锘??xml version="1.0" encoding="utf-8" standalone="yes"?>欧美亚洲国产精品久久高清,麻豆久久久9性大片,久久中文字幕一区二区http://www.shnenglu.com/jeromewen/鍔姏涓?/description>zh-cnFri, 09 May 2025 10:21:19 GMTFri, 09 May 2025 10:21:19 GMT60LibTiff 緙栬瘧榪囩▼http://www.shnenglu.com/jeromewen/archive/2010/04/13/112511.htmlJeromeWenJeromeWenTue, 13 Apr 2010 14:30:00 GMThttp://www.shnenglu.com/jeromewen/archive/2010/04/13/112511.htmlhttp://www.shnenglu.com/jeromewen/comments/112511.htmlhttp://www.shnenglu.com/jeromewen/archive/2010/04/13/112511.html#Feedback0http://www.shnenglu.com/jeromewen/comments/commentRss/112511.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/112511.html寰堟剰澶栫殑鍘熷洜瑕佺敤鍒?LibTiff 榪欓噷灝嗙紪璇戣繃紼嬭褰曚笅鏉ュ蹇樸?br>http://www.remotesensing.org/libtiff/
http://dl.maptools.org/dl/libtiff/

tiff-3.8.0
鎻愮ず鎵句笉鍒?jpeg.h zlib.h

libtiff/tiffconf.h.vc

42:#undef JPEG_SUPPORT
61:#undef PIXARLOG_SUPPORT
67:#undef ZIP_SUPPORT

libtiff/Makefile.vc
56:# tif_jpeg.obj \
64:# tif_pixarlog.obj \
76:# tif_zip.obj \

tif_codec.obj : error LNK2001: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?_TIFFInitPixarLog
tif_codec.obj : error LNK2001: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?_TIFFInitZIP
tif_codec.obj : error LNK2001: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?_TIFFInitJPEG


libtiff/tif_codec.c
86://    { "JPEG",  COMPRESSION_JPEG, TIFFInitJPEG },
93://    { "Deflate", COMPRESSION_DEFLATE, TIFFInitZIP },
94://    { "AdobeDeflate",   COMPRESSION_ADOBE_DEFLATE , TIFFInitZIP },
95://    { "PixarLog", COMPRESSION_PIXARLOG, TIFFInitPixarLog },



