亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ptrace.c

?? LINUX1.0源代碼,代碼條理清晰
?? C
字號(hào):
/* ptrace.c */
/* By Ross Biro 1/23/92 */
/* edited by Linus Torvalds */

#include <linux/head.h>
#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/mm.h>
#include <linux/errno.h>
#include <linux/ptrace.h>
#include <linux/user.h>

#include <asm/segment.h>
#include <asm/system.h>
#include <linux/debugreg.h>

/*
 * does not yet catch signals sent when the child dies.
 * in exit.c or in signal.c.
 */

/* determines which flags the user has access to. */
/* 1 = access 0 = no access */
#define FLAG_MASK 0x00044dd5

/* set's the trap flag. */
#define TRAP_FLAG 0x100

/*
 * this is the number to subtract from the top of the stack. To find
 * the local frame.
 */
#define MAGICNUMBER 68

/* change a pid into a task struct. */
static inline struct task_struct * get_task(int pid)
{
	int i;

	for (i = 1; i < NR_TASKS; i++) {
		if (task[i] != NULL && (task[i]->pid == pid))
			return task[i];
	}
	return NULL;
}

/*
 * this routine will get a word off of the processes priviledged stack. 
 * the offset is how far from the base addr as stored in the TSS.  
 * this routine assumes that all the priviledged stacks are in our
 * data space.
 */   
static inline int get_stack_long(struct task_struct *task, int offset)
{
	unsigned char *stack;

	stack = (unsigned char *)task->tss.esp0;
	stack += offset;
	return (*((int *)stack));
}

/*
 * this routine will put a word on the processes priviledged stack. 
 * the offset is how far from the base addr as stored in the TSS.  
 * this routine assumes that all the priviledged stacks are in our
 * data space.
 */
static inline int put_stack_long(struct task_struct *task, int offset,
	unsigned long data)
{
	unsigned char * stack;

	stack = (unsigned char *) task->tss.esp0;
	stack += offset;
	*(unsigned long *) stack = data;
	return 0;
}

/*
 * This routine gets a long from any process space by following the page
 * tables. NOTE! You should check that the long isn't on a page boundary,
 * and that it is in the task area before calling this: this routine does
 * no checking.
 *
 * NOTE2! This uses "tsk->tss.cr3" even though we know it's currently always
 * zero. This routine shouldn't have to change when we make a better mm.
 */
static unsigned long get_long(struct task_struct * tsk,
	unsigned long addr)
{
	unsigned long page;

repeat:
	page = *PAGE_DIR_OFFSET(tsk->tss.cr3,addr);
	if (page & PAGE_PRESENT) {
		page &= PAGE_MASK;
		page += PAGE_PTR(addr);
		page = *((unsigned long *) page);
	}
	if (!(page & PAGE_PRESENT)) {
		do_no_page(0,addr,tsk,0);
		goto repeat;
	}
/* this is a hack for non-kernel-mapped video buffers and similar */
	if (page >= high_memory)
		return 0;
	page &= PAGE_MASK;
	page += addr & ~PAGE_MASK;
	return *(unsigned long *) page;
}

/*
 * This routine puts a long into any process space by following the page
 * tables. NOTE! You should check that the long isn't on a page boundary,
 * and that it is in the task area before calling this: this routine does
 * no checking.
 *
 * Now keeps R/W state of page so that a text page stays readonly
 * even if a debugger scribbles breakpoints into it.  -M.U-
 */
static void put_long(struct task_struct * tsk, unsigned long addr,
	unsigned long data)
{
	unsigned long page, pte = 0;
	int readonly = 0;

repeat:
	page = *PAGE_DIR_OFFSET(tsk->tss.cr3,addr);
	if (page & PAGE_PRESENT) {
		page &= PAGE_MASK;
		page += PAGE_PTR(addr);
		pte = page;
		page = *((unsigned long *) page);
	}
	if (!(page & PAGE_PRESENT)) {
		do_no_page(0 /* PAGE_RW */ ,addr,tsk,0);
		goto repeat;
	}
	if (!(page & PAGE_RW)) {
		if(!(page & PAGE_COW))
			readonly = 1;
		do_wp_page(PAGE_RW | PAGE_PRESENT,addr,tsk,0);
		goto repeat;
	}
/* this is a hack for non-kernel-mapped video buffers and similar */
	if (page >= high_memory)
		return;
/* we're bypassing pagetables, so we have to set the dirty bit ourselves */
	*(unsigned long *) pte |= (PAGE_DIRTY|PAGE_COW);
	page &= PAGE_MASK;
	page += addr & ~PAGE_MASK;
	*(unsigned long *) page = data;
	if(readonly) {
		*(unsigned long *) pte &=~ (PAGE_RW|PAGE_COW);
		invalidate();
	} 
}

