Searched full:analysis (Results 1 – 25 of 228) sorted by relevance
12345678910
/Linux-v5.10/Documentation/filesystems/ |
D | xfs-self-describing-metadata.rst | 28 few days to perform such forensic analysis, so for at this scale root cause 29 analysis is entirely possible. 32 to analyse and so that analysis blows out towards weeks/months of forensic work. 33 Most of the analysis work is slow and tedious, so as the amount of analysis goes 36 required for basic forensic analysis of the filesystem structure. 48 Hence most of the time spent on forensic analysis is spent doing basic 58 of analysis. We can't protect against every possible type of error, but we can 76 metadata object at runtime, during forensic analysis or repair. 103 Another key information point in forensic analysis is knowing who the metadata 124 analysis is how recently the block was modified. Correlation of set of corrupted
|
/Linux-v5.10/Documentation/admin-guide/ |
D | perf-security.rst | 15 units (PMU) [2]_ and Perf collect and expose for performance analysis. 95 performance analysis of monitored processes or a system. For example, 185 analysis. Per-user per-cpu perf_event_mlock_kb locking limit is 193 monitored and captured for later analysis. Per-user per-cpu 200 monitored and captured for later analysis. Per-user per-cpu
|
/Linux-v5.10/tools/perf/pmu-events/arch/x86/icelake/ |
D | other.json | 4 …Analysis method. The count is distributed among unhalted logical processors (hyper-threads) who sh… 91 …of the narrowest pipeline as employed by the Top-down Microarchitecture Analysis method. The count…
|
/Linux-v5.10/tools/perf/Documentation/ |
D | perf-sched.txt | 39 'perf sched timehist' provides an analysis of scheduling events. 162 string is ',x.y') then analysis starts at the beginning of the file. If 163 stop time is not given (i.e, time string is 'x.y,') then analysis goes
|
D | perf.txt | 6 perf - Performance analysis tools for Linux 70 that provide a framework for all things performance analysis. It
|
D | perf-kmem.txt | 71 string is ',x.y') then analysis starts at the beginning of the file. If 72 stop time is not given (i.e, time string is 'x.y,') then analysis goes
|
D | perf-c2c.txt | 19 The perf c2c tool provides means for Shared Data C2C/HITM analysis. It allows 127 The perf c2c record command setup options related to HITM cacheline analysis 155 The perf c2c report command displays shared data analysis. It comes in two
|
D | examples.txt | 174 analysis done over ten 1-second intervals: 217 expressive power of system analysis and performance 218 analysis.
|
D | perf-archive.txt | 16 buildids found so that analysis of perf.data contents can be possible on another
|
/Linux-v5.10/Documentation/networking/device_drivers/atm/ |
D | cxacru.rst | 78 - "channel analysis" 118 [4942255.666387] ATM dev 0: ADSL line: channel analysis
|
/Linux-v5.10/Documentation/driver-api/mtd/ |
D | nand_ecc.rst | 169 Analysis 0 279 Analysis 1 295 byte. A quick analysis: 410 Analysis 2 462 Analysis 3 499 Analysis 4 535 Analysis 5 590 Analysis 6 660 Analysis 7 677 Analysis 8
|
/Linux-v5.10/tools/testing/selftests/vm/ |
D | test_vmalloc.sh | 74 echo "for deep performance analysis as well as stress testing." 107 echo "# Performance analysis"
|
/Linux-v5.10/tools/ |
D | Makefile | 27 @echo ' objtool - an ELF object analysis tool' 29 @echo ' perf - Linux performance measurement and analysis tool'
|
/Linux-v5.10/drivers/net/fddi/skfp/h/ |
D | targetos.h | 63 #define FDDI_TRACE(string, arg1, arg2, arg3) // Performance analysis. 65 #define NDD_TRACE(string, arg1, arg2, arg3) // Performance analysis.
|
/Linux-v5.10/Documentation/staging/ |
D | lzo.rst | 11 of this analysis is lib/lzo/lzo1x_decompress_safe.c. No analysis was made on 197 analysis of the decompression code available in Linux 3.16-rc5, and updated
|
/Linux-v5.10/drivers/iio/ |
D | TODO | 11 iio_claim_direct.(Requires analysis of the purpose of the lock.)
|
/Linux-v5.10/Documentation/trace/ |
D | index.rst | 9 tracepoint-analysis
|
/Linux-v5.10/Documentation/admin-guide/kdump/ |
D | kdump.rst | 5 This document includes overview, setup and installation, and analysis 53 use analysis tools such as the GNU Debugger (GDB) and the Crash tool to 149 analysis tools require a vmlinux with debug symbols in order to read 492 Analysis chapter 497 You can do limited analysis using GDB on the dump file copied out of
|
D | index.rst | 6 This document includes overview, setup and installation, and analysis
|
/Linux-v5.10/tools/perf/arch/sh/util/ |
D | dwarf-regs.c | 12 * Generic dwarf analysis helpers
|
/Linux-v5.10/Documentation/driver-api/thermal/ |
D | intel_powerclamp.rst | 18 (*) Performance Analysis 47 Test/Analysis has been made in the areas of power, performance, 225 Performance Analysis
|
/Linux-v5.10/tools/perf/tests/shell/lib/ |
D | probe_vfs_getname.sh | 22 …add_probe_vfs_getname -v 2>&1 | egrep -q "^(Failed to find the path for kernel|Debuginfo-analysis …
|
/Linux-v5.10/drivers/tty/ |
D | n_tracesink.h | 11 * out of the mobile device for analysis with a debugging tool
|
/Linux-v5.10/arch/x86/include/asm/ |
D | insn-eval.h | 4 * A collection of utility functions for x86 instruction analysis to be
|
/Linux-v5.10/arch/mips/kernel/ |
D | uprobes.c | 21 * arch_uprobe_analyze_insn - instruction analysis including validity and fixups. 186 * probed address for the potential restart or for post mortem analysis.
|
12345678910