JeromeWen 2010-04-13 22:30 鍙戣〃璇勮
]]>
weblogci鏁版嵁婧愰厤緗?/title><link>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14875.html</link><dc:creator>JeromeWen</dc:creator><author>JeromeWen</author><pubDate>Wed, 08 Nov 2006 12:20:00 GMT</pubDate><guid>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14875.html</guid><wfw:comment>http://www.shnenglu.com/jeromewen/comments/14875.html</wfw:comment><comments>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14875.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.shnenglu.com/jeromewen/comments/commentRss/14875.html</wfw:commentRss><trackback:ping>http://www.shnenglu.com/jeromewen/services/trackbacks/14875.html</trackback:ping><description><![CDATA[<p>涓.閰嶇疆weblogic鏈嶅姟鍣?br />start menu->program->BEA Weblogic Platfrom 8.1->Configuration Wizard->Create a new Weblogic->next->next->next->(user password)next->(select jdk)next->(datasource)create<br />浜?鏁版嵁搴撻┍鍔ㄩ厤緗?br />copy mysql-connector-java-3.1.11-bin.jar to %WL_HOME%\<br />鍦╠:\SoftWare\BEA\user_projects\domains\datasource\startWebLogic.cmd鐨剆et CLASSPATH=閮ㄥ垎鍔犲叆%WL_HOME%\mysql-connector-java-3.1.11-bin.jar<br />涓?閰嶇疆鏁版嵁搴撹繛鎺ユ睜<br />1.start menu->program->BEA Weblogic Platfrom 8.1->User Projects->datasource->Start Server<br />2.鎵撳紑<a >http://127.0.0.1:7001/console</a> weblogic 12345678<br />3.datasource->鏈嶅姟->JDBC->榪炴帴緙撳啿姹?Connections Pools)->(閰嶇疆鏂扮殑JDBC榪炴帴緙撳啿姹?configure a new JDBC Connection Pools<br />4.Database Type 閫夋嫨mysql椹卞姩涓簅rg.gjt.mm.mysql.Driver<br />5.Continue<br />鍚嶇О:MyJDBC Connection Pool<br />鏁版嵁搴撳悕縐?datasource<br />涓繪満鍚?127.0.0.1<br />绔彛:3306<br />鏁版嵁搴撶敤鎴峰悕:<br />瀵嗙爜:<br />紜瀵嗙爜:<br />5.Continue->Test Driver Configuration<br />6.Create and deploy<br />鍥?閰嶇疆鏁版嵁婧?br />1.datasource->鏈嶅姟->JDBC->鏁版嵁婧?Data Source)->configure a new JDBC Data Source<br />2.<br />鍚嶇О:MyData Source<br />JNDI鍚嶇О:MyData Source<br />3.Continue->Continue->Create<br />------------嫻嬭瘯浠g爜DSTest.java------------------------<br />import java.sql.*;<br />import javax.naming.*;<br />import javax.sql.*;<br />import java.util.Properties;<br />import javax.rmi.PortableRemoteObject;</p> <p>public class DSTest{<br />聽private static Context getInitialContext(){<br />聽聽String URL="t3://127.0.0.1:7001";<br />聽聽String user="weblogic";<br />聽聽String password="12345678";<br />聽聽Properties prop=null;<br />聽聽Context context=null;<br />聽聽<br />聽聽try{<br />聽聽聽prop = new Properties();<br />聽聽聽prop.put(Context.INITIAL_CONTEXT_FACTORY,"weblogic.jndi.WLInitialContextFactory");<br />聽聽聽prop.put(Context.PROVIDER_URL,URL);<br />聽聽聽prop.put(Context.SECURITY_PRINCIPAL,user);<br />聽聽聽prop.put(Context.SECURITY_CREDENTIALS,password);<br />聽聽聽context = new InitialContext(prop);<br />聽聽}<br />聽聽catch(Exception e)<br />聽聽{<br />聽聽聽e.printStackTrace();<br />聽聽}<br />聽聽return context;<br />聽聽}<br />聽<br />聽public static void main(String[] args){<br />聽聽DSTest dstest = new DSTest();<br />聽聽<br />聽聽DataSource ds=null;<br />聽聽Context ctx=null;<br />聽聽Connection conn=null;<br />聽聽<br />聽聽try{<br />聽聽聽ctx = getInitialContext();<br />聽聽聽ds = (DataSource)ctx.lookup("MyData Source");<br />聽聽}<br />聽聽catch(Exception e){<br />聽聽聽e.printStackTrace();<br />聽聽}<br />聽聽<br />聽聽Statement stmt=null;<br />聽聽ResultSet rs=null;<br />聽聽<br />聽聽try{<br />聽聽聽conn = ds.getConnection();<br />聽聽聽stmt = conn.createStatement();<br />聽聽聽String sql = "select * from user";<br />聽聽聽rs = stmt.executeQuery(sql);<br />聽聽聽<br />聽聽聽while(rs.next()){<br />聽聽聽聽System.out.println("username : " + rs.getString("username"));<br />聽聽聽聽System.out.println("password : " + rs.getString("password"));<br />聽聽聽聽}<br />聽聽}<br />聽聽catch(SQLException e){<br />聽聽聽e.printStackTrace();<br />聽聽聽}<br />聽聽finally{<br />聽聽聽try{<br />聽聽聽if(stmt != null) { stmt.close();}<br />聽聽聽if (conn != null) { conn.close();}<br />聽聽聽}<br />聽聽聽catch(SQLException e){<br />聽聽聽聽e.printStackTrace();<br />聽聽聽聽}<br />聽聽}<br />聽聽}<br />}<br />--------------------------------------------------------------------------------------------<br />set CLASSPATH=%CLASSPATH%;weblogic.jar<br />javac DSTest.java<br />java DSTest<br />pause<br /></p><img src ="http://www.shnenglu.com/jeromewen/aggbug/14875.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.shnenglu.com/jeromewen/" target="_blank">JeromeWen</a> 2006-11-08 20:20 <a href="http://www.shnenglu.com/jeromewen/archive/2006/11/08/14875.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>TOMCAT鏁版嵁婧愰厤緗?/title><link>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14874.html</link><dc:creator>JeromeWen</dc:creator><author>JeromeWen</author><pubDate>Wed, 08 Nov 2006 12:18:00 GMT</pubDate><guid>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14874.html</guid><wfw:comment>http://www.shnenglu.com/jeromewen/comments/14874.html</wfw:comment><comments>http://www.shnenglu.com/jeromewen/archive/2006/11/08/14874.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.shnenglu.com/jeromewen/comments/commentRss/14874.html</wfw:commentRss><trackback:ping>http://www.shnenglu.com/jeromewen/services/trackbacks/14874.html</trackback:ping><description><![CDATA[<p>緗戜笂榪欑被鏂囩珷鐗瑰埆澶?姝ゆ暀紼嬫槸鏈漢瀹炶返紜繚涓涓甯歌繍琛岀殑涓涓?<br />1.瀹夎MYSQL TOMCAT<br />2.copy mysql-connector-java-3.1.11-bin.jar to %TOMCAT_HOME%\common\lib<br />drop database if exists datasource;<br />create database datasource;<br />use datasource;<br />create table user(<br />username varchar(50) not null,<br />password varchar(50),<br />primary key (username)<br />);<br />insert into user(username,password) values("kingbill","10041207");--鎻掑叆嫻嬭瘯鏁版嵁<br />3.浣跨敤Tomcat鐨剋eb綆$悊搴旂敤閰嶇疆鏁版嵁婧?br />3.1 <a >http://127.0.0.1:8080/admin/</a> enter username password<br />3.2 Resources->Data Sources->Data Source Actions->create New Data Source<br />3.3 JDBC Driver Class 涓嶈兘闅忎究娣?Data Source URL鍙兘鏄痡dbc:mysql://IP:port<br />JNDI Name:MyDataSource<br />Data Source <a href="jdbc:mysql://127.0.0.1:3306/datasource">URL:jdbc:mysql://127.0.0.1:3306/datasource</a><br />JDBC Driver Class:org.gjt.mm.mysql.Driver<br />User Name:root<br />Password:123456<br />鍏朵綑榛樿<br />Validation Query:鍙互涓嶅~<br />3.4 Save->Commit Change<br />4.鍦?TOMCAT_HOME%\conf\catalina\localhost\testapp.xml鍔犲叆<br />娣誨姞<ResourceLink global="MyDataSource" name="MyDataSource" type="javax.sql.DataSource"/><br />濡傛灉鍙戝竷鏄?TOMCAT_HOME%\conf\server.xml閰嶇疆鍒欏湪<context> ... </context> 閲岄潰鍔犲叆<br />----------------------------鎸夌収濡備笂姝ラ涓嶄細鍑虹幇浠ヤ笅閿欒<br />Cannot create JDBC driver of class '' for connect URL 'null'<br />Name MyDataSource is not bound in this Context<br />Cannot load JDBC driver class 'org.git.mm.mysql.Driver'<br />---------------------------------------------------<br />嫻嬭瘯浠g爜Test.jsp<br /><%@ page contentType="text/html; charset=gb2312" language="java" import="java.sql.*" errorPage="" %><br /><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "<a ><br /><<a href="mailto:%@page">%@page</a> import="javax.sql.*" %><br /><<a href="mailto:%@page">%@page</a> import="javax.naming.*" %><br /><<a href="mailto:%@page">%@page</a> session="false"%></p> <p><html><br /><head><br /><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /><br /><title></title><br /><%<br />DataSource ds=null;<br />Connection conn=null;<br />Statement stmt=null;<br />try{<br />InitialContext ctx=new InitialContext();<br />ds=(DataSource)ctx.lookup("java:comp/env/MyDataSource");<br />conn = ds.getConnection();<br />stmt = conn.createStatement();<br />String strSql="select * from user";<br />ResultSet rs=stmt.executeQuery(strSql);<br />while(rs.next()){<br />聽out.println("鐢ㄦ埛鍚嶄負 : " + rs.getString(1));<br />聽}<br />聽if(rs!=null) {rs.close();};<br />聽if(stmt!=null) {stmt.close();};<br />聽if(conn!=null) {conn.close();};<br />}<br />catch (SQLException e) {</p> <p>聽聽聽聽 // display SQL specific exception information <br />聽聽聽聽 System.out.println("*************************" );<br />聽聽聽聽 System.out.println("SQLException in main: " + e.getMessage() );<br />聽聽聽聽 System.out.println("** SQLState: " + e.getSQLState());<br />聽聽聽聽 System.out.println("** SQL Error Code: " + e.getErrorCode());<br />聽聽聽聽 System.out.println("*************************" );<br />聽聽聽聽 e.printStackTrace();<br />}<br />catch (Exception e) {<br />聽聽聽聽 System.out.println("Exception in main: " + e.getMessage() );<br />聽聽聽聽 e.printStackTrace();<br />}<br />%><br /></head><br /><body><br /></body><br /></html></p> <p>聽</p><img src ="http://www.shnenglu.com/jeromewen/aggbug/14874.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.shnenglu.com/jeromewen/" target="_blank">JeromeWen</a> 2006-11-08 20:18 <a href="http://www.shnenglu.com/jeromewen/archive/2006/11/08/14874.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>Playing with ptrace, Part IIhttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13516.htmlJeromeWenJeromeWenTue, 10 Oct 2006 07:59:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13516.htmlhttp://www.shnenglu.com/jeromewen/comments/13516.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13516.html#Feedback0http://www.shnenglu.com/jeromewen/comments/commentRss/13516.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/13516.html

SysAdmin

In Part II of his series on ptrace, Pradeep tackles the more advanced topics of setting breakpoints and injecting code into running processes.

In Part I of this article [LJ, November 2002], we saw how ptrace can be used to trace system calls and change system call arguments. In this article, we investigate advanced techniques like setting breakpoints and injecting code into running programs. Debuggers use these methods to set up breakpoints and execute debugging handlers. As with Part I, all code in this article is i386 architecture-specific.

Attaching to a Running Process

In Part I, we ran the process to be traced as a child after calling ptrace(PTRACE_TRACEME, ..). If you simply wanted to see how the process is making system calls and trace the program, this would be sufficient. If you want to trace or debug a process already running, then ptrace(PTRACE_ATTACH, ..) should be used.

When a ptrace(PTRACE_ATTACH, ..) is called with the pid to be traced, it is roughly equivalent to the process calling ptrace(PTRACE_TRACEME, ..) and becoming a child of the tracing process. The traced process is sent a SIGSTOP, so we can examine and modify the process as usual. After we are done with modifications or tracing, we can let the traced process continue on its own by calling ptrace(PTRACE_DETACH, ..).

