C语言回调函数在CPU上的指令运行分析

C语言回调函数在CPU上的指令运行分析,第1张

1. 什么是回调函数?

其实回调函数就是一种利用函数指针进行函数调用的过程。

一般使用场景是用户使用底层API时,需要在API运行时再使用自己的函数,这时就会用到回调函数,即将自己的函数作为函数指针参数调用底层API,API运行中根据函数指针回调用户自己的函数。

比如:用户利用一个加密机制的API进行加密,但是用户想自定义加密算法,这时就可以用回调函数,把自定义加密算法封装成函数,函数指针作为参数传入API,用户调用API,API运行时再根据指针回调用户的回调函数。

2.以上是引子,很多文章都对回调函数有更清晰深刻的解读,有兴趣的可以搜索查看,本文重在进行CPU上汇编指令分析,下面以一个简单的回调函数demo为例进行运行指令的分析。

3.C语言源码如下:

 14 bool test_func(int a, int b);
 15 void test_callback(int c, bool (t_func)(int a, int b), int d);
 16 
 17 int main(void)
 18 {
 19         int aa = 1;
 20         int bb = 2;
 21         test_callback(aa, test_func, bb);
...
212 bool test_func(int a, int b){
213     return true;
214 }
215 
216 void test_callback(int c, bool (t_func)(int a, int b), int d){
217     t_func(c,d);
218 }

4. 到bochs虚拟机上单步调试运行,结果如下:

(0) [0x00000000a02c] 0010:c000a02c (unk. ctxt): mov dword ptr ss:[ebp-76], 0x00000001 ; c745b401000000	
 n
Next at t=7979555
(0) [0x00000000a033] 0010:c000a033 (unk. ctxt): mov dword ptr ss:[ebp-72], 0x00000002 ; c745b802000000	
 n
Next at t=7979556
(0) [0x00000000a03a] 0010:c000a03a (unk. ctxt): sub esp, 0x00000004       ; 83ec04		
 n
Next at t=7979557
(0) [0x00000000a03d] 0010:c000a03d (unk. ctxt): push dword ptr ss:[ebp-72] ; ff75b8		
 n
Next at t=7979558
(0) [0x00000000a040] 0010:c000a040 (unk. ctxt): lea eax, ds:[ebx-28057]   ; 8d836792ffff	
 r
eax: 0x00000000 0
ebx: 0xc0011000 -1073672192
ecx: 0xc0007004 -1073713148
edx: 0x00000020 32
esp: 0xc0006f98 -1073713256
ebp: 0xc0006ff8 -1073713160
esi: 0xc0100000 -1072693248
edi: 0x00000000 0
eip: 0xc000a040
eflags 0x00000096: id vip vif ac vm rf nt IOPL=0 of df if tf SF zf AF PF cf
 n
Next at t=7979559
(0) [0x00000000a046] 0010:c000a046 (unk. ctxt): push eax                  ; 50		
 r
eax: 0xc000a267 -1073700249
ebx: 0xc0011000 -1073672192
ecx: 0xc0007004 -1073713148
edx: 0x00000020 32
esp: 0xc0006f98 -1073713256
ebp: 0xc0006ff8 -1073713160
esi: 0xc0100000 -1072693248
edi: 0x00000000 0
eip: 0xc000a046
eflags 0x00000096: id vip vif ac vm rf nt IOPL=0 of df if tf SF zf AF PF cf
 x 0xa267
[bochs]:
0x0000a267 :	0xfb1e0ff3
 n
Next at t=7979560
(0) [0x00000000a047] 0010:c000a047 (unk. ctxt): push dword ptr ss:[ebp-76] ; ff75b4		
 n
Next at t=7979561
(0) [0x00000000a04a] 0010:c000a04a (unk. ctxt): call .+560 (0xc000a27f)   ; e830020000	
 s
Next at t=7979562
(0) [0x00000000a27f] 0010:c000a27f (unk. ctxt): nop                       ; f30f1efb
 n
Next at t=7979563
(0) [0x00000000a283] 0010:c000a283 (unk. ctxt): push ebp                  ; 55
 n
Next at t=7979564
(0) [0x00000000a284] 0010:c000a284 (unk. ctxt): mov ebp, esp              ; 89e5
 n
Next at t=7979565
(0) [0x00000000a286] 0010:c000a286 (unk. ctxt): sub esp, 0x00000008       ; 83ec08
 n
Next at t=7979566
(0) [0x00000000a289] 0010:c000a289 (unk. ctxt): call .+25 (0xc000a2a7)    ; e819000000
 n
Next at t=7979569
(0) [0x00000000a28e] 0010:c000a28e (unk. ctxt): add eax, 0x00006d72       ; 05726d0000
 n
Next at t=7979570
(0) [0x00000000a293] 0010:c000a293 (unk. ctxt): sub esp, 0x00000008       ; 83ec08	
 n
Next at t=7979571
(0) [0x00000000a296] 0010:c000a296 (unk. ctxt): push dword ptr ss:[ebp+16] ; ff7510	
 n
Next at t=7979572
(0) [0x00000000a299] 0010:c000a299 (unk. ctxt): push dword ptr ss:[ebp+8] ; ff7508
 n
Next at t=7979573
(0) [0x00000000a29c] 0010:c000a29c (unk. ctxt): mov eax, dword ptr ss:[ebp+12] ; 8b450c
 n
Next at t=7979574
(0) [0x00000000a29f] 0010:c000a29f (unk. ctxt): call eax                  ; ffd0
 r
eax: 0xc000a267 -1073700249
ebx: 0xc0011000 -1073672192
ecx: 0xc0007004 -1073713148
edx: 0x00000020 32
esp: 0xc0006f70 -1073713296
ebp: 0xc0006f88 -1073713272
esi: 0xc0100000 -1072693248
edi: 0x00000000 0
eip: 0xc000a29f
eflags 0x00000096: id vip vif ac vm rf nt IOPL=0 of df if tf SF zf AF PF cf
 n
Next at t=7979585
(0) [0x00000000a2a1] 0010:c000a2a1 (unk. ctxt): add esp, 0x00000010       ; 83c410
 r
eax: 0x00000001 1
ebx: 0xc0011000 -1073672192
ecx: 0xc0007004 -1073713148
edx: 0x00000020 32
esp: 0xc0006f70 -1073713296
ebp: 0xc0006f88 -1073713272
esi: 0xc0100000 -1072693248
edi: 0x00000000 0
eip: 0xc000a2a1
eflags 0x00000096: id vip vif ac vm rf nt IOPL=0 of df if tf SF zf AF PF cf
 n
Next at t=7979586
(0) [0x00000000a2a4] 0010:c000a2a4 (unk. ctxt): nop                       ; 90
 n
Next at t=7979587
(0) [0x00000000a2a5] 0010:c000a2a5 (unk. ctxt): leave                     ; c9
 n
Next at t=7979588
(0) [0x00000000a2a6] 0010:c000a2a6 (unk. ctxt): ret                       ; c3

