Searched full:techniques (Results 1 – 25 of 71) sorted by relevance
123
/linux-6.15/tools/verification/rv/ |
D | README.txt | 4 complements classical exhaustive verification techniques (such as model
|
/linux-6.15/drivers/ntb/hw/idt/ |
D | Kconfig | 27 techniques like BIOS using SMBus interface or EEPROM should be
|
/linux-6.15/Documentation/mm/ |
D | page_tables.rst | 186 process management optimization techniques called "Lazy Allocation" and 191 These techniques improve memory efficiency, reduce latency, and minimize space 196 Swapping differentiates itself from the other mentioned techniques because it's
|
/linux-6.15/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 7 Documentation/admin-guide/hw-vuln/mds.rst techniques to 59 executed on another core or sibling thread using MDS techniques.
|
D | gather_data_sampling.rst | 16 infer stale data using typical side channel techniques like cache timing
|
D | rsb.rst | 228 …re Techniques for Managing Speculation <https://www.amd.com/content/dam/amd/en/documents/processor…
|
/linux-6.15/Documentation/admin-guide/media/ |
D | index.rst | 25 - for advice about essential tools and techniques to debug drivers on this
|
/linux-6.15/kernel/trace/rv/ |
D | Kconfig | 20 exhaustive verification techniques (such as model checking and
|
/linux-6.15/Documentation/devicetree/bindings/powerpc/4xx/ |
D | cpm.txt | 40 saving techniques for the specific SoC.
|
/linux-6.15/Documentation/gpu/ |
D | drm-compute.rst | 7 This means that other techniques need to be used to manage those workloads,
|
/linux-6.15/Documentation/staging/ |
D | speculation.rst | 11 employ speculative execution techniques such as branch prediction, performing
|
/linux-6.15/Documentation/devicetree/bindings/clock/ |
D | st,stm32-rcc.yaml | 70 The modulation techniques for main PLL.
|
/linux-6.15/net/netfilter/ipvs/ |
D | ip_vs_twos.c | 39 * The Power of Two Random Choices: A Survey of Techniques and Results
|
/linux-6.15/Documentation/arch/x86/i386/ |
D | IO-APIC.rst | 118 Use smart trial-and-error techniques to find out the correct pirq line ...
|
/linux-6.15/Documentation/driver-api/early-userspace/ |
D | buffer-format.rst | 114 the following techniques can be used:
|
/linux-6.15/Documentation/networking/ |
D | scaling.rst | 11 This document describes a set of complementary techniques in the Linux 34 the other scaling techniques is to increase performance uniformly. 36 that is not the focus of these techniques.
|
D | mptcp.rst | 112 applications can be forced to use MPTCP with different techniques, e.g.
|
D | checksum-offloads.rst | 11 This document describes a set of techniques in the Linux networking stack to
|
D | segmentation-offloads.rst | 11 This document describes a set of techniques in the Linux networking stack
|
/linux-6.15/Documentation/admin-guide/ |
D | quickly-build-trimmed-linux.rst | 20 If your system uses techniques like Secure Boot, prepare it to permit starting 92 * On platforms with 'Secure Boot' or similar techniques, prepare everything to 95 disable such techniques in the BIOS setup utility; alternatively, remove 383 Dealing with techniques like Secure Boot 386 *On platforms with 'Secure Boot' or similar techniques, prepare everything to
|
/linux-6.15/virt/lib/ |
D | irqbypass.c | 8 * Various virtualization hardware acceleration techniques allow bypassing or
|
/linux-6.15/Documentation/trace/rv/ |
D | da_monitor_synthesis.rst | 4 The starting point for the application of runtime verification (RV) techniques
|
/linux-6.15/Documentation/bpf/ |
D | s390.rst | 196 This document is a compilation of techniques, whose more comprehensive
|
/linux-6.15/Documentation/accounting/ |
D | psi.rst | 27 dynamically using techniques such as load shedding, migrating jobs to
|
/linux-6.15/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 100 * different techniques for naming the policy and such. So, iptables doesn't
|
123