The following is the code for a small example tracing program:

int main()
{   int i;
    for(i = 0;i < 10; ++i) {
        printf("My counter: %d\n", i);
        sleep(2);
    }
    return 0;
}

Save the program as dummy2.c. Compile and run it:

gcc -o dummy2 dummy2.c
./dummy2 &
Now, we can attach to dummy2 by using the code below:
#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>   /* For user_regs_struct 
                             etc. */
int main(int argc, char *argv[])
{   pid_t traced_process;
    struct user_regs_struct regs;
    long ins;
    if(argc != 2) {
        printf("Usage: %s <pid to be traced>\n",
               argv[0], argv[1]);
        exit(1);
    }
    traced_process = atoi(argv[1]);
    ptrace(PTRACE_ATTACH, traced_process, 
           NULL, NULL);
    wait(NULL);
    ptrace(PTRACE_GETREGS, traced_process, 
           NULL, &regs);
    ins = ptrace(PTRACE_PEEKTEXT, traced_process, 
                 regs.eip, NULL);
    printf("EIP: %lx Instruction executed: %lx\n", 
           regs.eip, ins);
    ptrace(PTRACE_DETACH, traced_process, 
           NULL, NULL);
    return 0;
}
The above program simply attaches to a process, waits for it to stop, examines its eip (instruction pointer) and detaches.

To inject code use ptrace(PTRACE_POKETEXT, ..) and ptrace(PTRACE_POKEDATA, ..) after the traced process has stopped.

Setting Breakpoints

How do debuggers set breakpoints? Generally, they replace the instruction to be executed with a trap instruction, so that when the traced program stops, the tracing program, the debugger, can examine it. It will replace the original instruction once the tracing program continues the traced process. Here's an example:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>
const int long_size = sizeof(long);
void getdata(pid_t child, long addr, 
             char *str, int len)
{   char *laddr;
    int i, j;
    union u {
            long val;
            char chars[long_size];
    }data;
    i = 0;
    j = len / long_size;
    laddr = str;
    while(i < j) {
        data.val = ptrace(PTRACE_PEEKDATA, child, 
                          addr + i * 4, NULL);
        memcpy(laddr, data.chars, long_size);
        ++i;
        laddr += long_size;
    }
    j = len % long_size;
    if(j != 0) {
        data.val = ptrace(PTRACE_PEEKDATA, child, 
                          addr + i * 4, NULL);
        memcpy(laddr, data.chars, j);
    }
    str[len] = '\0';
}
void putdata(pid_t child, long addr, 
             char *str, int len)
{   char *laddr;
    int i, j;
    union u {
            long val;
            char chars[long_size];
    }data;
    i = 0;
    j = len / long_size;
    laddr = str;
    while(i < j) {
        memcpy(data.chars, laddr, long_size);
        ptrace(PTRACE_POKEDATA, child, 
               addr + i * 4, data.val);
        ++i;
        laddr += long_size;
    }
    j = len % long_size;
    if(j != 0) {
        memcpy(data.chars, laddr, j);
        ptrace(PTRACE_POKEDATA, child, 
               addr + i * 4, data.val);
    }
}
int main(int argc, char *argv[])
{   pid_t traced_process;
    struct user_regs_struct regs, newregs;
    long ins;
    /* int 0x80, int3 */
    char code[] = {0xcd,0x80,0xcc,0};
    char backup[4];
    if(argc != 2) {
        printf("Usage: %s <pid to be traced>\n", 
               argv[0], argv[1]);
        exit(1);
    }
    traced_process = atoi(argv[1]);
    ptrace(PTRACE_ATTACH, traced_process, 
           NULL, NULL);
    wait(NULL);
    ptrace(PTRACE_GETREGS, traced_process, 
           NULL, &regs);
    /* Copy instructions into a backup variable */
    getdata(traced_process, regs.eip, backup, 3);
    /* Put the breakpoint */
    putdata(traced_process, regs.eip, code, 3);
    /* Let the process continue and execute 
       the int 3 instruction */
    ptrace(PTRACE_CONT, traced_process, NULL, NULL);
    wait(NULL);
    printf("The process stopped, putting back "
           "the original instructions\n");
    printf("Press <enter> to continue\n");
    getchar();
    putdata(traced_process, regs.eip, backup, 3);
    /* Setting the eip back to the original 
       instruction to let the process continue */
    ptrace(PTRACE_SETREGS, traced_process, 
           NULL, &regs);
    ptrace(PTRACE_DETACH, traced_process, 
           NULL, NULL);
    return 0;
}

Here we replace the three bytes with the code for a trap instruction, and when the process stops, we replace the original instructions and reset the eip to original location. Figures 1-4 clarify how the instruction stream looks when above program is executed.

Now that we have a clear idea of how breakpoints are set, let's inject some code bytes into a running program. These code bytes will print ``hello world''.

The following program is a simple ``hello world'' program with modifications to fit our needs. Compile the following program with:

gcc -o hello hello.c
void main()
{
__asm__("
         jmp forward
backward:
         popl   %esi      # Get the address of 
                          # hello world string
         movl   $4, %eax  # Do write system call
         movl   $2, %ebx
         movl   %esi, %ecx
         movl   $12, %edx
         int    $0x80
         int3             # Breakpoint. Here the 
                          # program will stop and 
                          # give control back to 
                          # the parent
forward:
         call   backward
         .string \"Hello World\\n\""
       );
}

The jumping backward and forward here is required to find the address of the ``hello world'' string.

We can get the machine code for the above assembly from GDB. Fire up GDB and disassemble the program:

(gdb) disassemble main
Dump of assembler code for function main:
0x80483e0 <main>:       push   %ebp
0x80483e1 <main+1>:     mov    %esp,%ebp
0x80483e3 <main+3>:     jmp    0x80483fa <forward>
End of assembler dump.
(gdb) disassemble forward
Dump of assembler code for function forward:
0x80483fa <forward>:    call   0x80483e5 <backward>
0x80483ff <forward+5>:  dec    %eax
0x8048400 <forward+6>:  gs
0x8048401 <forward+7>:  insb   (%dx),%es:(%edi)
0x8048402 <forward+8>:  insb   (%dx),%es:(%edi)
0x8048403 <forward+9>:  outsl  %ds:(%esi),(%dx)
0x8048404 <forward+10>: and    %dl,0x6f(%edi)
0x8048407 <forward+13>: jb     0x8048475
0x8048409 <forward+15>: or     %fs:(%eax),%al
0x804840c <forward+18>: mov    %ebp,%esp
0x804840e <forward+20>: pop    %ebp
0x804840f <forward+21>: ret
End of assembler dump.
(gdb) disassemble backward
Dump of assembler code for function backward:
0x80483e5 <backward>:   pop    %esi
0x80483e6 <backward+1>: mov    $0x4,%eax
0x80483eb <backward+6>: mov    $0x2,%ebx
0x80483f0 <backward+11>:        mov    %esi,%ecx
0x80483f2 <backward+13>:        mov    $0xc,%edx
0x80483f7 <backward+18>:        int    $0x80
0x80483f9 <backward+20>:        int3
End of assembler dump.

