Exemples d'utilisation de Linux kernel's en Anglais et leurs traductions en Français
{-}
-
Colloquial
-
Official
The Linux kernel's timezone is set by hwclock.
To make it work, I had to patch the Linux kernel's uvc camera driver.
Use the Linux® kernel's native support for the card.
MIUI's kernel was proprietary, and in breach of Linux kernel's GPL.
It runs in the Linux kernel's userspace(as root.
Grsecurity" is a collection of security patches for enhancing the Linux kernel's security.
We do that by using the Linux kernel's firewalling rules and routing tables.
Colin Ian King discovered a flaw in the add_key function of the Linux kernel's keyring subsystem.
The linux kernel's implementation of rpcsec_gss depends on the userspace daemon rpc.
Three related flaws have been found in the Linux kernel's handling of TCP networking.
KVM relies on the Linux kernel's process and memory management features, to handle Virtual Machines.
Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system.
A flaw was found in the Linux kernel's Reliable Datagram Sockets(RDS) protocol implementation.
Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system.
The Linux kernel's reboot system call accepts their dates of birth(written in hexadecimal) as magic values.
Peter Huewe reported an issue in the Linux kernel's support for TPM security chips.
It was found that the Linux kernel's InfiniBand/RDMA subsystem did not properly sanitize input parameters while registering memory regions from user space via the(u)verbs API.
This directory facilitates the configuration of the Linux kernel's virtual memory(VM) subsystem.
Docker accesses the Linux kernel's virtualization features either directly using the libcontainer library, which is available as of Docker 0.9, or indirectly via libvirt, LXC(Linux Containers) or systemd-nspawn.
In late 2001 he joined IBM,where he worked on improvements in the Linux kernel's performance and scalability.
Sasha Levin discovered a flaw in the Linux kernel's point-to-point protocol(PPP) when used with the Layer Two Tunneling Protocol L2TP.
They hadn't reckoned on scientific scepticism,the innovative tool par excellence that pushed a team of researchers to try to explain the downgraded performance levels observed by comparing manual task assignment to the decisions made by the Linux kernel's scheduler.
David Howells of Red Hat discovered that a local user can trigger a flaw in the Linux kernel's handling of key lookups in the keychain subsystem, leading to a denial of service(crash) or possibly to privilege escalation.
ModulesAll- Full List of Kernel Modules for the Debian's Linux Kernel.