| /linux/tools/verification/rv/ |
| H A D | README.txt | 4 complements classical exhaustive verification techniques (such as model
|
| /linux/drivers/ntb/hw/idt/ |
| H A D | Kconfig | 27 techniques like BIOS using SMBus interface or EEPROM should be
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | special-register-buffer-data-sampling.rst | 7 Documentation/admin-guide/hw-vuln/mds.rst techniques to 59 executed on another core or sibling thread using MDS techniques.
|
| H A D | gather_data_sampling.rst | 16 infer stale data using typical side channel techniques like cache timing
|
| H A D | rsb.rst | 228 …re Techniques for Managing Speculation <https://www.amd.com/content/dam/amd/en/documents/processor…
|
| H A D | attack_vector_controls.rst | 125 techniques are used to prevent untrusted workloads from running on SMT siblings.
|
| /linux/Documentation/devicetree/bindings/powerpc/4xx/ |
| H A D | cpm.txt | 40 saving techniques for the specific SoC.
|
| /linux/kernel/trace/rv/ |
| H A D | Kconfig | 32 exhaustive verification techniques (such as model checking and
|
| /linux/Documentation/gpu/ |
| H A D | drm-compute.rst | 7 This means that other techniques need to be used to manage those workloads,
|
| /linux/Documentation/staging/ |
| H A D | speculation.rst | 11 employ speculative execution techniques such as branch prediction, performing
|
| /linux/net/netfilter/ipvs/ |
| H A D | ip_vs_twos.c | 39 * The Power of Two Random Choices: A Survey of Techniques and Results
|
| H A D | Kconfig | 16 Three request dispatching techniques are implemented, they are
|
| /linux/Documentation/arch/x86/i386/ |
| H A D | IO-APIC.rst | 118 Use smart trial-and-error techniques to find out the correct pirq line ...
|
| /linux/virt/lib/ |
| H A D | irqbypass.c | 8 * Various virtualization hardware acceleration techniques allow bypassing or
|
| /linux/Documentation/networking/ |
| H A D | scaling.rst | 11 This document describes a set of complementary techniques in the Linux 34 the other scaling techniques is to increase performance uniformly. 36 that is not the focus of these techniques.
|
| H A D | checksum-offloads.rst | 11 This document describes a set of techniques in the Linux networking stack to
|
| H A D | mptcp.rst | 112 applications can be forced to use MPTCP with different techniques, e.g.
|
| /linux/Documentation/bpf/ |
| H A D | s390.rst | 196 This document is a compilation of techniques, whose more comprehensive
|
| /linux/Documentation/accounting/ |
| H A D | psi.rst | 27 dynamically using techniques such as load shedding, migrating jobs to
|
| /linux/include/uapi/linux/netfilter_bridge/ |
| H A D | ebtables.h | 100 * different techniques for naming the policy and such. So, iptables doesn't
|
| /linux/arch/x86/pci/ |
| H A D | direct.c | 189 * techniques used in XFree86, but ours should be more reliable since we
|
| /linux/Documentation/core-api/ |
| H A D | circular-buffers.rst | 57 required to use the techniques below. The indices can be increased by more
|
| /linux/Documentation/dev-tools/kunit/ |
| H A D | start.rst | 308 For more information on writing KUnit tests (including some common techniques
|
| /linux/Documentation/admin-guide/thermal/ |
| H A D | intel_powerclamp.rst | 23 - Comparison with Alternative Techniques
|
| /linux/Documentation/power/ |
| H A D | basic-pm-debugging.rst | 209 techniques to find the problem. First, if there is a serial port in your box,
|