We need to take the machine code bytes from main+3 to backward+20, which is a total of 41 bytes. The machine code can be seen with the x command in GDB:

(gdb) x/40bx main+3
<main+3>: eb 15 5e b8 04 00 00 00
<backward+6>: bb 02 00 00 00 89 f1 ba
<backward+14>: 0c 00 00 00 cd 80 cc
<forward+1>: e6 ff ff ff 48 65 6c 6c
<forward+9>: 6f 20 57 6f 72 6c 64 0a

Now we have the instruction bytes to be executed. Why wait? We can inject them using the same method as in the previous example. The following is the source code; only the main function is given here:

int main(int argc, char *argv[])
{   pid_t traced_process;
    struct user_regs_struct regs, newregs;
    long ins;
    int len = 41;
    char insertcode[] =
"\xeb\x15\x5e\xb8\x04\x00"
        "\x00\x00\xbb\x02\x00\x00\x00\x89\xf1\xba"
        "\x0c\x00\x00\x00\xcd\x80\xcc\xe8\xe6\xff"
        "\xff\xff\x48\x65\x6c\x6c\x6f\x20\x57\x6f"
        "\x72\x6c\x64\x0a\x00";
    char backup[len];
    if(argc != 2) {
        printf("Usage: %s <pid to be traced>\n", 
               argv[0], argv[1]);
        exit(1);
    }
    traced_process = atoi(argv[1]);
    ptrace(PTRACE_ATTACH, traced_process, 
           NULL, NULL);
    wait(NULL);
    ptrace(PTRACE_GETREGS, traced_process, 
           NULL, &regs);
    getdata(traced_process, regs.eip, backup, len);
    putdata(traced_process, regs.eip, 
            insertcode, len);
    ptrace(PTRACE_SETREGS, traced_process, 
           NULL, &regs);
    ptrace(PTRACE_CONT, traced_process, 
           NULL, NULL);
    wait(NULL);
    printf("The process stopped, Putting back "
           "the original instructions\n");
    putdata(traced_process, regs.eip, backup, len);
    ptrace(PTRACE_SETREGS, traced_process, 
           NULL, &regs);
    printf("Letting it continue with "
           "original flow\n");
    ptrace(PTRACE_DETACH, traced_process,
           NULL, NULL);
    return 0;
}



Injecting the Code into Free Space

In the previous example we injected the code directly into the executing instruction stream. However, debuggers can get confused with this kind of behaviour, so let's find the free space in the process and inject the code there. We can find free space by examining the /proc/pid/maps file of the traced process. The following function will find the starting address of this map:

long freespaceaddr(pid_t pid)
{
    FILE *fp;
    char filename[30];
    char line[85];
    long addr;
    char str[20];
    sprintf(filename, "/proc/%d/maps", pid);
    fp = fopen(filename, "r");
    if(fp == NULL)
        exit(1);
    while(fgets(line, 85, fp) != NULL) {
        sscanf(line, "%lx-%*lx %*s %*s %s", &addr, 
               str, str, str, str);
        if(strcmp(str, "00:00") == 0)
            break;
    }
    fclose(fp);
    return addr;
}

Each line in /proc/pid/maps represents a mapped region of the process. An entry in /proc/pid/maps looks like this:

map start-mapend    protection  offset     device   
inode      process file
08048000-0804d000   r-xp        00000000   03:08    
66111      /opt/kde2/bin/kdeinit
The following program injects code into free space. It's similar to the previous injection program except the free space address is used for keeping our new code. Here is the source code for the main function:
int main(int argc, char *argv[])
{   pid_t traced_process;
    struct user_regs_struct oldregs, regs;
    long ins;
    int len = 41;
    char insertcode[] =
"\xeb\x15\x5e\xb8\x04\x00"
        "\x00\x00\xbb\x02\x00\x00\x00\x89\xf1\xba"
        "\x0c\x00\x00\x00\xcd\x80\xcc\xe8\xe6\xff"
        "\xff\xff\x48\x65\x6c\x6c\x6f\x20\x57\x6f"
        "\x72\x6c\x64\x0a\x00";
    char backup[len];
    long addr;
    if(argc != 2) {
        printf("Usage: %s <pid to be traced>\n", 
               argv[0], argv[1]);
        exit(1);
    }
    traced_process = atoi(argv[1]);
    ptrace(PTRACE_ATTACH, traced_process, 
           NULL, NULL);
    wait(NULL);
    ptrace(PTRACE_GETREGS, traced_process, 
           NULL, &regs);
    addr = freespaceaddr(traced_process);
    getdata(traced_process, addr, backup, len);
    putdata(traced_process, addr, insertcode, len);
    memcpy(&oldregs, &regs, sizeof(regs));
    regs.eip = addr;
    ptrace(PTRACE_SETREGS, traced_process, 
           NULL, &regs);
    ptrace(PTRACE_CONT, traced_process, 
           NULL, NULL);
    wait(NULL);
    printf("The process stopped, Putting back "
           "the original instructions\n");
    putdata(traced_process, addr, backup, len);
    ptrace(PTRACE_SETREGS, traced_process, 
           NULL, &oldregs);
    printf("Letting it continue with "
           "original flow\n");
    ptrace(PTRACE_DETACH, traced_process, 
           NULL, NULL);
    return 0;
}


Behind the Scenes

So what happens within the kernel now? How is ptrace implemented? This section could be an article on its own; however, here's a brief description of what happens.

When a process calls ptrace with PTRACE_TRACEME, the kernel sets up the process flags to reflect that it is being traced:

Source: arch/i386/kernel/ptrace.c
if (request == PTRACE_TRACEME) {
    /* are we already being traced? */
    if (current->ptrace & PT_PTRACED)
        goto out;
    /* set the ptrace bit in the process flags. */
    current->ptrace |= PT_PTRACED;
    ret = 0;
    goto out;
}

When a system call entry is done, the kernel checks this flag and calls the trace system call if the process is being traced. The gory assembly details can be found in arch/i386/kernel/entry.S.

Now, we are in the sys_trace() function as defined in arch/i386/kernel/ptrace.c. It stops the child and sends a signal to the parent notifying that the child is stopped. This wakes up the waiting parent, and it does the ptrace magic. Once the parent is done, and it calls ptrace(PTRACE_CONT, ..) or ptrace(PTRACE_SYSCALL, ..), it wakes up the child by calling the scheduler function wake_up_process(). Some other architectures can implement this by sending a SIGCHLD to child.

Conclusion

ptrace may appear to be magic to some people, because it can examine and modify a running program. It is generally used by debuggers and system call tracing programs, such as ptrace. It opens up interesting possibilities for doing user-mode extensions as well. There have been a lot of attempts to extend the operating system on the user level. See Resources to read about UFO, a user-level extension to filesystems. ptrace also is used to employ security mechanisms.

All example code from this article and from Part I is available as a tar archive on the Linux Journal FTP site [ftp.ssc.com/pub/lj/listings/issue104/6210.tgz].



JeromeWen 2006-10-10 15:59 鍙戣〃璇勮
]]>
Playing with ptrace, Part Ihttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13514.htmlJeromeWenJeromeWenTue, 10 Oct 2006 06:48:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13514.htmlhttp://www.shnenglu.com/jeromewen/comments/13514.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/10/10/13514.html#Feedback1http://www.shnenglu.com/jeromewen/comments/commentRss/13514.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/13514.html鏉ヨ嚜http://www.linuxjournal.com/article/6100
SysAdmin

Using ptrace allows you to set up system call interception and modification at the user level.

Have you ever wondered how system calls can be intercepted? Have you ever tried fooling the kernel by changing system call arguments? Have you ever wondered how debuggers stop a running process and let you take control of the process?

If you are thinking of using complex kernel programming to accomplish tasks, think again. Linux provides an elegant mechanism to achieve all of these things: the ptrace (Process Trace) system call. ptrace provides a mechanism by which a parent process may observe and control the execution of another process. It can examine and change its core image and registers and is used primarily to implement breakpoint debugging and system call tracing.

