscribe mail list [email protected] and post there.
The url is http://groups.google.com/group/linuxdriver.
#

加载模块:

modprobe hello
modprobe globalmem  globalmem_major=250
modprobe globalfifo globalfifo_major=251

skyeye对insmod的支持有些问题,加载模块时会出现:

# modprobe hello
Unable to handle kernel paging request at virtual address bf000000
pgd = c05f0000
[bf000000] *pgd=00000000
Internal error: Oops: 807 [#1]
Modules linked in:
CPU: 0    Not tainted  (2.6.31.6-svn79 #21)
PC is at __memzero+0x24/0x80
LR is at 0x0
pc : [<c0107404>]    lr : [<00000000>]    psr: 20000013
sp : c182bf0c  ip : 00000000  fp : 00000005
r10: c2807230  r9 : c2807000  r8 : c2807388
r7 : 00000004  r6 : c2807168  r5 : 00000012  r4 : bf000000
r3 : 00000000  r2 : 00000000  r1 : 00000464  r0 : bf000000
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 0000317f  Table: c05f0000  DAC: 00000015
Process modprobe (pid: 795, stack limit = 0xc182a270)
Stack: (0xc182bf0c to 0xc182c000)
bf00:                            c005fba0 00000979 00000000 c2807518 c2807608
bf20: c28072dc c1139e60 c28078a0 00000010 000000c5 c2807388 c182a000 c2807630
bf40: 00000000 c008c178 00000171 00000000 0015ec79 00000287 00000001 00000008
bf60: 00000000 00000979 0015e2f0 00000000 0015e300 c002bf48 c182a000 00000000
bf80: 00000000 c0060878 c1c1a2c0 c1c2f3a0 00000003 00000979 0015e2f0 0015dfa8
bfa0: 00000080 c002bda0 00000979 0015e2f0 0015e300 00000979 0015e2f0 00000000
bfc0: 00000979 0015e2f0 0015dfa8 00000080 0015e2a0 0015dfbc 00000001 00000000
bfe0: bea65958 bea65948 000177f8 00009350 20000010 0015e300 ab081000 11000006
[<c0107404>] (__memzero+0x24/0x80) from [<00000000>] (0x0)
Code: e52de004 e1a0c002 e1a0e002 e2511040 (a8a0500c)
---[ end trace 1e19dcbb1e19dcba ]---
Segmentation fault

详见bug: http://sourceforge.net/tracker/?func=detail&aid=2897905&group_id=85554&atid=576533 我们使用strace去寻找死在哪个系统调用:

