针对这个新函数更新系统调用表。
这就是第3个步骤,更新系统调用表。
你看,驱动程序通过修补系统调用表来挂上一个功能。
See the driver hooks a function by patching the system call table.
据报道,问题出自32位的调用模拟层没有验证调用是否存在于系统调用表中。
According to a report, the problem occurs because the 32-bit call emulation layer does not check whether the call is truly in the Syscall table.
正如您所见,syscall函数使用了系统调用表中使用的索引作为第一个参数。
As you can see, the syscall function includes as its first argument the index of the system call table to use.
对于步骤2来说,我对头文件进行了更新:在系统调用表中为这几个新函数安排空间。
For step 2, I update the header files to make room for the new functions in the system call table.
每次调用此方法,系统都需要了解何如构建表视图的任何单行。
This method is called every time the system needs to understand how to build any single row of the table view.
表2列出了用来从perl脚本中调用系统命令的Perl核心函数和操作符。
Table 2 lists Perl core functions and operators leveraged to call system commands from within a Perl script.
这个表如图2所示,使用eax中提供的索引来确定要调用该表中的哪个系统调用(sys_call _table)。
This table, shown in Figure 2, USES the index provided in eax to identify which system call to invoke from the table (sys_call_table).
操作系统不能直接地访问这个Hypervisor资源,可以使用Hypervisor调用读取全局页表、或者向全局页表写入一个新的条目。
The operating system cannot access this hypervisor resource directly, and USES hypervisor calls to read or write a new entry to the global page table.
在任何操作系统上,如果用户注册表保存在本地,WebSphereApplicationServer就需要执行本地操作系统调用,用于对底层用户注册表进行认证。
When using Local OS for any operating system as the user registry, WebSphere Application Server makes native OS calls for authentication to the underlying user registry.
当您再次使用ps查看进程表时,您将看到,对于这个进程以及它通过 fork 系统调用创建的子进程,它们的优先级都不再是缺省值。
When you look at the process table again, you'll see that the priority of this process has changed from its default as well as the child process that was forked from it (ps).
文章前面部分仿真分析通过的各种交通流情况下的基于粗集理论的模糊控制方案表在系统中离线给出,以根据实时的交通流数据查表调用。
The System may adjust the control schemes by real time traffic data, which are off-line provided by the fuzzy traffic Decision table based on Rough Sets.
该模块是以系统调用检测为核心并且结合文件监控和注册表监控功能。
This module incorporate system call anomaly detection modeling methods and monitor file systems and Registry accesses.
通过调用存储过程对安全数据库进行操作,进而实现系统的安全访问。对数据库表内的敏感信息进行加密存储,未经授权不能访问。
The system encrypts the sensitivity information in database so that there is no access without authentication in order to ensure the security access of the system.
通过调用存储过程对安全数据库进行操作,进而实现系统的安全访问。对数据库表内的敏感信息进行加密存储,未经授权不能访问。
The system encrypts the sensitivity information in database so that there is no access without authentication in order to ensure the security access of the system.
应用推荐