In this article, we learn how to intercept a system call and change its arguments. In Part II of the article we will study advanced techniques--setting breakpoints and injecting code into a running program. We will peek into the child process' registers and data segment and modify the contents. We will also describe a way to inject code so the process can be stopped and execute arbitrary instructions.

Basics

Operating systems offer services through a standard mechanism called system calls. They provide a standard API for accessing the underlying hardware and low-level services, such as the filesystems. When a process wants to invoke a system call, it puts the arguments to system calls in registers and calls soft interrupt 0x80. This soft interrupt is like a gate to the kernel mode, and the kernel will execute the system call after examining the arguments.

On the i386 architecture (all the code in this article is i386-specific), the system call number is put in the register %eax. The arguments to this system call are put into registers %ebx, %ecx, %edx, %esi and %edi, in that order. For example, the call:

write(2, "Hello", 5)

roughly would translate into

movl   $4, %eax
movl   $2, %ebx
movl   $hello,%ecx
movl   $5, %edx
int    $0x80
where $hello points to a literal string "Hello".

So where does ptrace come into picture? Before executing the system call, the kernel checks whether the process is being traced. If it is, the kernel stops the process and gives control to the tracking process so it can examine and modify the traced process' registers.

Let's clarify this explanation with an example of how the process works:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>   /* For constants 
                                   ORIG_EAX etc */
int main()
{   pid_t child;
    long orig_eax;
    child = fork();
    if(child == 0) {
        ptrace(PTRACE_TRACEME, 0, NULL, NULL);
        execl("/bin/ls", "ls", NULL);
    }
    else {
        wait(NULL);
        orig_eax = ptrace(PTRACE_PEEKUSER, 
                          child, 4 * ORIG_EAX, 
                          NULL);
        printf("The child made a "
               "system call %ld\n", orig_eax);
        ptrace(PTRACE_CONT, child, NULL, NULL);
    }
    return 0;
}

When run, this program prints:

The child made a system call 11
along with the output of ls. System call number 11 is execve, and it's the first system call executed by the child. For reference, system call numbers can be found in /usr/include/asm/unistd.h.

As you can see in the example, a process forks a child and the child executes the process we want to trace. Before running exec, the child calls ptrace with the first argument, equal to PTRACE_TRACEME. This tells the kernel that the process is being traced, and when the child executes the execve system call, it hands over control to its parent. The parent waits for notification from the kernel with a wait() call. Then the parent can check the arguments of the system call or do other things, such as looking into the registers.

When the system call occurs, the kernel saves the original contents of the eax register, which contains the system call number. We can read this value from child's USER segment by calling ptrace with the first argument PTRACE_PEEKUSER, shown as above.

After we are done examining the system call, the child can continue with a call to ptrace with the first argument PTRACE_CONT, which lets the system call continue.

ptrace Parameters

ptrace is called with four arguments:

long ptrace(enum __ptrace_request request,
            pid_t pid,
            void *addr,
            void *data);

The first argument determines the behaviour of ptrace and how other arguments are used. The value of request should be one of PTRACE_TRACEME, PTRACE_PEEKTEXT, PTRACE_PEEKDATA, PTRACE_PEEKUSER, PTRACE_POKETEXT, PTRACE_POKEDATA, PTRACE_POKEUSER, PTRACE_GETREGS, PTRACE_GETFPREGS, PTRACE_SETREGS, PTRACE_SETFPREGS, PTRACE_CONT, PTRACE_SYSCALL, PTRACE_SINGLESTEP, PTRACE_DETACH. The significance of each of these requests will be explained in the rest of the article.

Reading System Call Parameters

By calling ptrace with PTRACE_PEEKUSER as the first argument, we can examine the contents of the USER area where register contents and other information is stored. The kernel stores the contents of registers in this area for the parent process to examine through ptrace.

Let's show this with an example:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>
#include <sys/syscall.h>   /* For SYS_write etc */
int main()
{   pid_t child;
    long orig_eax, eax;
    long params[3];
    int status;
    int insyscall = 0;
    child = fork();
    if(child == 0) {
        ptrace(PTRACE_TRACEME, 0, NULL, NULL);
        execl("/bin/ls", "ls", NULL);
    }
    else {
       while(1) {
          wait(&status);
          if(WIFEXITED(status))
              break;
          orig_eax = ptrace(PTRACE_PEEKUSER, 
                     child, 4 * ORIG_EAX, NULL);
          if(orig_eax == SYS_write) {
             if(insyscall == 0) {    
                /* Syscall entry */
                insyscall = 1;
                params[0] = ptrace(PTRACE_PEEKUSER,
                                   child, 4 * EBX, 
                                   NULL);
                params[1] = ptrace(PTRACE_PEEKUSER,
                                   child, 4 * ECX, 
                                   NULL);
                params[2] = ptrace(PTRACE_PEEKUSER,
                                   child, 4 * EDX, 
                                   NULL);
                printf("Write called with "
                       "%ld, %ld, %ld\n",
                       params[0], params[1],
                       params[2]);
                }
          else { /* Syscall exit */
                eax = ptrace(PTRACE_PEEKUSER, 
                             child, 4 * EAX, NULL);
                    printf("Write returned "
                           "with %ld\n", eax);
                    insyscall = 0;
                }
            }
            ptrace(PTRACE_SYSCALL, 
                   child, NULL, NULL);
        }
    }
    return 0;
}

This program should print an output similar to the following:

ppadala@linux:~/ptrace > ls
a.out        dummy.s      ptrace.txt   
libgpm.html  registers.c  syscallparams.c
dummy        ptrace.html  simple.c
ppadala@linux:~/ptrace > ./a.out
Write called with 1, 1075154944, 48
a.out        dummy.s      ptrace.txt
Write returned with 48
Write called with 1, 1075154944, 59
libgpm.html  registers.c  syscallparams.c
Write returned with 59
Write called with 1, 1075154944, 30
dummy        ptrace.html  simple.c
Write returned with 30
Here we are tracing the write system calls, and ls makes three write system calls. The call to ptrace, with a first argument of PTRACE_SYSCALL, makes the kernel stop the child process whenever a system call entry or exit is made. It's equivalent to doing a PTRACE_CONT and stopping at the next system call entry/exit.

In the previous example, we used PTRACE_PEEKUSER to look into the arguments of the write system call. When a system call returns, the return value is placed in %eax, and it can be read as shown in that example.

The status variable in the wait call is used to check whether the child has exited. This is the typical way to check whether the child has been stopped by ptrace or was able to exit. For more details on macros like WIFEXITED, see the wait(2) man page.

Reading Register Values

If you want to read register values at the time of a syscall entry or exit, the procedure shown above can be cumbersome. Calling ptrace with a first argument of PTRACE_GETREGS will place all the registers in a single call.

