Home
last modified time | relevance | path

Searched full:techniques (Results 1 – 25 of 51) sorted by relevance

123

/linux/tools/verification/rv/
H A DREADME.txt4 complements classical exhaustive verification techniques (such as model
/linux/drivers/ntb/hw/idt/
H A DKconfig27 techniques like BIOS using SMBus interface or EEPROM should be
/linux/Documentation/admin-guide/hw-vuln/
H A Dspecial-register-buffer-data-sampling.rst7 Documentation/admin-guide/hw-vuln/mds.rst techniques to
59 executed on another core or sibling thread using MDS techniques.
H A Dgather_data_sampling.rst16 infer stale data using typical side channel techniques like cache timing
H A Drsb.rst228 …re Techniques for Managing Speculation <https://www.amd.com/content/dam/amd/en/documents/processor…
H A Dattack_vector_controls.rst125 techniques are used to prevent untrusted workloads from running on SMT siblings.
/linux/Documentation/devicetree/bindings/powerpc/4xx/
H A Dcpm.txt40 saving techniques for the specific SoC.
/linux/kernel/trace/rv/
H A DKconfig32 exhaustive verification techniques (such as model checking and
/linux/Documentation/gpu/
H A Ddrm-compute.rst7 This means that other techniques need to be used to manage those workloads,
/linux/Documentation/staging/
H A Dspeculation.rst11 employ speculative execution techniques such as branch prediction, performing
/linux/net/netfilter/ipvs/
H A Dip_vs_twos.c39 * The Power of Two Random Choices: A Survey of Techniques and Results
H A DKconfig16 Three request dispatching techniques are implemented, they are
/linux/Documentation/arch/x86/i386/
H A DIO-APIC.rst118 Use smart trial-and-error techniques to find out the correct pirq line ...
/linux/virt/lib/
H A Dirqbypass.c8 * Various virtualization hardware acceleration techniques allow bypassing or
/linux/Documentation/networking/
H A Dscaling.rst11 This document describes a set of complementary techniques in the Linux
34 the other scaling techniques is to increase performance uniformly.
36 that is not the focus of these techniques.
H A Dchecksum-offloads.rst11 This document describes a set of techniques in the Linux networking stack to
H A Dmptcp.rst112 applications can be forced to use MPTCP with different techniques, e.g.
/linux/Documentation/bpf/
H A Ds390.rst196 This document is a compilation of techniques, whose more comprehensive
/linux/Documentation/accounting/
H A Dpsi.rst27 dynamically using techniques such as load shedding, migrating jobs to
/linux/include/uapi/linux/netfilter_bridge/
H A Debtables.h100 * different techniques for naming the policy and such. So, iptables doesn't
/linux/arch/x86/pci/
H A Ddirect.c189 * techniques used in XFree86, but ours should be more reliable since we
/linux/Documentation/core-api/
H A Dcircular-buffers.rst57 required to use the techniques below. The indices can be increased by more
/linux/Documentation/dev-tools/kunit/
H A Dstart.rst308 For more information on writing KUnit tests (including some common techniques
/linux/Documentation/admin-guide/thermal/
H A Dintel_powerclamp.rst23 - Comparison with Alternative Techniques
/linux/Documentation/power/
H A Dbasic-pm-debugging.rst209 techniques to find the problem. First, if there is a serial port in your box,

123