# strace modprobe hello
execve("/sbin/modprobe", ["modprobe", "hello"], [/* 7 vars */]) = 0
uname({sys="Linux", node="lihacker", ...}) = 0
brk(0)                                  = 0x15d000
brk(0x15dd02)                           = 0x15dd02
set_tls(0x15d4a0, 0x1573c0, 0, 0x1, 0x15d4a0) = 0
brk(0x17ed02)                           = 0x17ed02
brk(0x17f000)                           = 0x17f000
getuid32()                              = 0
chdir("/lib/modules")                   = 0
uname({sys="Linux", node="lihacker", ...}) = 0
chdir("2.6.31.6-svn79")                 = 0
open("/proc/modules", O_RDONLY)         = 3
fstat64(3, {st_mode=S_IFREG|0444, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40000000
read(3, ""..., 1024)                    = 0
close(3)                                = 0
munmap(0x40000000, 4096)                = 0
lstat64("/etc/modprobe.conf", 0xbe846880) = -1 ENOENT (No such file or directory)
lstat64("/etc/modprobe.d", 0xbe846880)  = -1 ENOENT (No such file or directory)
open("modules.dep", O_RDONLY)           = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=17141, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40001000
read(3, "/lib/modules/2.6.31.6-svn79/kerne"..., 1024) = 1024
read(3, "nel/net/netfilter/x_tables.ko\n/li"..., 1024) = 1024
read(3, "/lib/modules/2.6.31.6-svn79/kerne"..., 1024) = 1024
read(3, "/net/netfilter/xt_esp.ko: /lib/mo"..., 1024) = 1024
read(3, "ables.ko /lib/modules/2.6.31.6-sv"..., 1024) = 1024
read(3, "es/2.6.31.6-svn79/kernel/net/netf"..., 1024) = 1024
read(3, ".6-svn79/kernel/net/netfilter/nf_"..., 1024) = 1024
read(3, "b/modules/2.6.31.6-svn79/kernel/n"..., 1024) = 1024
read(3, "etfilter/nf_conntrack_ipv4.ko /li"..., 1024) = 1024
read(3, ".6.31.6-svn79/kernel/net/netfilte"..., 1024) = 1024
read(3, "defrag_ipv4.ko\n/lib/modules/2.6.3"..., 1024) = 1024
read(3, "tfilter/nf_conntrack_ipv4.ko /lib"..., 1024) = 1024
read(3, ".6-svn79/kernel/net/ipv4/netfilte"..., 1024) = 1024
read(3, "1.6-svn79/kernel/net/netfilter/x_"..., 1024) = 1024
read(3, "ib/modules/2.6.31.6-svn79/kernel/"..., 1024) = 1024
read(3, "ib/modules/2.6.31.6-svn79/kernel/"..., 1024) = 1024
read(3, "o:\n/lib/modules/2.6.31.6-svn79/ke"..., 1024) = 757
close(3)                                = 0
munmap(0x40001000, 4096)                = 0
open("/lib/modules/2.6.31.6-svn79/kernel/drivers/char/driver_examples/hello.ko", O_RDONLY) = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=2425, ...}) = 0
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\1\0(\0\1\0\0\0\0\0\0\0\0\0\0\0\210"..., 3072) = 2425
read(3, ""..., 647)                     = 0
close(3)                                = 0
init_module(0x15e300, 2425, ""Unable to handle kernel paging request at virtual address bf000000
pgd = c0620000
[bf000000] *pgd=00000000
Internal error: Oops: 807 [#1]
Modules linked in:
CPU: 0    Not tainted  (2.6.31.6-svn79 #21)
PC is at __memzero+0x24/0x80
LR is at 0x0
pc : [<c0107404>]    lr : [<00000000>]    psr: 20000013
sp : c069ff0c  ip : 00000000  fp : 00000005
r10: c2807230  r9 : c2807000  r8 : c2807388
r7 : 00000004  r6 : c2807168  r5 : 00000012  r4 : bf000000
r3 : 00000000  r2 : 00000000  r1 : 00000464  r0 : bf000000
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 0000317f  Table: c0620000  DAC: 00000015
Process modprobe (pid: 796, stack limit = 0xc069e270)
Stack: (0xc069ff0c to 0xc06a0000)
ff00:                            c005fba0 00000000 00000000 c2807518 c2807608
ff20: c28072dc c1139240 c28078a0 00000010 00000000 c2807388 00000000 c2807630
ff40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ff60: 00000000 00000979 0015e2f0 00000000 0015e300 c002bf48 c069e000 00000000
ff80: 00000000 c0060878 be846958 c002dbe0 00000000 00000979 0015e2f0 0015dfa8
ffa0: 00000080 c002bf0c 00000979 0015e2f0 0015e300 00000979 0015e2f0 00000000
ffc0: 00000979 0015e2f0 0015dfa8 00000080 0015e2a0 0015dfbc 00000001 00000000
ffe0: be846958 be846948 000177f8 00009350 20000010 0015e300 ebff1fc9 e3500000
[<c0107404>] (__memzero+0x24/0x80) from [<00000000>] (0x0)
Code: e52de004 e1a0c002 e1a0e002 e2511040 (a8a0500c)
---[ end trace 1e19dcbb1e19dcba ]---
<unfinished ...>
+++ killed by SIGSEGV +++

很明显,死在内核的linux-2.6.31/kernel/module.c的init_module()函数中,加上几个printk:

2453 SYSCALL_DEFINE3(init_module, void __user *, umod,
2454         unsigned long, len, const char __user *, uargs)
2455 {
2456     struct module *mod;
2457     int ret = 0;
2458
2459     printk("%s %d\n", __func__, __LINE__);
2460
2461     /* Must have permission */
2462     if (!capable(CAP_SYS_MODULE) || modules_disabled)
2463         return -EPERM;
2464
2465     +printk("%s %d\n", __func__, __LINE__);
2466    
2467     /* Only one module load at a time, please */
2468     if (mutex_lock_interruptible(&module_mutex) != 0)
2469         return -EINTR;
2470
2471     +printk("%s %d\n", __func__, __LINE__);
2472    
2473     /* Do all the hard work */
2474     mod = load_module(umod, len, uargs);
2475     if (IS_ERR(mod)) {
2476         mutex_unlock(&module_mutex);
2477         return PTR_ERR(mod);
2478     }
2479
2480     +printk("%s %d\n", __func__, __LINE__);
2481    