The code to fetch register values looks like this:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>
#include <sys/syscall.h>
int main()
{   pid_t child;
    long orig_eax, eax;
    long params[3];
    int status;
    int insyscall = 0;
    struct user_regs_struct regs;
    child = fork();
    if(child == 0) {
        ptrace(PTRACE_TRACEME, 0, NULL, NULL);
        execl("/bin/ls", "ls", NULL);
    }
    else {
       while(1) {
          wait(&status);
          if(WIFEXITED(status))
              break;
          orig_eax = ptrace(PTRACE_PEEKUSER, 
                            child, 4 * ORIG_EAX, 
                            NULL);
          if(orig_eax == SYS_write) {
              if(insyscall == 0) {
                 /* Syscall entry */
                 insyscall = 1;
                 ptrace(PTRACE_GETREGS, child, 
                        NULL, &regs);
                 printf("Write called with "
                        "%ld, %ld, %ld\n",
                        regs.ebx, regs.ecx, 
                        regs.edx);
             }
             else { /* Syscall exit */
                 eax = ptrace(PTRACE_PEEKUSER, 
                              child, 4 * EAX, 
                              NULL);
                 printf("Write returned "
                        "with %ld\n", eax);
                 insyscall = 0;
             }
          }
          ptrace(PTRACE_SYSCALL, child,
                 NULL, NULL);
       }
   }
   return 0;
}

This code is similar to the previous example except for the call to ptrace with PTRACE_GETREGS. Here we have made use of the user_regs_struct defined in <linux/user.h> to read the register values.

Doing Funny Things

Now it's time for some fun. In the following example, we will reverse the string passed to the write system call:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h>
#include <sys/syscall.h>
const int long_size = sizeof(long);
void reverse(char *str)
{   int i, j;
    char temp;
    for(i = 0, j = strlen(str) - 2; 
        i <= j; ++i, --j) {
        temp = str[i];
        str[i] = str[j];
        str[j] = temp;
    }
}
void getdata(pid_t child, long addr, 
             char *str, int len)
{   char *laddr;
    int i, j;
    union u {
            long val;
            char chars[long_size];
    }data;
    i = 0;
    j = len / long_size;
    laddr = str;
    while(i < j) {
        data.val = ptrace(PTRACE_PEEKDATA, 
                          child, addr + i * 4, 
                          NULL);
        memcpy(laddr, data.chars, long_size);
        ++i;
        laddr += long_size;
    }
    j = len % long_size;
    if(j != 0) {
        data.val = ptrace(PTRACE_PEEKDATA, 
                          child, addr + i * 4, 
                          NULL);
        memcpy(laddr, data.chars, j);
    }
    str[len] = '\0';
}
void putdata(pid_t child, long addr, 
             char *str, int len)
{   char *laddr;
    int i, j;
    union u {
            long val;
            char chars[long_size];
    }data;
    i = 0;
    j = len / long_size;
    laddr = str;
    while(i < j) {
        memcpy(data.chars, laddr, long_size);
        ptrace(PTRACE_POKEDATA, child, 
               addr + i * 4, data.val);
        ++i;
        laddr += long_size;
    }
    j = len % long_size;
    if(j != 0) {
        memcpy(data.chars, laddr, j);
        ptrace(PTRACE_POKEDATA, child, 
               addr + i * 4, data.val);
    }
}
int main()
{   
   pid_t child;
   child = fork();
   if(child == 0) {
      ptrace(PTRACE_TRACEME, 0, NULL, NULL);
      execl("/bin/ls", "ls", NULL);
   }
   else {
      long orig_eax;
      long params[3];
      int status;
      char *str, *laddr;
      int toggle = 0;
      while(1) {
         wait(&status);
         if(WIFEXITED(status))
             break;
         orig_eax = ptrace(PTRACE_PEEKUSER, 
                           child, 4 * ORIG_EAX, 
                           NULL);
         if(orig_eax == SYS_write) {
            if(toggle == 0) {
               toggle = 1;
               params[0] = ptrace(PTRACE_PEEKUSER, 
                                  child, 4 * EBX, 
                                  NULL);
               params[1] = ptrace(PTRACE_PEEKUSER, 
                                  child, 4 * ECX, 
                                  NULL);
               params[2] = ptrace(PTRACE_PEEKUSER,
                                  child, 4 * EDX, 
                                  NULL);
               str = (char *)calloc((params[2]+1)
                                 * sizeof(char));
               getdata(child, params[1], str, 
                       params[2]);
               reverse(str);
               putdata(child, params[1], str, 
                       params[2]);
            }
            else {
               toggle = 0;
            }
         }
      ptrace(PTRACE_SYSCALL, child, NULL, NULL);
      }
   }
   return 0;
}

The output looks like this:

ppadala@linux:~/ptrace > ls
a.out        dummy.s      ptrace.txt
libgpm.html  registers.c  syscallparams.c
dummy        ptrace.html  simple.c
ppadala@linux:~/ptrace > ./a.out
txt.ecartp      s.ymmud      tuo.a
c.sretsiger     lmth.mpgbil  c.llacys_egnahc
c.elpmis        lmth.ecartp  ymmud
This example makes use of all the concepts previously discussed, plus a few more. In it, we use calls to ptrace with PTRACE_POKEDATA to change the data values. It works exactly the same way as PTRACE_PEEKDATA, except it both reads and writes the data thatt the child passes in arguments to the system call whereas PEEKDATA only reads the data.

Single-Stepping

ptrace provides features to single-step through the child's code. The call to ptrace(PTRACE_SINGLESTEP,..) tells the kernel to stop the child at each instruction and let the parent take control. The following example shows a way of reading the instruction being executed when a system call is executed. I have created a small dummy executable for you to understand what is happening instead of bothering with the calls made by libc.

Here's the listing for dummy1.s. It's written in assembly language and compiled as gcc -o dummy1 dummy1.s:

.data
hello:
    .string "hello world\n"
.globl  main
main:
    movl    $4, %eax
    movl    $2, %ebx
    movl    $hello, %ecx
    movl    $12, %edx
    int     $0x80
    movl    $1, %eax
    xorl    %ebx, %ebx
    int     $0x80
    ret

The example program that single-steps through the above code is:

#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <linux/user.h> 
#include <sys/syscall.h>
int main()
{   pid_t child;
    const int long_size = sizeof(long);
    child = fork();
    if(child == 0) {
        ptrace(PTRACE_TRACEME, 0, NULL, NULL);
        execl("./dummy1", "dummy1", NULL);
    }
    else {
        int status;
        union u {
            long val;
            char chars[long_size];
        }data;
        struct user_regs_struct regs;
        int start = 0;
        long ins;
        while(1) {
            wait(&status);
            if(WIFEXITED(status))
                break;
            ptrace(PTRACE_GETREGS, 
                   child, NULL, &regs);
            if(start == 1) {
                ins = ptrace(PTRACE_PEEKTEXT, 
                             child, regs.eip, 
                             NULL);
                printf("EIP: %lx Instruction "
                       "executed: %lx\n", 
                       regs.eip, ins);
            }
            if(regs.orig_eax == SYS_write) {
                start = 1;
                ptrace(PTRACE_SINGLESTEP, child, 
                       NULL, NULL);
            }
            else
                ptrace(PTRACE_SYSCALL, child, 
                       NULL, NULL);
        }
    }
    return 0;
}
This program prints:
hello world
EIP: 8049478 Instruction executed: 80cddb31
EIP: 804947c Instruction executed: c3
You might have to look at Intel's manuals to make sense out of those instruction bytes. Using single stepping for more complex processes, such as setting breakpoints, requires careful design and more complex code.

In Part II, we will see how breakpoints can be inserted and code can be injected into a running program.