/*
 * This routine checks the page boundaries, and that the offset is
 * within the task area. It then calls get_long() to read a long.
 */
static int read_long(struct task_struct * tsk, unsigned long addr,
	unsigned long * result)
{
	unsigned long low,high;

	if (addr > TASK_SIZE-sizeof(long))
		return -EIO;
	if ((addr & ~PAGE_MASK) > PAGE_SIZE-sizeof(long)) {
		low = get_long(tsk,addr & ~(sizeof(long)-1));
		high = get_long(tsk,(addr+sizeof(long)) & ~(sizeof(long)-1));
		switch (addr & (sizeof(long)-1)) {
			case 1:
				low >>= 8;
				low |= high << 24;
				break;
			case 2:
				low >>= 16;
				low |= high << 16;
				break;
			case 3:
				low >>= 24;
				low |= high << 8;
				break;
		}
		*result = low;
	} else
		*result = get_long(tsk,addr);
	return 0;
}

/*
 * This routine checks the page boundaries, and that the offset is
 * within the task area. It then calls put_long() to write a long.
 */
static int write_long(struct task_struct * tsk, unsigned long addr,
	unsigned long data)
{
	unsigned long low,high;

	if (addr > TASK_SIZE-sizeof(long))
		return -EIO;
	if ((addr & ~PAGE_MASK) > PAGE_SIZE-sizeof(long)) {
		low = get_long(tsk,addr & ~(sizeof(long)-1));
		high = get_long(tsk,(addr+sizeof(long)) & ~(sizeof(long)-1));
		switch (addr & (sizeof(long)-1)) {
			case 0: /* shouldn't happen, but safety first */
				low = data;
				break;
			case 1:
				low &= 0x000000ff;
				low |= data << 8;
				high &= ~0xff;
				high |= data >> 24;
				break;
			case 2:
				low &= 0x0000ffff;
				low |= data << 16;
				high &= ~0xffff;
				high |= data >> 16;
				break;
			case 3:
				low &= 0x00ffffff;
				low |= data << 24;
				high &= ~0xffffff;
				high |= data >> 8;
				break;
		}
		put_long(tsk,addr & ~(sizeof(long)-1),low);
		put_long(tsk,(addr+sizeof(long)) & ~(sizeof(long)-1),high);
	} else
		put_long(tsk,addr,data);
	return 0;
}

asmlinkage int sys_ptrace(long request, long pid, long addr, long data)
{
	struct task_struct *child;
	struct user * dummy;
	int i;

	dummy = NULL;

	if (request == PTRACE_TRACEME) {
		/* are we already being traced? */
		if (current->flags & PF_PTRACED)
			return -EPERM;
		/* set the ptrace bit in the proccess flags. */
		current->flags |= PF_PTRACED;
		return 0;
	}
	if (pid == 1)		/* you may not mess with init */
		return -EPERM;
	if (!(child = get_task(pid)))
		return -ESRCH;
	if (request == PTRACE_ATTACH) {
		if (child == current)
			return -EPERM;
		if ((!child->dumpable || (current->uid != child->euid) ||
	 	    (current->gid != child->egid)) && !suser())
			return -EPERM;
		/* the same process cannot be attached many times */
		if (child->flags & PF_PTRACED)
			return -EPERM;
		child->flags |= PF_PTRACED;
		if (child->p_pptr != current) {
			REMOVE_LINKS(child);
			child->p_pptr = current;
			SET_LINKS(child);
		}
		send_sig(SIGSTOP, child, 1);
		return 0;
	}
	if (!(child->flags & PF_PTRACED))
		return -ESRCH;
	if (child->state != TASK_STOPPED) {
		if (request != PTRACE_KILL)
			return -ESRCH;
	}
	if (child->p_pptr != current)
		return -ESRCH;

	switch (request) {
	/* when I and D space are seperate, these will need to be fixed. */
		case PTRACE_PEEKTEXT: /* read word at location addr. */ 
		case PTRACE_PEEKDATA: {
			unsigned long tmp;
			int res;

			res = read_long(child, addr, &tmp);
			if (res < 0)
				return res;
			res = verify_area(VERIFY_WRITE, (void *) data, sizeof(long));
			if (!res)
				put_fs_long(tmp,(unsigned long *) data);
			return res;
		}

