Challenge!Extend the JOS kernel monitor with commands to:
- Display in a useful and easy-to-read formatall of the physical page mappings (or lack thereof)that apply to a particular range of virtual/linear addressesin the currently active address space.For example,you might enter 'showmappings 0x3000 0x5000'to display the physical page mappingsand corresponding permission bitsthat apply to the pagesat virtual addresses 0x3000, 0x4000, and 0x5000.
63 mon_showmappings(int argc, char **argv, struct Trapframe *tf)
64 {
65 uint32_t start, end;
66 pte_t *pte;
67 if (argc != 3) {
68 cprintf("Usage: showmappings [LOWER_ADDR][UPPER_ADDR]\n" );
69 cprintf("Both address should be aligned in 4kb\n");
70 return 0;
71 }
72 start = strtol(argv[1],0,0);
73 end = strtol(argv[2],0,0);
74
75 if (start != ROUNDUP(start, PGSIZE) ||
76 end != ROUNDUP(end, PGSIZE) ||
77 start > end) {
78 cprintf("Invalid address\n");
79 return 0;
80 }
81 while (start < end) {
82 pte = pgdir_walk(kern_pgdir, (void *)start, 0);
83 cprintf("0x%x ~ 0x%x: ",start, start + PGSIZE);
84 if (pte == NULL) {
85 cprintf("Not mapped!\n");
86 } else {
87 cprintf("0x%x\n",PTE_ADDR(*pte));
88 if (*pte & PTE_U)
89 cprintf("user:");
90 else
91 cprintf("kernel:");
92 if (*pte & PTE_W)
93 cprintf("read/write\n");
94 else
95 cprintf("read only\n");
96 }
97 start += PGSIZE;
98 }
99 return 0;
100 }
- Explicitly set, clear, or change the permissions of any mapping in the current address space.
64 mon_setmappings(int argc, char **argv, struct Trapframe *tf)
65 {
66 if (argc != 3) {
67 cprintf("Usage: setmappings [VIRTURAL_ADDR] [PERMISSION] \n");
68 cprintf("address should be aligned in 4kb, permission sh ould \n \
69 be a combination of u/k and r/w. \n \
70 u:user, k:kernel, r:readonly, w:read/write.\n") ;
71 return 0;
72 }
73 uint32_t va = strtol(argv[1],0,0);
74 char* perm = argv[2];
75 if (va != ROUNDUP(va, PGSIZE)) {
76 cprintf("Invalid address: 0x%x!\n",va);
77 return 0;
78 }
79 if (((perm[0] != 'k') && (perm[0] != 'u')) ||
80 ((perm[1] != 'r') && (perm[1] != 'w'))) {
81 cprintf("Invalid permission!\n");
82 return 0;
83 }
84 pte_t *pte = pgdir_walk(kern_pgdir, (void *)va, 0);
85 if (!pte) {
86 cprintf("Address not mapped!\n");
87 return 0;
88 }
89 if (perm[0] == 'u')
90 *pte = (*pte) | PTE_U;
91 else
92 *pte = (*pte) & (~PTE_U);
93 if (perm[1] == 'w')
94 *pte = (*pte) | PTE_W;
95 else
96 *pte = (*pte) & (~PTE_W);
97 cprintf("set 0x%x permission as 0x%x!\n",va, PGOFF(*pte));
98 return 0;
99 }
- Dump the contents of a range of memory given either a virtual or physical address range.Be sure the dump code behaves correctly when the range extends across page boundaries!
65 mon_dumpmem(int argc, char **argv, struct Trapframe *tf)
66 {
67 if (argc != 4) {
68 cprintf("Usage: dumpmem [ADDR_TYPE] [LOWER_ADDR] [DWORD] \n");
69 cprintf("ADDR_TYPE should be 'v' or 'p'. v: virtual addr ess, p: physical address.\n");
70 return 0;
71 }
72 uint32_t la,ua;
73 int i;
74 if (argv[1][0] == 'p') {
75 la = strtol(argv[2],0,0) + KERNBASE;
76 ua = la + strtol(argv[3],0,0)*4;
77 } else if (argv[1][0] == 'v') {
78 la = strtol(argv[2],0,0);
79 ua = la + strtol(argv[3],0,0)*4;
80 } else {
81 cprintf("Invalid ADDR TYPE!\n");
82 return 0;
83 }
84 if (la >= ua ||
85 la != ROUNDUP(la, 4) ||
86 ua != ROUNDUP(ua, 4)) {
87 cprintf("Invalid ADDR (0x%x, 0x%x)!\n",la,ua);
88 return 0;
89 }
90 for(i=0 ;la < ua; la += 4) {
91 if(!(i%4))
92 cprintf("\n0x%x: ",la);
93 cprintf("0x%x\t",*((uint32_t *)(la)));
94 i++;
95 }
96 cprintf("\n");
97 return 0;
98 }

本文介绍如何为JOS内核监控程序增加显示物理页映射、设置权限及内存转储的功能。通过新增命令,可以方便地查看虚拟地址范围内的页映射详情,包括物理地址及其权限位;设置特定地址的映射权限;以及转储指定虚拟或物理地址范围内的内存内容。
3465

被折叠的 条评论
为什么被折叠?