再次运行:

# modprobe hello
sys_init_module 2459
sys_init_module 2465
sys_init_module 2471
Unable to handle kernel paging request at virtual address bf000000
pgd = c05f0000
[bf000000] *pgd=00000000
Internal error: Oops: 807 [#1]
Modules linked in:

从打印信息可以看出,panic发生在load_module函数,既然"sys_init_module 2471"被打印而"sys_init_module 2480"未打印。 继续跟进load_module(),直到最后发现内核崩溃在memset(ptr, 0, mod-&gt;core_size);:

static noinline struct module *load_module(void __user *umod,
                   unsigned long len,
                   const char __user *uargs)
{
...
     ptr = module_alloc_update_bounds(mod-&gt;core_size);
...
     kmemleak_not_leak(ptr);
...
     memset(ptr, 0, mod-&gt;core_size);

一路跟踪源代码,发现ARM的Kernel会将模块的内存申请在3G-16M到3G的区域,而skyeye在内核空间处理3G以下地址的时候,会发生错误:

"Unable to handle kernel paging request at virtual address bf000000"

因此,workaround掉这个bug:

Index: arch/arm/kernel/module.c
===================================================================
--- arch/arm/kernel/module.c    (revision 87)
+++ arch/arm/kernel/module.c    (working copy)
@@ -38,7 +38,7 @@
#ifdef CONFIG_MMU
void *module_alloc(unsigned long size)
{
-       struct vm_struct *area;
+       /*struct vm_struct *area;
 
        size = PAGE_ALIGN(size);
        if (!size)
@@ -49,6 +49,9 @@
                return NULL;
 
        return __vmalloc_area(area, GFP_KERNEL, PAGE_KERNEL_EXEC);
+*/
+
+       return size == 0 ? NULL : kmalloc(size, GFP_KERNEL);
}
#else /* CONFIG_MMU */
void *module_alloc(unsigned long size)
@@ -59,7 +62,7 @@
 
void module_free(struct module *module, void *region)
{
-       vfree(region);
+       kfree(region);
}
 
int module_frob_arch_sections(Elf_Ehdr *hdr,

由于此workaround使用了kmalloc,如果内核模块很大,kmalloc申请的内存不够存放,则可以修改: include/linux/slab.h中的KMALLOC_SHIFT_HIGH宏定义。另外,此workaround成立的条件是mem=32M或小于32M。 现在我们可以自由地加载模块了,看看结果:

加载模块:
# modprobe hello
Hello World enter
# modprobe globalmem  globalmem_major=250
# modprobe globalfifo globalfifo_major=251

查看加载的模块:
# lsmod
    Not tainted
globalmem 3356 0 - Live 0xc0f66000
hello 1188 0 - Live 0xc1128000
globalfifo 4292 0 - Live 0xc182a000

查看设备:
# cat /proc/devices
Character devices:
  1 mem
  2 pty
  3 ttyp
  4 /dev/vc/0
  4 tty
  4 ttyS
  5 /dev/tty
  5 /dev/console
  5 /dev/ptmx
  7 vcs
10 misc
13 input
21 sg
29 fb
128 ptm
136 pts
204 s3c2410_serial
250 globalmem
251 globalfifo

建立结点:
# mknod /dev/globalmem c 250 0
# mknod /dev/globalfifo c 251 0
#
读写设备文件:
# echo "hello, cisco" &gt; /dev/globalmem
written 13 bytes(s) from 0
# cat /dev/globalmem
read 4096 bytes(s) from 0
hello, cisco

# cat /dev/globalfifo &
# echo "hello,Linux, I love you" &gt; /dev/globalfifo
written 24 bytes(s),current_len:24
# read 24 bytes(s),current_len:0
hello,cisco, I love you

已经做好的包位于: http://ldd6410.googlecode.com/files/ldd6410-skyeye-pack-with-module.tar.gz

你可能感兴趣的:(linux,实例,详解,设备,skyeye)