	/* read the word at location addr in the USER area. */
		case PTRACE_PEEKUSR: {
			unsigned long tmp;
			int res;

			if ((addr & 3) || addr < 0 || 
			    addr > sizeof(struct user) - 3)
				return -EIO;

			res = verify_area(VERIFY_WRITE, (void *) data, sizeof(long));
			if (res)
				return res;
			tmp = 0;  /* Default return condition */
			if(addr < 17*sizeof(long)) {
			  addr = addr >> 2; /* temporary hack. */

			  tmp = get_stack_long(child, sizeof(long)*addr - MAGICNUMBER);
			  if (addr == DS || addr == ES ||
			      addr == FS || addr == GS ||
			      addr == CS || addr == SS)
			    tmp &= 0xffff;
			};
			if(addr >= (long) &dummy->u_debugreg[0] &&
			   addr <= (long) &dummy->u_debugreg[7]){
				addr -= (long) &dummy->u_debugreg[0];
				addr = addr >> 2;
				tmp = child->debugreg[addr];
			};
			put_fs_long(tmp,(unsigned long *) data);
			return 0;
		}

      /* when I and D space are seperate, this will have to be fixed. */
		case PTRACE_POKETEXT: /* write the word at location addr. */
		case PTRACE_POKEDATA:
			return write_long(child,addr,data);

		case PTRACE_POKEUSR: /* write the word at location addr in the USER area */
			if ((addr & 3) || addr < 0 || 
			    addr > sizeof(struct user) - 3)
				return -EIO;

			addr = addr >> 2; /* temproary hack. */

			if (addr == ORIG_EAX)
				return -EIO;
			if (addr == DS || addr == ES ||
			    addr == FS || addr == GS ||
			    addr == CS || addr == SS) {
			    	data &= 0xffff;
			    	if (data && (data & 3) != 3)
					return -EIO;
			}
			if (addr == EFL) {   /* flags. */
				data &= FLAG_MASK;
				data |= get_stack_long(child, EFL*sizeof(long)-MAGICNUMBER)  & ~FLAG_MASK;
			}
		  /* Do not allow the user to set the debug register for kernel
		     address space */
		  if(addr < 17){
			  if (put_stack_long(child, sizeof(long)*addr-MAGICNUMBER, data))
				return -EIO;
			return 0;
			};

		  /* We need to be very careful here.  We implicitly
		     want to modify a portion of the task_struct, and we
		     have to be selective about what portions we allow someone
		     to modify. */

		  addr = addr << 2;  /* Convert back again */
		  if(addr >= (long) &dummy->u_debugreg[0] &&
		     addr <= (long) &dummy->u_debugreg[7]){

			  if(addr == (long) &dummy->u_debugreg[4]) return -EIO;
			  if(addr == (long) &dummy->u_debugreg[5]) return -EIO;
			  if(addr < (long) &dummy->u_debugreg[4] &&
			     ((unsigned long) data) >= 0xbffffffd) return -EIO;
			  
			  if(addr == (long) &dummy->u_debugreg[7]) {
				  data &= ~DR_CONTROL_RESERVED;
				  for(i=0; i<4; i++)
					  if ((0x5f54 >> ((data >> (16 + 4*i)) & 0xf)) & 1)
						  return -EIO;
			  };

			  addr -= (long) &dummy->u_debugreg;
			  addr = addr >> 2;
			  child->debugreg[addr] = data;
			  return 0;
		  };
		  return -EIO;

		case PTRACE_SYSCALL: /* continue and stop at next (return from) syscall */
		case PTRACE_CONT: { /* restart after signal. */
			long tmp;

			if ((unsigned long) data > NSIG)
				return -EIO;
			if (request == PTRACE_SYSCALL)
				child->flags |= PF_TRACESYS;
			else
				child->flags &= ~PF_TRACESYS;
			child->exit_code = data;
			child->state = TASK_RUNNING;
	/* make sure the single step bit is not set. */
			tmp = get_stack_long(child, sizeof(long)*EFL-MAGICNUMBER) & ~TRAP_FLAG;
			put_stack_long(child, sizeof(long)*EFL-MAGICNUMBER,tmp);
			return 0;
		}

