如果你把AFD . SYS的缓冲关闭,当应用程序收发数据时,应用程序缓冲区的所有页面将被锁定到物理内存中。
Whenever an application posts a send or receive, and AFD.SYS's buffering is disabled, all pages in the buffer are locked into physical memory.
本文中这个程序中的函数都是每次对整个缓冲区进行操作的。
The functions in the programs in this article operate on whole buffers at a time.
在这个程序中,以这种方式执行缓冲区处理并不会显著影响执行时间,而对于某些数据集,可能有消极影响。
In this particular program, doing buffer handling in this way does not affect the execution time significantly, and in some data sets, affects it negatively.
这会将所有传输逻辑全部放入 MFC 中,并让程序可以在缓冲区等待新数据的同时自由地执行其他计算任务。
This puts all of the transferring logic into the MFC, and leaves your program free to do other computational tasks while the buffer waits for new data.
如果程序传递了无效的指针值,或者如果缓冲区的长度太小会发生此错误。
This error occurs if a program passes an invalid pointer value or if the length of the buffer is too small.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
然后将每个程序的输出粘贴回缓冲区,替换原有的内容。
The output of each program is then pasted back into the buffer, replacing the original contents.
另外,这有助于缓解总线冲突问题——当总线繁忙时,程序可以处理额外的缓冲区,而不是等待总线空闲下来。
Also, this helps smooth out bus contention issues — when the bus is full, the program can process the extra buffers rather than wait for the bus to free up.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
在示例程序中,总是用4k的缓冲区读取事件数据。
In the sample program, event data is always read with a buffer of 4k.
最坏的情况是︰程序可能正发生缓冲区溢位,但根本没有任何副作用的迹像。
In the worst cases, a program may be overflowing a buffer and not showing any adverse side effects at all.
通信区包含本地客户机应用程序的消息缓冲区,这些应用程序使用共享内存与数据库服务器进行通信。
The communications portion contains the message buffers for local client applications that use shared memory to communicate with the database server.
所有这些攻击——以及其他许多攻击,都利用了一个称做为缓冲区溢出的程序缺陷。
All of these attacks — and many others — exploited a vulnerability called a buffer overflow.
这样将保护程序代码避免堆栈、缓冲区和函数指针溢出,而且全都不需重新编译。
This protects against stack, buffer, and function pointer overflows, all without recompilation.
这样做会使编写不够严谨的程序出现缓冲区溢出错误(以及所有类似隐患)。
Doing so can lead some poorly written implementations into buffer overflow errors (and all that implies).
在多线程程序中使用循环缓冲区。
诸如find这样的程序中的缓冲区溢出可能会给大量的系统带来风险。
A buffer overflow in a program such as find is likely to be a risk to a great number of systems.
一旦调用aio_complete(),驱动程序就不再拥有IOCB或者用户缓冲区了,不应该再触碰它们。
Once you have called aio_complete(), you no longer own the IOCB or the user buffer, and should not touch them again.
这些缓冲区可以是程序描述的,也可以是外部描述的。
These buffers can be program-described or externally-described.
根据设备驱动程序的不同,如果设备具有缓冲区,可能需要使用一个缓冲区的拷贝。
Depending on your device driver, you may need to have a copy of the buffers, if the device has any.
因而,下一节将概略介绍程序员在采用传统数据缓冲区管理方案时所面对的各种问题。
As such, the next section Outlines the various problems programmers currently face when they adopt a conventional data buffer management scheme.
SPE程序从输入缓冲区中读取数据,然后对数据进行处理,再将结果写入输出缓冲区中。
The SPE program reads in the input buffer, processes the data, and then writes it to the output buffer.
备份实用程序在到达磁盘之前在缓冲区中压缩数据。
The backup utility compresses the data before hitting the disk, in the buffer.
例如,对底层设备驱动程序的读写请求会通过缓冲区缓存来传递。
For example, read and write requests to the underlying device drivers migrate through the buffer cache.
现在我们应该清楚了,关闭缓冲区对于多数应用程序而言并不是什么好主意。
It should be clear by now that turning off buffering is a really bad idea for most applications.
在发生了溢出(和数据丢失)时,两个函数都不会给出简单的报告,因此如果要检测缓冲区溢出,程序员就必须做更多的工作。
Neither function gives a simple report if an overflow (and data loss) has occurred, so programmers have to do even more work if they want to detect that.
本文讨论了循环缓冲区的一些常见实现,并对多线程程序中循环缓冲区的启用机制提出了一些观点。
This article discusses common implementations for ring buffer and proposes some ideas for enabling a ring buffer mechanism in multi-threaded programs.
在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。
In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.
帧缓冲区驱动程序通常有三层。
帧缓冲区驱动程序通常有三层。
应用推荐