5. 逐行分析汇编指令

(0) [0x00000000a02c] 0010:c000a02c (unk. ctxt): mov dword ptr ss:[ebp-76], 0x00000001 ; c745b401000000

对应C语句:int aa =1;

(0) [0x00000000a033] 0010:c000a033 (unk. ctxt): mov dword ptr ss:[ebp-72], 0x00000002 ; c745b802000000

对应C语句: int bb =2;

(0) [0x00000000a03a] 0010:c000a03a (unk. ctxt): sub esp, 0x00000004 ; 83ec04

栈指针减4,预留空间

(0) [0x00000000a03d] 0010:c000a03d (unk. ctxt): push dword ptr ss:[ebp-72] ; ff75b8

为调用test_callback传参数3,即传入bb

(0) [0x00000000a040] 0010:c000a040 (unk. ctxt): lea eax, ds:[ebx-28057] ; 8d836792ffff

将参数2(回调函数)的地址赋给eax

(0) [0x00000000a046] 0010:c000a046 (unk. ctxt): push eax ; 50

传入参数2,对照readelf看到的回调函数地址和寄存器eax值,可以看到eax的值(0xc000a267)确实就是bool test_func(int a, int b)这个函数的地址  r eax: 0xc000a267 -1073700249      450: c000a267 24 FUNC GLOBAL DEFAULT 1 test_func

(0) [0x00000000a047] 0010:c000a047 (unk. ctxt): push dword ptr ss:[ebp-76] ; ff75b4

为调用test_callback传参数1,即传入aa

(0) [0x00000000a04a] 0010:c000a04a (unk. ctxt): call .+560 (0xc000a27f) ; e830020000

调用test_callback, readelf看到: 479: c000a27f 40 FUNC GLOBAL DEFAULT 1 test_callback (0) [0x00000000a27f] 0010:c000a27f (unk. ctxt): nop ; f30f1efb

(0) [0x00000000a283] 0010:c000a283 (unk. ctxt): push ebp ; 55

(0) [0x00000000a284] 0010:c000a284 (unk. ctxt): mov ebp, esp ; 89e5

(0) [0x00000000a286] 0010:c000a286 (unk. ctxt): sub esp, 0x00000008 ; 83ec08

(0) [0x00000000a289] 0010:c000a289 (unk. ctxt): call .+25 (0xc000a2a7) ; e819000000

(0) [0x00000000a28e] 0010:c000a28e (unk. ctxt): add eax, 0x00006d72 ; 05726d0000

(0) [0x00000000a293] 0010:c000a293 (unk. ctxt): sub esp, 0x00000008 ; 83ec08

以上几句是进函数的保护和调用__x86_pc_thunk,与主题无关。

                             

以下对应test_callback中的语句t_func(c,d);, t_func是形参,参数c和d也是形参,实际运行时替换为实参,即实际等于执行test_func(aa,bb); ,后面就是简单的函数调用了,不再详述

(0) [0x00000000a296] 0010:c000a296 (unk. ctxt): push dword ptr ss:[ebp+16] ; ff7510

(0) [0x00000000a299] 0010:c000a299 (unk. ctxt): push dword ptr ss:[ebp+8] ; ff7508

(0) [0x00000000a29c] 0010:c000a29c (unk. ctxt): mov eax, dword ptr ss:[ebp+12] ; 8b450c

(0) [0x00000000a29f] 0010:c000a29f (unk. ctxt): call eax ; ffd0

欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/langs/673616.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-04-19
下一篇 2022-04-19

发表评论

登录后才能评论

评论列表(0条)

保存