/*
 * make the child exit.  Best I can do is send it a sigkill. 
 * perhaps it should be put in the status that it want's to 
 * exit.
 */
		case PTRACE_KILL: {
			long tmp;

			child->state = TASK_RUNNING;
			child->exit_code = SIGKILL;
	/* make sure the single step bit is not set. */
			tmp = get_stack_long(child, sizeof(long)*EFL-MAGICNUMBER) & ~TRAP_FLAG;
			put_stack_long(child, sizeof(long)*EFL-MAGICNUMBER,tmp);
			return 0;
		}

		case PTRACE_SINGLESTEP: {  /* set the trap flag. */
			long tmp;

			if ((unsigned long) data > NSIG)
				return -EIO;
			child->flags &= ~PF_TRACESYS;
			tmp = get_stack_long(child, sizeof(long)*EFL-MAGICNUMBER) | TRAP_FLAG;
			put_stack_long(child, sizeof(long)*EFL-MAGICNUMBER,tmp);
			child->state = TASK_RUNNING;
			child->exit_code = data;
	/* give it a chance to run. */
			return 0;
		}

		case PTRACE_DETACH: { /* detach a process that was attached. */
			long tmp;

			if ((unsigned long) data > NSIG)
				return -EIO;
			child->flags &= ~(PF_PTRACED|PF_TRACESYS);
			child->state = TASK_RUNNING;
			child->exit_code = data;
			REMOVE_LINKS(child);
			child->p_pptr = child->p_opptr;
			SET_LINKS(child);
			/* make sure the single step bit is not set. */
			tmp = get_stack_long(child, sizeof(long)*EFL-MAGICNUMBER) & ~TRAP_FLAG;
			put_stack_long(child, sizeof(long)*EFL-MAGICNUMBER,tmp);
			return 0;
		}

		default:
			return -EIO;
	}
}

asmlinkage void syscall_trace(void)
{
	if ((current->flags & (PF_PTRACED|PF_TRACESYS))
			!= (PF_PTRACED|PF_TRACESYS))
		return;
	current->exit_code = SIGTRAP;
	current->state = TASK_STOPPED;
	notify_parent(current);
	schedule();
	/*
	 * this isn't the same as continuing with a signal, but it will do
	 * for normal use.  strace only continues with a signal if the
	 * stopping signal is not SIGTRAP.  -brl
	 */
	if (current->exit_code)
		current->signal |= (1 << (current->exit_code - 1));
	current->exit_code = 0;
}

