用户缓冲区太小。
The supplied user buffer is not valid for the requested operation.
提供给请求操作的用户缓冲区无效。
Step two: data is copied from the kernel buffer into the user buffer, and the read system call returns.
所需的数据被从读取缓冲区拷贝到用户缓冲区,read()调用返回。
The strnlen_user function first checks to see that the user buffer is readable through a call to access_ok.
strnlen_user函数首先通过调用access_ok检查用户缓冲区是否可读。
The requested amount of data is copied from the read buffer into the user buffer, and the read call returns.
所需的数据被从读取缓冲区拷贝到用户缓冲区,read调用返回。
Once you have called aio_complete(), you no longer own the IOCB or the user buffer, and should not touch them again.
一旦调用aio_complete(),驱动程序就不再拥有IOCB或者用户缓冲区了,不应该再触碰它们。
After the fortune is written to the user buffer, I increment the next_fortune index by the length of the last fortune written.
在将这个fortune写入用户缓冲区之后,在next _ fortune索引上增加刚才写入的fortune的长度。
Use of the intermediate kernel buffer (rather than a direct transfer of the data into the user buffer) might seem inefficient.
使用中间内核缓冲区(而不是直接将数据传输到用户缓冲区)看起来可能有点效率低下。
The data gets copied multiple times among the disk, kernel buffer, and user buffer before it is finally delivered to the application.
数据在被最终传入到应用程序前,在磁盘、内核缓冲区和用户缓冲区中被拷贝了多次。
From here, depending on architecture, a call is made to copy from the user buffer to a kernel buffer with zeroing (of unavailable bytes).
从此开始,根据构架,为执行从用户缓冲区到内核缓冲区的零拷贝(不可用字节)而进行一个调用。
Step two: data is copied from the kernel buffer into the user buffer, and the read system call returns. The return from the call caused a context switch from kernel back to user mode.
步骤二:数据从内核空间缓冲区复制到用户空间缓冲区,之后系统调用read返回,这导致了从内核空间向用户空间的上下文切换。
Now the data is stored in the user address space buffer.
现在数据被储存在用户地址空间缓冲区。
The most important reason to use more than one user table space is to manage buffer utilization.
使用多个用户表空间的最重要原因是管理缓冲区的利用率。
Looking at these records, you can see that the user 'TEDWAS' first started the audit utility, then changed the configuration twice, then flushed the audit buffer.
从这些记录可以看出,用户' TEDWAS '首先启动审计实用程序,然后两次修改了配置,接着刷新了审计缓冲区。
This function accepts a pointer to a user space buffer, a pointer to a kernel buffer, and a length defined in bytes.
该函数接受一个指向用户空间缓冲区的指针、一个指向内存缓冲区的指针、以及一个以字节定义的长度。
Our second hypothesis was that specifying the buffer pool size affects memory utilization differently at various user loads (Test Case #2).
我们的第二个假设是指定缓冲池大小对内存利用率的影响因用户负载不同而不同(测试案例 #2)。
A warning is printed to the user if a buffer wrap condition has occurred.
如果发生了缓冲区回绕,就向用户输出警告。
As a copy from user space, this function first checks that the buffer is readable via access_ok.
由于从用户空间复制,该函数首先使用access_ok检查缓冲区是否可读。
First the user space data buffer and sense buffer should be allocated and made to point to the sg_io_hdr object.
首先必须分配用户空间数据缓冲区和检测缓冲区,并将它们指向sg_io_hdr对象。
It accepts a destination buffer (in kernel space), a source buffer (from user space), and a length defined in bytes.
它接受一个目的缓冲区(在内核空间)、一个源缓冲区(从用户空间)和一个以字节定义的长度。
The strnlen_user function takes two arguments: the user space buffer address and the maximum length to check.
strnlen_user函数带有两个参数:用户空间缓冲区地址和要检查的最大长度。
The strncpy_from_user function copies a string from user space into a kernel buffer, given a user space source address and Max length.
strncpy _ from_user函数将一个字符串从用户空间复制到一个内核缓冲区,给定一个用户空间源地址和最大长度。
The strnlen_user function is used just like strnlen but assumes that the buffer is available in user space.
strnlen_user函数也能像strnlen 那样使用,但前提是缓冲区在用户空间可用。
Edit invokes the external editor with SQL buffer Utility contents loaded into it, which can be modified by the user and be saved back into the buffer.
EDIT调用外部编辑器,将SQLBufferUtility内容加载进去,然后用户可以修改该内容并将其保存回缓冲区。
The copy_from_user function copies a block of data from user space into a kernel buffer.
copy _ from_user函数将数据块从用户空间复制到内核缓冲区。
This function will create a new buffer feature data layer around the input point features at user specified distance.
此函数将以输入点为基础,按照用户指定的距离创建一个新缓冲区轮廓数据层。
The buffer address is actually a user-space buffer, so you won't be able to read it directly.
缓冲区地址实际上是一个用户空间的缓冲区,因此我们不能直接读取它。
They declared the likelihood was very low that user input could be successfully manipulated to reach a vulnerable buffer in such a way as to cause a security violation.
他们声明能够成功操纵使用者输入到达易受攻击的缓冲区从而造成安全性破坏的可能性已非常小了。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
应用推荐