Searched full:demonstrated (Results 1 – 23 of 23) sorted by relevance
/linux-6.15/Documentation/devicetree/bindings/powerpc/ |
D | sleep.yaml | 39 sleep-map should wait until its necessity is demonstrated).
|
/linux-6.15/Documentation/sound/soc/ |
D | codec-to-codec.rst | 102 the speaker amp can be created as demonstrated in wm8727.c file, it
|
/linux-6.15/Documentation/scheduler/ |
D | sched-nice-design.rst | 64 (which you can see demonstrated in the picture above), or more
|
/linux-6.15/kernel/kcsan/ |
D | selftest.c | 93 * An access of size 0 could match another access, as demonstrated here. in test_matching_access()
|
/linux-6.15/tools/sched_ext/ |
D | README.md | 189 The approach demonstrated by this scheduler may be useful for any workload that
|
/linux-6.15/drivers/comedi/drivers/ni_routing/ |
D | README | 113 These tools are best used/demonstrated via the included Makefile targets:
|
/linux-6.15/Documentation/security/tpm/ |
D | tpm-security.rst | 27 successfully demonstrated against the `Windows Bitlocker TPM`_ system.
|
/linux-6.15/drivers/net/wireless/ralink/rt2x00/ |
D | rt2x00link.c | 86 * which antenna demonstrated the best performance. in rt2x00lib_antenna_diversity_sample()
|
/linux-6.15/Documentation/admin-guide/hw-vuln/ |
D | mds.rst | 73 consequence the attacks are purely sampling based, but as demonstrated with
|
D | rsb.rst | 178 attack demonstrated by the researchers. As previously documented,
|
/linux-6.15/Documentation/arch/riscv/ |
D | hwprobe.rst | 64 added, but only if it can be demonstrated that the user ABI is not broken):
|
/linux-6.15/Documentation/networking/ |
D | ila.rst | 174 by configuration as demonstrated below.
|
/linux-6.15/Documentation/driver-api/crypto/iaa/ |
D | iaa-crypto.rst | 504 Now that basic functionality has been demonstrated, the defaults can
|
/linux-6.15/drivers/media/pci/ivtv/ |
D | ivtv-streams.c | 549 /* Always use frame based mode. Experiments have demonstrated that byte in ivtv_start_v4l2_encode_stream()
|
/linux-6.15/net/ipv4/ |
D | inet_hashtables.c | 1000 * attacks were since demonstrated, thus we use 65536 by default instead
|
/linux-6.15/net/sunrpc/ |
D | svc_xprt.c | 610 * demonstrated that they have access to the NFS server. If we have,
|
/linux-6.15/include/uapi/drm/ |
D | xe_drm.h | 129 * as demonstrated by Vulkan's approach to providing extensions for forward
|
D | i915_drm.h | 70 * as demonstrated by Vulkan's approach to providing extensions for forward
|
/linux-6.15/drivers/usb/gadget/udc/ |
D | fsl_udc_core.c | 574 /* mult = 0. Execute N Transactions as demonstrated by in fsl_ep_enable()
|
/linux-6.15/drivers/gpu/drm/i915/gem/ |
D | i915_gem_execbuffer.c | 1594 * having already demonstrated that we in eb_relocate_vma()
|
/linux-6.15/tools/include/uapi/drm/ |
D | i915_drm.h | 70 * as demonstrated by Vulkan's approach to providing extensions for forward
|
/linux-6.15/Documentation/RCU/Design/Requirements/ |
D | Requirements.rst | 2707 inadequate, and only if the inadequacy has been demonstrated by a
|
/linux-6.15/Documentation/filesystems/xfs/ |
D | xfs-online-fsck-design.rst | 1871 Continued development of online fsck demonstrated that the ability to perform
|