syscall
美
英 
- 網(wǎng)絡(luò)系統(tǒng)調(diào)用;系統(tǒng)調(diào)用提供器;測(cè)試一個(gè)系統(tǒng)調(diào)用
例句
Essentially any tool that could be used for detecting such a rootkit is susceptible to false results due to syscall hijacking.
基本上任何可能被這樣的rootkit檢測(cè)工具易于使用,由于系統(tǒng)調(diào)用劫持錯(cuò)誤的結(jié)果。
Upon return from the system call, syscall_exit is eventually reached, and a call to resume_userspace transitions back to user-space.
從系統(tǒng)調(diào)用中返回后,最終執(zhí)行syscall_exit,并調(diào)用resume_userspace返回用戶空間。
As you can see, the syscall function includes as its first argument the index of the system call table to use.
正如您所見(jiàn),syscall函數(shù)使用了系統(tǒng)調(diào)用表中使用的索引作為第一個(gè)參數(shù)。
Under UNIX, calling the kernel consists of an operation known as a syscall or trap.
UNIX下的內(nèi)核調(diào)用由所謂的syscall或者trap操作構(gòu)成。
With the syscall function, you can call a system call by specifying its call index and a set of arguments.
使用syscall函數(shù),您可以通過(guò)指定它的調(diào)用索引和一組參數(shù)來(lái)調(diào)用系統(tǒng)調(diào)用。
Keep in mind the original 7 bytes are saved and copied back into the original syscall so that it may be called within the evil syscall.
請(qǐng)記住原來(lái)的7個(gè)字節(jié)保存和復(fù)制到原來(lái)的系統(tǒng)調(diào)用,以便它可能在邪惡的系統(tǒng)調(diào)用回調(diào)。
Listing 6 shows an application that uses each of your system calls as defined by the _syscall macros.
清單6顯示的應(yīng)用程序使用了_syscall宏定義的所有系統(tǒng)調(diào)用。
With the first method, you call your new functions as identified by their index through the syscall function.
使用第一種方法,您可以通過(guò)syscall函數(shù)調(diào)用由其索引所標(biāo)識(shí)的新函數(shù)。
In the end, the syscall interface provides the means to transfer control between the user-space application and the kernel.
最后,系統(tǒng)調(diào)用接口提供了在用戶空間應(yīng)用程序和內(nèi)核之間轉(zhuǎn)移控制的方法。
A blocking syscall, like a read will only return once data is available.
阻塞的系統(tǒng)調(diào)用,就拿讀取來(lái)說(shuō),直到數(shù)據(jù)準(zhǔn)備好的時(shí)候才會(huì)返回。
The syscall function is architecture specific but uses a mechanism to transfer control to the kernel.
syscall函數(shù)特定于架構(gòu),使用一種機(jī)制將控制權(quán)交給內(nèi)核。
The request_key syscall searches a process keyring for a key.
request_key系統(tǒng)調(diào)用搜索一個(gè)進(jìn)程keyring,尋找一個(gè)密鑰。
Note also that the input (syscall number) is consumed (used) before the output (the return value of syscall) is produced.
另請(qǐng)注意,輸入(syscall號(hào))在產(chǎn)生輸出(syscall的返回值)之前被消耗(使用)。
With syscall probes, the input arguments and return values are available to the VUE script.
通過(guò)使用系統(tǒng)調(diào)用探測(cè),可以在VUE腳本中使用輸入參數(shù)和返回值。
Now, here's how you use the _syscall macros to make your new system calls visible to the user-space.
現(xiàn)在,讓我們來(lái)看一下如何使用_syscall宏來(lái)使新系統(tǒng)調(diào)用對(duì)于用戶空間可見(jiàn)。
Syscall hijack is one way that we talk about in our other paper and also the Syscall modification too.
系統(tǒng)調(diào)用劫持是一種方法,我們談?wù)?/c>我們的其他文件,并修改過(guò)的系統(tǒng)調(diào)用。
Finally, the syscall keyctl provides a number of functions for managing keys.
最后,系統(tǒng)調(diào)用keyctl提供許多用來(lái)管理密鑰的函數(shù)。
The add_key syscall is used to create keys of type type and length plen.
add_key系統(tǒng)調(diào)用用來(lái)創(chuàng)建類型為type、長(zhǎng)度為plen的密鑰。
For example, the mnkod(2) syscall is implemented by creating a plain file, then recording the requested file type in the pseudo database.
例如,mnkod(2)系統(tǒng)調(diào)用是通過(guò)創(chuàng)建一個(gè)純文本文件來(lái)實(shí)現(xiàn),然后在pseudo數(shù)據(jù)庫(kù)中記錄所請(qǐng)求的文件類型。
Next, you have a syscall probe.
接下來(lái)是一個(gè)syscall探針。
Research on Syscall-based Intrusion Detection Technology for Linux System
基于系統(tǒng)調(diào)用的Linux系統(tǒng)入侵檢測(cè)技術(shù)研究
Markov Chain Model of Syscall-based Intrusion Detection
基于系統(tǒng)調(diào)用入侵檢測(cè)的馬氏鏈模型
Make syscall that fails convert to common error code return common error code decide execution based on common error code
如果考慮到將平臺(tái)相關(guān)的錯(cuò)誤碼轉(zhuǎn)換為通用的錯(cuò)誤碼,那么上面的代碼段可以修改為如下
Listing 1: Sample syscall ProbeVue script
清單1:系統(tǒng)調(diào)用ProbeVue腳本示例