代码搜索:execve

找到约 549 项符合「execve」的源代码

代码结果 549
www.eeworm.com/read/136812/5857358

makefile

# # @(#)Makefile 1.1 92/07/30 SMI # # Copyright (c) 1987 by Sun Microsystems, Inc. # SRC = access.c acct.c chdir.c chmod.c chown.c chroot.c creat.c execve.c \ getgroups.c getpgrp.c kill.c link.c
www.eeworm.com/read/131315/5933855

badcref3

Thu Jul 28 15:27:15 PDT 1983 040(8) Execve(2) Fopen(3S) Fseek(3S) fIfcntlfP(2) fIfflushfP(3) fIsetitimerfP(2) fIsetrlimitfP(2) access(3F) exec(2) fclose(3s /usr/man/man3/ferror.3s /usr/man/man3/fread
www.eeworm.com/read/278507/10530939

1 truss.unixware.2.1

execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2 open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3 fxstat(2, 3, 0x0804794C) = 0 mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/408584/11380731

1 truss.unixware.2.1

execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2 open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3 fxstat(2, 3, 0x0804794C) = 0 mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/290808/3970984

1 truss.unixware.2.1

execve("./daytimetcpcli", 0x08047BA8, 0x08047BB4) argc = 2 open("/usr/lib/libsocket.so.2", O_RDONLY, 0) = 3 fxstat(2, 3, 0x0804794C) = 0 mmap(0x00000000, 4096, PROT_READ, MAP_SHARED, 3, 0) = 0xBFF9
www.eeworm.com/read/394442/8224303

c exploit1.c

char shellcode[]= // setreuid(0,0); "\x31\xc0" // xor %eax,%eax "\x31\xdb" // xor %ebx,%ebx "\x31\xc9" // xor %ecx,%ecx "\xb0\x46" // mov $0x46,%al "\xcd\x80" // int $0x80 // execve /bi
www.eeworm.com/read/178758/5314591

entries

/crt0.c/1.4/Wed Mar 9 14:33:31 2005// /execve.c/1.2/Mon Apr 25 23:40:28 2005// /exit.c/1.2/Sun Jan 16 19:00:34 2005// /io.c/1.7/Mon May 30 21:53:06 2005// /isatty.c/1.1.1.1/Thu Jan 6 21:48:03 2005//
www.eeworm.com/read/261052/4325845

dlm linkhttp.dlm

CHTA.dlm DLMVERSION() CSTRTD(40) CINET640 buildmark.o modules.o ap/ap_base64.o ap/ap_checkpass.o ap/ap_cpystrn.o ap/ap_ebcdic.o ap/ap_execve.o ap/ap_fnmatch.o ap/ap_getpass.o ap/ap_md5c.o ap/ap_sh
www.eeworm.com/read/223355/14643850

txt 漫谈兼容内核之九:elf映像的装入(二).txt

漫谈兼容内核之九:ELF映像的装入(二) [align=center][size=4][b]漫谈兼容内核之九:ELF映像的装入(二)[/b][/size][/align] [align=center]毛德操[/align] 上一篇漫谈介绍了在通过execve()系统调用启动一个ELF格式的目标映像时发生于Linux内核中的活动。简而言之,内核根据映像头部所提供的信息把目标映像