Home
last modified time | relevance | path

Searched full:demonstrated (Results 1 – 16 of 16) sorted by relevance

/linux/Documentation/devicetree/bindings/powerpc/
H A Dsleep.yaml39 sleep-map should wait until its necessity is demonstrated).
/linux/Documentation/scheduler/
H A Dsched-nice-design.rst64 (which you can see demonstrated in the picture above), or more
/linux/kernel/kcsan/
H A Dselftest.c93 * An access of size 0 could match another access, as demonstrated here. in test_matching_access()
/linux/tools/sched_ext/
H A DREADME.md189 The approach demonstrated by this scheduler may be useful for any workload that
/linux/drivers/comedi/drivers/ni_routing/
H A DREADME113 These tools are best used/demonstrated via the included Makefile targets:
/linux/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00link.c86 * which antenna demonstrated the best performance. in rt2x00lib_antenna_diversity_sample()
/linux/Documentation/security/tpm/
H A Dtpm-security.rst27 successfully demonstrated against the `Windows Bitlocker TPM`_ system.
/linux/Documentation/networking/
H A Dila.rst174 by configuration as demonstrated below.
/linux/Documentation/arch/riscv/
H A Dhwprobe.rst64 added, but only if it can be demonstrated that the user ABI is not broken):
/linux/Documentation/admin-guide/hw-vuln/
H A Drsb.rst178 attack demonstrated by the researchers. As previously documented,
/linux/Documentation/driver-api/crypto/iaa/
H A Diaa-crypto.rst503 Now that basic functionality has been demonstrated, the defaults can
/linux/net/ipv4/
H A Dinet_hashtables.c1024 * attacks were since demonstrated, thus we use 65536 by default instead in __inet_hash_connect()
/linux/net/sunrpc/
H A Dsvc_xprt.c611 * demonstrated that they have access to the NFS server. If we have,
/linux/include/uapi/drm/
H A Dxe_drm.h135 * as demonstrated by Vulkan's approach to providing extensions for forward
H A Di915_drm.h70 * as demonstrated by Vulkan's approach to providing extensions for forward
/linux/tools/include/uapi/drm/
H A Di915_drm.h70 * as demonstrated by Vulkan's approach to providing extensions for forward