Once the monitoring application attempts another select() or blocking read(), those calls will return immediately since there is unread event occurrence data waiting in the buffer. 当监视应用程序试图执行另一次select()或阻塞的read()调用时,这些调用会立即返回,因为缓冲区中有未读的事件发生数据。
The return value is always the size of the combined string if no buffer overflow occurred; this makes it really easy to detect an overflow. 如果没有发生缓冲区溢出,返回值始终是组合字符串的长度;这使得检测缓冲区溢出真正变得容易了。
The SYSLOG_ACTION_READ command is used to block until log messages are available, and then return them in the provided buffer. SYSLOGACTIONREAD用于阻塞操作,直至日志消息到达后才释放该操作,然后将它们返回到所提供的缓冲区。
This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions. 这样使得操纵返回地址困难多了,但它不会阻止改变调用函数的数据的缓冲区溢出攻击。
The script can send the code to the server, have the server evaluate it, then return the results to a new buffer with an execution-time stamp. 这个脚本可以将代码发送到服务器,让服务器评估代码,然后将结果返回到一个带有执行时间戳的新缓冲区。
Mr Medvedev stopped short of promising that Russian troops would return to Russia, suggesting that Russia could maintain a sizeable force in South Ossetia and Abkhazia, and in a buffer zone several kilometres wide around the enclaves. 梅德韦杰夫未承诺俄军将撤回俄罗斯,这表明俄罗斯可在南奥塞梯、阿布哈兹以及环绕这两块分离地区的几公里宽的缓冲区内保持庞大的军事力量。
In this case, the application's buffer is locked into memory by the kernel and the send API does not return until the other end of the connection acknowledges the entire buffer. 在这样的情况下,系统内核会把应用程序的缓冲区锁定,直到接收方确认收到了整个缓冲区后send()调用才返回。
The return value is a pointer to the buffer allocated for the message. A NULL return indicates the message allocation operation failed. 返回值是为信息分配的缓冲区的指针。如果是NULL表明信息分配操作失败。
Return Write status only after firmware transmission buffer empty 只有在固件传输缓冲区空的时候才返回写入状态
Based on these information, make the attack code accepts the buffer boundary check, stack boundary check, return address check and jump instruction check, intercept attacks on the key nodes of buffer overflow attacks, enhance system dynamic security. 依据这些信息,对攻击行为执行缓冲区边界检查,栈边界检查,返回地址保护和跳转指令检查,在缓冲区溢出攻击流程的关键节点拦截攻击,增强系统运行过程中的安全性。