Examples of using Kernel memory in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Sets the size of kernel memory(bytes).
An unprivileged user could obtain sensitive information from kernel memory.
Insufficient kernel memory was available.
To read potentially confidential kernel memory.
Port.4: System memory, kernel memory and system ports.
An application may be able to disclose kernel memory.
Kernel memory is a system memory that is not assigned to any of the processes.
Impact: An application may be able to read kernel memory(Meltdown).
Kernel memory is a system memory that is not assigned to any of the processes.
If a limit is not set,lxc-top will display kernel memory use as 0.
Directly access the kernel memory area which is visible from the Page Table but which violates the access right.
The Meltdown techniquecan enable a user process to read kernel memory.
Mem, kmem, port- system memory, kernel memory and system ports.
On the other hand,the essence of Specter's attack is not to read the kernel memory area.
Mem, kmem, port- system memory, kernel memory and system ports.
Although such messages contain no data, they nevertheless consume(locked) kernel memory.
If a limit is not set,lxc-info will display kernel memory use as 0. A limit can be set by specifying.
A bug in the iBCS2 emulationmodule could result in disclosing the contents of kernel memory.
This, of course, comes at the expense of the kernel memory, which will have only 1GB of virtual address space.
The'tx_queue' and'rx_queue' are the outgoing andincoming data queue in terms of kernel memory usage.
Kernel memory accounting statistics can eventually contradict each other after large amounts of cross-node merging.
The following interfacescan be used to limit the amount of kernel memory consumed by epoll:.
All of its resources are inside kernel memory and has a very small cpu usage and userspace footprint in memory. .
The following interfacescan be used to limit the amount of kernel memory consumed by epoll:.
Each of these vulnerability variants may be exploited toread confidential data such as CPU or kernel memory.
The following interfacescan be used to limit the amount of kernel memory consumed by POSIX message queues:.
The compatibility issue is caused when anti-virusapplications make unsupported calls into Windows kernel memory.
A bug in procfs(5) and linprocfs(5),which could result in disclosing the contents of kernel memory, has been fixed.
By doing this, it is protected so that applications not knowing what programmersmade can arbitrarily not enter the kernel memory area.
The"tx_queue" and"rx_queue" are the outgoing andincoming data queue in terms of kernel memory usage.