JeromeWen 2006-10-10 14:48 鍙戣〃璇勮
]]>
POP(110)鐩戞帶http://www.shnenglu.com/jeromewen/archive/2006/09/29/13141.htmlJeromeWenJeromeWenFri, 29 Sep 2006 05:07:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13141.htmlhttp://www.shnenglu.com/jeromewen/comments/13141.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13141.html#Feedback9http://www.shnenglu.com/jeromewen/comments/commentRss/13141.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/13141.html#include "nids.h"
#include <cstdio>
#pragma comment(lib,"ws2_32")
#pragma comment(lib,"wpcap")
#pragma comment(lib,"libnids")
char ascii_string[10000];
char * char_to_ascii(char ch)
{
聽char * string;
聽ascii_string[0] = 0;
聽string = ascii_string;
聽if(isgraph(ch))
聽{
聽聽*string++ =ch;
聽}
聽else if (ch == '\n' || ch == '\r')
聽{
聽聽*string++ =ch;
聽}
聽else
聽{
聽聽*string++ = '.';
聽}
聽*string聽 = 0;
聽return ascii_string;
}

void pop3_protocol_callback(struct tcp_stream* pop3_connection, void **arg)
{
聽int i;
聽char address_string[1024];
聽char content[65535];
聽char content_urgent[65535];
聽struct tuple4 ip_and_port = pop3_connection->addr;
聽strcpy(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.saddr))));
聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.source);
聽strcat(address_string, " <----> ");
聽strcat(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.daddr))));
聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.dest);
聽strcat(address_string,"\n");
聽switch (pop3_connection->nids_state)
聽{
聽case NIDS_JUST_EST:
聽聽if(pop3_connection->addr.dest == 110)
聽聽{
聽聽pop3_connection->client.collect++;
聽聽pop3_connection->client.collect_urg++;
聽聽pop3_connection->server.collect++;
聽聽pop3_connection->server.collect_urg++;
聽聽printf("%sPOP3瀹㈡埛绔拰鏈嶅姟绔緩绔嬭繛鎺n", address_string);
聽聽}
聽聽return;
聽case NIDS_CLOSE:
聽聽printf("---------------------------------------\n");
聽聽printf("%sPOP3瀹㈡埛绔拰鏈嶅姟绔甯稿叧闂璡n", address_string);
聽聽return;
聽case NIDS_RESET:
聽聽printf("---------------------------------------\n");
聽聽printf("%sPOP3瀹㈡埛绔拰鏈嶅姟绔RST鍏抽棴\n", address_string);
聽聽return;
聽case NIDS_DATA:
聽聽{
聽聽聽char status_code[5];
聽聽聽struct half_stream* hlf;
聽聽聽if(pop3_connection->server.count_new_urg)
聽聽聽{
聽聽聽聽printf("----------------------------------------\n");
聽聽聽聽strcpy(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.saddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.source);
聽聽聽聽strcat(address_string, " urgent----> ");
聽聽聽聽strcat(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.daddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.dest);
聽聽聽聽strcat(address_string,"\n");
聽聽聽聽address_string[strlen(address_string)+1] = 0;
聽聽聽聽address_string[strlen(address_string)] = pop3_connection->server.urgdata;
聽聽聽聽printf("%s",address_string);
聽聽聽聽return;
聽聽聽}
聽聽聽if (pop3_connection->client.count_new_urg)
聽聽聽{
聽聽聽聽printf("----------------------------------------\n");
聽聽聽聽strcpy(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.saddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.source);
聽聽聽聽strcat(address_string, " <------urgent");
聽聽聽聽strcat(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.daddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.dest);
聽聽聽聽strcat(address_string,"\n");
聽聽聽聽address_string[strlen(address_string)+1] = 0;
聽聽聽聽address_string[strlen(address_string)] = pop3_connection->server.urgdata;
聽聽聽聽printf("%s",address_string);
聽聽聽聽return;
聽聽聽}
聽聽聽if (pop3_connection->client.count_new)
聽聽聽{
聽聽聽聽hlf = &pop3_connection->client;
聽聽聽聽strcpy(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.saddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.source);
聽聽聽聽strcat(address_string, " <-----");
聽聽聽聽strcat(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.daddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.dest);
聽聽聽聽strcat(address_string,"\n");
聽聽聽聽printf("----------------------------------------\n");
聽聽聽聽printf("%s",address_string);
聽聽聽聽memcpy(content, hlf->data, hlf->count_new);
聽聽聽聽content[hlf->count_new] = '\0';
聽聽聽聽if (strstr(strncpy(status_code,content,4),"+OK"))
聽聽聽聽聽printf("鎿嶄綔鎴愬姛\n");
聽聽聽聽if (strstr(strncpy(status_code,content,4),"-ERR"))
聽聽聽聽聽printf("鎿嶄綔澶辮觸\n");
聽聽聽聽for(i = 0;i<hlf->count_new;i++)
聽聽聽聽{
聽聽聽聽聽printf("%s",char_to_ascii(content[i]));
聽聽聽聽}
聽聽聽聽printf("\n");
聽聽聽聽if (strstr(content,"\n\r.\n\r"))
聽聽聽聽聽printf("鏁版嵁浼犺緭緇撴潫\n");
聽聽聽}
聽聽聽else
聽聽聽{
聽聽聽聽hlf = &pop3_connection->server;
聽聽聽聽strcpy(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.saddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.source);
聽聽聽聽strcat(address_string, " <-----");
聽聽聽聽strcat(address_string, inet_ntoa(*((struct in_addr*)&(ip_and_port.daddr))));
聽聽聽聽sprintf(address_string+strlen(address_string),": %i",ip_and_port.dest);
聽聽聽聽strcat(address_string,"\n");
聽聽聽聽printf("----------------------------------------\n");
聽聽聽聽printf("%s",address_string);
聽聽聽聽memcpy(content, hlf->data, hlf->count_new);
聽聽聽聽content[hlf->count_new] = '\0';
聽聽聽聽if(strstr(content, "USER"))
聽聽聽聽聽printf("閭歡鐢ㄦ埛鍚嶄負\n");
聽聽聽聽if(strstr(content, "PASS"))
聽聽聽聽聽printf("鐢ㄦ埛瀵嗙爜涓篭n");
聽聽聽聽if(strstr(content, "STAT"))
聽聽聽聽聽printf("榪斿洖緇熻璧勬枡\n");
聽聽聽聽if(strstr(content, "LIST"))
聽聽聽聽聽printf("榪斿洖閭歡鏁伴噺鍜屽ぇ灝廫n");
聽聽聽聽if(strstr(content, "RETR"))
聽聽聽聽聽printf("鑾峰彇閭歡\n");
聽聽聽聽if(strstr(content, "DELE"))
聽聽聽聽聽printf("鍒犻櫎閭歡\n");
聽聽聽聽if(strstr(content, "QUIT"))
聽聽聽聽聽printf("閫鍑鴻繛鎺n");

聽聽聽聽for(i = 0;i<hlf->count_new;i++)
聽聽聽聽{
聽聽聽聽聽printf("%s",char_to_ascii(content[i]));
聽聽聽聽}
聽聽聽聽printf("\n");
聽聽聽}
聽聽}
聽default:
聽聽break;
聽}
聽return ;
}
int main(int argc, char **argv)
{
聽if(!nids_init())
聽{
聽聽printf("鍑虹幇閿欒: %s\n", nids_errbuf);
聽聽exit(1);
聽}

聽nids_register_tcp(pop3_protocol_callback);
聽nids_run();
聽return 0;
}



JeromeWen 2006-09-29 13:07 鍙戣〃璇勮
]]>
Nids.h璇︾粏娉ㄩ噴 http://www.shnenglu.com/jeromewen/archive/2006/09/29/13138.htmlJeromeWenJeromeWenFri, 29 Sep 2006 04:31:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13138.htmlhttp://www.shnenglu.com/jeromewen/comments/13138.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13138.html#Feedback4http://www.shnenglu.com/jeromewen/comments/commentRss/13138.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/13138.html闃呰鍏ㄦ枃

