Jos-lab2 (Challenges)

来源:互联网 发布:数据库镜像 数据库备份 编辑:程序博客网 时间:2024/05/17 00:50

Challenge!Extend the JOS kernel monitor with commands to:

  • Display in a useful and easy-to-read formatall of the physical page mappings (or lack thereof)that apply to a particular range of virtual/linear addressesin the currently active address space.For example,you might enter'showmappings 0x3000 0x5000'to display the physical page mappingsand corresponding permission bitsthat apply to the pagesat virtual addresses 0x3000, 0x4000, and 0x5000.

 63 mon_showmappings(int argc, char **argv, struct Trapframe *tf)
 64 {
 65         uint32_t start, end;
 66         pte_t *pte;
 67         if (argc != 3) {
 68                 cprintf("Usage: showmappings [LOWER_ADDR][UPPER_ADDR]\n"    );
 69                 cprintf("Both address should be aligned in 4kb\n");
 70                 return 0;
 71         }
 72         start = strtol(argv[1],0,0);
 73         end = strtol(argv[2],0,0);
 74
 75         if (start != ROUNDUP(start, PGSIZE) ||
 76             end != ROUNDUP(end, PGSIZE) ||
 77             start > end) {
 78                 cprintf("Invalid address\n");
 79                 return 0;
 80         }
 81         while (start < end) {
 82                 pte = pgdir_walk(kern_pgdir, (void *)start, 0);
 83                 cprintf("0x%x ~ 0x%x: ",start, start + PGSIZE);
 84                 if (pte == NULL) {
 85                         cprintf("Not mapped!\n");
 86                 } else {
 87                         cprintf("0x%x\n",PTE_ADDR(*pte));
 88                         if (*pte & PTE_U)
 89                                 cprintf("user:");
 90                         else
 91                                 cprintf("kernel:");
 92                         if (*pte & PTE_W)
 93                                 cprintf("read/write\n");
 94                         else
 95                                 cprintf("read only\n");
 96                 }
 97                 start += PGSIZE;
 98         }
 99         return 0;
100 }

  • Explicitly set, clear, or change the permissions of any mapping in the current address space.

 64 mon_setmappings(int argc, char **argv, struct Trapframe *tf)
 65 {
 66         if (argc != 3) {
 67                 cprintf("Usage: setmappings [VIRTURAL_ADDR] [PERMISSION]    \n");
 68                 cprintf("address should be aligned in 4kb, permission sh    ould \n \
 69                          be a combination of u/k and r/w. \n \
 70                          u:user, k:kernel, r:readonly, w:read/write.\n")    ;
 71                 return 0;
 72         }
 73         uint32_t va = strtol(argv[1],0,0);
 74         char* perm = argv[2];
 75         if (va != ROUNDUP(va, PGSIZE)) {
 76                 cprintf("Invalid address: 0x%x!\n",va);
 77                 return 0;
 78         }
 79         if (((perm[0] != 'k') && (perm[0] != 'u')) ||
 80                 ((perm[1] != 'r') && (perm[1] != 'w'))) {
 81                 cprintf("Invalid permission!\n");
 82                 return 0;
 83         }
 84         pte_t *pte = pgdir_walk(kern_pgdir, (void *)va, 0);
 85         if (!pte) {
 86                 cprintf("Address not mapped!\n");
 87                 return 0;
 88         }
 89         if (perm[0] == 'u')
 90                 *pte = (*pte) | PTE_U;
 91         else
 92                 *pte = (*pte) & (~PTE_U);
 93         if (perm[1] == 'w')
 94                 *pte = (*pte) | PTE_W;
 95         else
 96                 *pte = (*pte) & (~PTE_W);
 97         cprintf("set 0x%x permission as 0x%x!\n",va, PGOFF(*pte));
 98         return 0;
 99 }

  • Dump the contents of a range of memory given either a virtual or physical address range.Be sure the dump code behaves correctly when the range extends across page boundaries!

 65 mon_dumpmem(int argc, char **argv, struct Trapframe *tf)
 66 {
 67         if (argc != 4) {
 68                 cprintf("Usage: dumpmem [ADDR_TYPE] [LOWER_ADDR] [DWORD]    \n");
 69                 cprintf("ADDR_TYPE should be 'v' or 'p'. v: virtual addr    ess, p: physical address.\n");
 70                 return 0;
 71         }
 72         uint32_t la,ua;
 73         int i;
 74         if (argv[1][0] == 'p') {
 75                 la = strtol(argv[2],0,0) + KERNBASE;
 76                 ua = la + strtol(argv[3],0,0)*4;
 77         } else if (argv[1][0] == 'v') {
 78                 la = strtol(argv[2],0,0);
 79                 ua = la + strtol(argv[3],0,0)*4;
 80         } else {
 81                 cprintf("Invalid ADDR TYPE!\n");
 82                 return 0;
 83         }
 84         if (la >= ua ||
 85             la != ROUNDUP(la, 4) ||
 86             ua != ROUNDUP(ua, 4)) {
 87                 cprintf("Invalid ADDR (0x%x, 0x%x)!\n",la,ua);
 88                 return 0;
 89         }
 90         for(i=0 ;la < ua; la += 4) {
 91                 if(!(i%4))
 92                         cprintf("\n0x%x: ",la);
 93                 cprintf("0x%x\t",*((uint32_t *)(la)));
 94                 i++;
 95         }
 96         cprintf("\n");
 97         return 0;
 98 }

0 0