Примеры использования To kernel на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
The second line says"Welcome to Kernel Debugging Land….
Whenever an LWP is created a system call must first be made to create a corresponding kernel thread,causing a switch to kernel mode.
This class corresponds to kernels also called"Harlequin.
The microIFS is a piece of code that loads in memory the kernel andthe miniIFS and jumps to kernel execution.
The water distribution to kernel is fast and uniform with thorough penetration and absorption.
Remnants and past heaps, dark and heavy,pig-iron is similar to kernels, chained by a chain to feet.
In January, the government refunded UAH 591.7 to Kernel Trade, a part of Kernel agricultural group, UAH 549.5 m to Ilyich Steel Plant, and UAH 325.2 m to ArcelorMittal Kryvyi Rih.
In this article the term"thread"(without kernel oruser qualifier) defaults to referring to kernel threads.
LWPs(in systems where they are a separate layer)bind to kernel threads and provide a user-level context.
The upper part of the screen is cleared white andseveral lines of text are printed on it. The second line says"Welcome to Kernel Debugging Land….
In those contexts,the term"light-weight process" typically refers to kernel threads and the term"threads" can refer to user threads.
This specific attack has been named Meltdown andis addressed in the Linux kernel on the powerpc/ppc64el architectures by flushing the L1 data cache on exit from kernel mode to user mode or from hypervisor to kernel.
However, the use of blocking system calls in user threads(as opposed to kernel threads) or fibers can be problematic.
Some of our proudest achievements include the sale of Allseeds to Kernel Group, the merger of white goods retailers Comfy and BytTexnika, and the acquisition of one of Ukraine's best known consumer brands, Chumak.
In view of the footnote that would allow optional use of a name,the sentence“this class corresponds to kernels also called'Harlequin'” should be deleted.
While using genkernel,the user has to be aware of some aspects relating to kernel configuration and kernel image files management and the way the kernel sources are handled by the system.
In general,"N: M" threading systems are more complex to implement than either kernel or user threads,because both changes to kernel and user-space code are required.
Garcia-Garcia and Alonso de Magdaleno from University of Oviedo(Spain)estimate that the value annually added to kernel was about €100M between 2005 and 2007 and €225M in 2008, it would cost also more than €1bn(about $1.4bn as of February 2010) to develop in the European Union.
Provided that the symlink to the kernel sources has been set correctly,this copies the configuration of the currently used kernel to the home directory of root, renaming the configuration to kernel-config- followed by the version of the current running Linux kernel. .
On s390 systems,an unprivileged local user could use this flaw to set address space control bits to kernel space combination and thus gain read/write access to kernel memory.
Use the right timeout for stop processes we fork; don't reset log level to NOTICE if we get quiet on the kernel cmdline; fix prepare priority queuecomparison function in sd-event; update links to kernel. org cgroup documentation; don't start console-getty.
Set symlink to new kernel sources.
Local users could gain access to sensitive kernel memory.
Local users can gain access to sensitive kernel memory.
Local users could gain access to sensitive kernel memory.
A local user could obtain access to sensitive kernel memory.
Otherwise, you will be asked to enter the path to the kernel source codes.
Local users with the CAP_NET_ADMIN capability could gain access to sensitive kernel memory.
On a 64-bit kernel a local user with access to a suitable video device can exploit this to overwrite kernel memory, leading to privilege escalation.