JeromeWen 2006-09-29 12:31 鍙戣〃璇勮
]]>
LIBNIDS緙栬瘧閿欒瑙e喅鏂規 http://www.shnenglu.com/jeromewen/archive/2006/09/29/13137.htmlJeromeWenJeromeWenFri, 29 Sep 2006 04:30:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13137.htmlhttp://www.shnenglu.com/jeromewen/comments/13137.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/09/29/13137.html#Feedback2http://www.shnenglu.com/jeromewen/comments/commentRss/13137.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/13137.html 1.聽聽聽聽聽聽 error LNK2019: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?span lang="EN-US"> _inet_ntoa@4 錛岃絎﹀彿鍦ㄥ嚱鏁?span lang="EN-US"> _adres 涓寮曠敤

闇瑕佸姞鍏?/span> ws2_32.lib

2.聽聽聽聽聽聽 error LNK2019: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?span lang="EN-US"> "int __cdecl nids_init(void)" (?nids_init@@YAHXZ) 錛岃絎﹀彿鍦ㄥ嚱鏁?span lang="EN-US"> _main 涓寮曠敤

鏀瑰啓 nids.h

鍦ㄥ嚱鏁板墠鍔犲叆

#ifdef __cplusplus

extern "C"

{

#endif

鍦ㄥ嚱鏁板悗鍔犲叆

#ifdef __cplusplus

}

#endif

3.聽聽聽聽聽聽聽聽 libnids.lib(libnids.obj) : error LNK2019: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?/span> _pcap_datalink 錛岃絎﹀彿鍦ㄥ嚱鏁?/span> _nids_init 涓寮曠敤銆傘傘傘傘傘傘傘傘傘傘傘?/span>

闇瑕佸姞鍏?/span> wpcap.lib

4.聽聽聽聽聽聽聽聽 LIBCMT.lib(close.obj) : error LNK2005: __close 宸茬粡鍦?/span> LIBCD.lib(close.obj) 涓畾涔夈傘傘傘傘傘傘傘傘?/span>

瑙e喅鏂規灞炴?/span> - 銆夐摼鎺ュ櫒 - 銆夎緭鍏?/span> - 銆夊拷鐣ユ寚瀹氬簱 LIBCMT.lib 鑰屼笉鏄?/span> LIBCD.lib

Libcd.lib 涓?/span> DEBUG 鐗堟湰 libc.lib 涓?/span> Release 鐗堟湰寰?/span>

5.聽聽聽聽聽聽聽 error LNK2019: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?span lang="EN-US"> _nids_run 錛岃絎﹀彿鍦ㄥ嚱鏁?span lang="EN-US"> _main 涓寮曠敤

闇瑕佸姞鍏?/span> libnids.lib

6.聽聽聽聽聽聽聽聽 error LNK2001: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?span lang="EN-US"> "char * nids_errbuf" (?nids_errbuf@@3PADA)

浠呭嚭鐜版閿欒鐨勬椂鍊欏弬鑰冧竴涓嬪唴瀹?/span>

C 錛嬶紜 鐨勫叏灞甯擱噺鍙湁闈欐佽繛鎺ユц兘銆傝繖涓嶅悓浜?/span> C 錛屽鏋滆瘯鍥懼湪 C 錛嬶紜鐨勫涓枃浠跺唴浣跨敤鍏ㄥ眬鍙橀噺涔熶細浜х敓 LNK2001 閿欒銆?/span>

l聽聽聽聽聽聽聽聽 涓縐嶈В鍐崇殑鏂規硶鏄渶瑕佹椂鍦ㄥご鏂囦歡涓姞鍏ヨ甯擱噺鐨勫垵濮嬪寲浠g爜錛屽茍鍦?/span> .CPP 鏂囦歡涓寘鍚澶存枃浠訛紱

l聽聽聽聽聽聽聽聽 鍙︿竴縐嶆柟娉曟槸浣跨敤鏃剁粰璇ュ彉閲忚祴浠ュ父鏁般?/span>

鏀瑰啓 nids.h

extern char nids_errbuf[]="";

7.聽聽聽聽聽聽聽聽 error LNK2001: 鏃犳硶瑙f瀽鐨勫閮ㄧ鍙?span lang="EN-US"> "struct nids_prm nids_params" (?nids_params@@3Unids_prm@@A)

闇瑕佸湪婧愮爜鏂囦歡涓姞鍏?/span> struct nids_prm nids_params;

鎬葷粨濡備笅 :

鍦ㄤ唬鐮佷腑鍔犲叆

#pragma comment(lib," ws2_32 ")

#pragma comment(lib," libnids ")

#pragma comment(lib," wpcap ")

灞炴?span lang="EN-US">->榪炴帴鍣?span lang="EN-US">->鍛戒護琛?span lang="EN-US">

鍔犲叆

ws2_32.lib libnids.lib wpcap.lib /verbose:lib /NODEFAULTLIB:libcpd.lib /NODEFAULTLIB:LIBCMT.lib



JeromeWen 2006-09-29 12:30 鍙戣〃璇勮
]]>
gmake涓嬭澆鍦板潃http://www.shnenglu.com/jeromewen/archive/2006/09/18/12679.htmlJeromeWenJeromeWenMon, 18 Sep 2006 05:51:00 GMThttp://www.shnenglu.com/jeromewen/archive/2006/09/18/12679.htmlhttp://www.shnenglu.com/jeromewen/comments/12679.htmlhttp://www.shnenglu.com/jeromewen/archive/2006/09/18/12679.html#Feedback6http://www.shnenglu.com/jeromewen/comments/commentRss/12679.htmlhttp://www.shnenglu.com/jeromewen/services/trackbacks/12679.html ftp://ftp.gnu.org/pub/gnu/make/make-3.80.tar.gz

./configure --prefix=/usr &&
make &&
make install &&
chgrp root /usr/bin/make &&
chmod 755 /usr/bin/make



JeromeWen 2006-09-18 13:51 鍙戣〃璇勮
]]>
久久久久亚洲AV无码去区首| 中文无码久久精品| 久久国产精品99国产精| 亚洲国产视频久久| 无码任你躁久久久久久老妇App| 欧美色综合久久久久久| 久久九色综合九色99伊人| 伊人久久精品线影院| 成人精品一区二区久久| 伊人久久综合热线大杳蕉下载| 2021国产成人精品久久| 国产精品女同一区二区久久| 国产精品成人99久久久久 | 日本精品久久久久影院日本| 国产亚洲成人久久| 久久笫一福利免费导航 | 久久久久亚洲av成人无码电影| 精品久久久久中文字| 伊人伊成久久人综合网777| 亚洲婷婷国产精品电影人久久| 久久久久久久久久久久久久| 欧美黑人激情性久久| 久久精品亚洲中文字幕无码麻豆| 99久久人妻无码精品系列| 97久久精品人人做人人爽| 中文精品99久久国产 | 日本强好片久久久久久AAA| 久久这里只有精品18| 品成人欧美大片久久国产欧美...| 久久久久女教师免费一区| 国产A级毛片久久久精品毛片| 国产成人精品久久免费动漫| 久久亚洲国产成人精品无码区| 亚洲AV日韩精品久久久久久久| 日本精品久久久久中文字幕8| 久久久久久免费视频| 色综合久久综精品| 久久久久亚洲精品天堂| 色青青草原桃花久久综合| 91精品久久久久久无码| 伊人久久大香线蕉综合Av|