Home
last modified time | relevance | path

Searched full:techniques (Results 1 – 25 of 71) sorted by relevance

123

/linux-6.15/tools/verification/rv/
DREADME.txt4 complements classical exhaustive verification techniques (such as model
/linux-6.15/drivers/ntb/hw/idt/
DKconfig27 techniques like BIOS using SMBus interface or EEPROM should be
/linux-6.15/Documentation/mm/
Dpage_tables.rst186 process management optimization techniques called "Lazy Allocation" and
191 These techniques improve memory efficiency, reduce latency, and minimize space
196 Swapping differentiates itself from the other mentioned techniques because it's
/linux-6.15/Documentation/admin-guide/hw-vuln/
Dspecial-register-buffer-data-sampling.rst7 Documentation/admin-guide/hw-vuln/mds.rst techniques to
59 executed on another core or sibling thread using MDS techniques.
Dgather_data_sampling.rst16 infer stale data using typical side channel techniques like cache timing
Drsb.rst228 …re Techniques for Managing Speculation <https://www.amd.com/content/dam/amd/en/documents/processor…
/linux-6.15/Documentation/admin-guide/media/
Dindex.rst25 - for advice about essential tools and techniques to debug drivers on this
/linux-6.15/kernel/trace/rv/
DKconfig20 exhaustive verification techniques (such as model checking and
/linux-6.15/Documentation/devicetree/bindings/powerpc/4xx/
Dcpm.txt40 saving techniques for the specific SoC.
/linux-6.15/Documentation/gpu/
Ddrm-compute.rst7 This means that other techniques need to be used to manage those workloads,
/linux-6.15/Documentation/staging/
Dspeculation.rst11 employ speculative execution techniques such as branch prediction, performing
/linux-6.15/Documentation/devicetree/bindings/clock/
Dst,stm32-rcc.yaml70 The modulation techniques for main PLL.
/linux-6.15/net/netfilter/ipvs/
Dip_vs_twos.c39 * The Power of Two Random Choices: A Survey of Techniques and Results
/linux-6.15/Documentation/arch/x86/i386/
DIO-APIC.rst118 Use smart trial-and-error techniques to find out the correct pirq line ...
/linux-6.15/Documentation/driver-api/early-userspace/
Dbuffer-format.rst114 the following techniques can be used:
/linux-6.15/Documentation/networking/
Dscaling.rst11 This document describes a set of complementary techniques in the Linux
34 the other scaling techniques is to increase performance uniformly.
36 that is not the focus of these techniques.
Dmptcp.rst112 applications can be forced to use MPTCP with different techniques, e.g.
Dchecksum-offloads.rst11 This document describes a set of techniques in the Linux networking stack to
Dsegmentation-offloads.rst11 This document describes a set of techniques in the Linux networking stack
/linux-6.15/Documentation/admin-guide/
Dquickly-build-trimmed-linux.rst20 If your system uses techniques like Secure Boot, prepare it to permit starting
92 * On platforms with 'Secure Boot' or similar techniques, prepare everything to
95 disable such techniques in the BIOS setup utility; alternatively, remove
383 Dealing with techniques like Secure Boot
386 *On platforms with 'Secure Boot' or similar techniques, prepare everything to
/linux-6.15/virt/lib/
Dirqbypass.c8 * Various virtualization hardware acceleration techniques allow bypassing or
/linux-6.15/Documentation/trace/rv/
Dda_monitor_synthesis.rst4 The starting point for the application of runtime verification (RV) techniques
/linux-6.15/Documentation/bpf/
Ds390.rst196 This document is a compilation of techniques, whose more comprehensive
/linux-6.15/Documentation/accounting/
Dpsi.rst27 dynamically using techniques such as load shedding, migrating jobs to
/linux-6.15/include/uapi/linux/netfilter_bridge/
Debtables.h100 * different techniques for naming the policy and such. So, iptables doesn't

123