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区在线免费观看| 一区二区三区在线观看国产| 99视频精品免费视频| 午夜欧美大尺度福利影院在线看| 久久精品这里都是精品| 欧美精品第1页| 色哟哟日韩精品| 国产a级毛片一区| 日韩av高清在线观看| 亚洲男女一区二区三区| 国产片一区二区| 欧美成人精品福利| 欧美日韩情趣电影| 91免费看视频| 国产91精品一区二区| 狂野欧美性猛交blacked| 午夜视频在线观看一区二区三区| 18欧美亚洲精品| 国产精品网站一区| 久久久影视传媒| 欧美mv日韩mv| 日韩一级大片在线| 欧美日韩综合在线免费观看| 91九色02白丝porn| 91蜜桃免费观看视频| 成人福利视频网站| 国产麻豆9l精品三级站| 韩国午夜理伦三级不卡影院| 日韩和欧美一区二区三区| 亚洲午夜一二三区视频| 亚洲另类春色校园小说| 亚洲欧美另类小说视频| 国产精品第四页| 国产精品久久久久影院亚瑟| 国产精品丝袜一区| 国产三级精品三级| 国产精品午夜在线| 日韩精品视频网| 亚洲大尺度视频在线观看| 亚洲精品免费在线播放| 国产精品久久看| 中文字幕在线视频一区| 国产精品福利一区二区三区| 亚洲婷婷在线视频| 亚洲精品亚洲人成人网在线播放| 亚洲欧美国产毛片在线| 亚洲精选一二三| 亚洲制服丝袜一区| 天天综合日日夜夜精品| 日本伊人午夜精品| 国产自产v一区二区三区c| 国产精品自拍一区| 大尺度一区二区| 日本韩国一区二区三区视频| 在线观看亚洲一区| 日韩三级.com| 久久无码av三级| 国产精品嫩草影院com| 亚洲精品成人精品456| 五月婷婷综合激情| 精品一区二区免费看| 丁香婷婷综合五月| 欧美在线观看你懂的| 欧美电影免费提供在线观看| 国产夜色精品一区二区av| 自拍偷拍亚洲激情| 日韩精品一区第一页| 国产精品一二三四五| 色菇凉天天综合网| 日韩欧美一级精品久久| 久久精品人人做| 亚洲一区二区偷拍精品| 麻豆精品国产传媒mv男同| 成人免费高清视频| 欧美二区乱c少妇| 国产欧美一区二区精品仙草咪| 一区二区三区中文在线观看| 裸体歌舞表演一区二区| 成人h精品动漫一区二区三区| 欧美性色欧美a在线播放| 精品福利视频一区二区三区| 自拍偷拍亚洲激情| 美女视频黄免费的久久 | 欧美丰满嫩嫩电影| 久久婷婷综合激情| 亚洲影院理伦片| 国内精品国产成人国产三级粉色| 色综合久久久久久久| 精品国产乱码久久久久久久| 亚洲视频一二区| 国模一区二区三区白浆| 欧美午夜精品久久久久久超碰 | 成人永久免费视频| 91麻豆精品国产无毒不卡在线观看| 久久久久99精品国产片| 亚洲国产成人91porn| 成人精品国产免费网站| 日韩色视频在线观看| 一区二区在线观看av| 国产精品自产自拍| 5858s免费视频成人| 亚洲欧美电影一区二区| 国产黄色精品网站| 有码一区二区三区| 国内精品伊人久久久久av一坑| 欧美日韩国产影片| 亚洲欧洲av在线| 国产麻豆视频一区二区| 日韩欧美视频一区| 三级不卡在线观看| 欧美在线免费观看视频| 亚洲视频一二三| 丁香另类激情小说| 国产亚洲精品精华液| 免费高清在线一区| 这里只有精品视频在线观看| 亚洲精品中文在线影院| eeuss鲁一区二区三区| 国产亚洲一区二区三区四区| 韩国一区二区在线观看| 欧美v国产在线一区二区三区| 日本aⅴ亚洲精品中文乱码| 欧美视频第二页| 亚洲一区二三区| 欧美最新大片在线看| 一区二区三区色| 日本二三区不卡| 亚洲黄色小视频| 色欧美88888久久久久久影院| 亚洲欧美一区二区三区孕妇| 不卡视频免费播放| 国产精品伦理在线| 成人免费观看视频| 亚洲区小说区图片区qvod| 91视频.com| 亚洲国产wwwccc36天堂| 欧美片网站yy| 免费成人在线视频观看| 精品久久久久久久一区二区蜜臀| 久久狠狠亚洲综合| 久久免费看少妇高潮| 成人一区在线看| 亚洲精品精品亚洲| 欧美亚洲动漫精品| 日韩黄色免费网站| 精品99999| 国产98色在线|日韩| 国产精品久久久久影院亚瑟 | 99久久精品国产麻豆演员表| 1024亚洲合集| 欧美日韩一区二区三区在线| 日韩 欧美一区二区三区| 精品国产一区二区在线观看| 国产成人av一区| 亚洲精品国产第一综合99久久 | 欧美一卡2卡3卡4卡| 蜜桃视频免费观看一区| 国产亚洲成年网址在线观看| 国产91精品露脸国语对白| 中文字幕一区免费在线观看| 欧美色窝79yyyycom| 精品伊人久久久久7777人| 国产精品无人区| 欧美日韩一本到| 国产做a爰片久久毛片| 亚洲欧洲成人自拍| 91精品国产福利在线观看| 国产麻豆精品久久一二三| 亚洲精品免费在线播放| 欧美一级xxx| 成人av电影免费在线播放| 亚洲一二三专区| 久久综合久久综合九色| 91麻豆精品在线观看| 免费高清在线视频一区·| 国产精品国产自产拍高清av王其| 欧美日韩精品一区视频| 国产白丝精品91爽爽久久 | 欧美精品xxxxbbbb| 激情图片小说一区| 一区二区三区资源| 精品国产伦理网| 91黄色免费版| 国产综合一区二区| 亚洲成av人影院| 国产精品午夜免费| 欧美一区二区网站| 91一区二区三区在线播放| 秋霞成人午夜伦在线观看| 亚洲欧洲99久久| 精品国产一区二区三区忘忧草| 色综合久久久久| 国产999精品久久久久久| 三级久久三级久久久| |精品福利一区二区三区| 久久久精品2019中文字幕之3| 久久国产成人午夜av影院| 亚洲欧美电影一区二区| 久久久美女艺术照精彩视频福利播放| 欧美性大战久久久|