Home
last modified time | relevance | path

Searched full:approach (Results 1 – 25 of 470) sorted by relevance

12345678910>>...19

/Linux-v5.15/Documentation/locking/
Drobust-futexes.rst54 To solve this problem, the traditional approach was to extend the vma
56 robust futexes attached to this area'. This approach requires 3 new
59 they have a robust_head set. This approach has two fundamental problems
63 approach had been pending for years, but they are still not completely
86 New approach to robust futexes
89 At the heart of this new approach there is a per-thread private list of
124 Key differences of this userspace-list based approach, compared to the
157 I have also measured an approach where glibc does the lock notification
164 approach scales nicely.)
/Linux-v5.15/Documentation/bpf/
Dringbuf.rst41 ``BPF_MAP_TYPE_HASH_OF_MAPS`` addresses this with current approach.
44 approach would be an overkill.
46 Another approach could introduce a new concept, alongside BPF map, to represent
48 with lookup/update/delete operations. This approach would add a lot of extra
52 additional benefits over the approach of using a map. ``BPF_MAP_TYPE_RINGBUF``
56 The approach chosen has an advantage of re-using existing BPF map
/Linux-v5.15/tools/memory-model/Documentation/
Dsimple.txt39 This approach is called "code locking".
62 takes this approach for much of its grace-period processing and also
77 This approach delegates any LKMM worries to the library maintainer.
98 The poster boy for this approach is the hash table, where placing a lock
114 a single-threaded approach while providing excellent performance and
120 must be used to protect this global view. This is the approach taken
207 or modifying the variable. This approach guarantees that code prior
/Linux-v5.15/Documentation/userspace-api/media/dvb/
Ddvbproperty.rst23 So, the legacy union/struct based approach was deprecated, in favor
24 of a properties set approach. On such approach,
/Linux-v5.15/tools/testing/selftests/net/forwarding/
DREADME29 This approach for testing switch ASICs has several advantages over the
38 not always available. With the VRF-based approach one merely needs to
/Linux-v5.15/kernel/trace/
Dtrace_preemptirq.c25 * and lockdep uses a staged approach which splits the lockdep hardirq
58 * and lockdep uses a staged approach which splits the lockdep hardirq
/Linux-v5.15/include/linux/platform_data/
Ddavinci_asp.h58 * SYMMETRICAL APPROACH:
67 * ACCURATE CLOCK APPROACH:
/Linux-v5.15/net/ipv4/
Dtcp_rate.c14 * at which packets were acknowledged. However, the approach of using only the
28 * deliberately avoids using the inter-packet spacing approach because that
29 * approach requires a large number of samples and sophisticated filtering.
/Linux-v5.15/Documentation/filesystems/
Dubifs-authentication.rst36 This document describes an approach to get file contents _and_ full metadata
274 Using this approach only UBIFS index nodes and the master node are changed to
396 has a different approach of encryption policies per directory, there can be
398 UBIFS authentication on the other hand has an all-or-nothing approach in the
407 fscrypt approach has shown its flaws and the userspace API will eventually
418 approach is similar to the approach proposed for fscrypt encryption policy v2
Dinotify.rst78 Why the system call approach?
87 family of system calls because that is the preferred approach for new kernel
/Linux-v5.15/Documentation/arm/nwfpe/
Dtodo.rst25 There are a couple of ways to approach the implementation of these. One
31 Another approach, which I know little about is CORDIC. This stands for
/Linux-v5.15/Documentation/timers/
Dno_hz.rst21 approach, and should be the default.
38 there are some situations where this old-school approach is still the
39 right approach, for example, in heavy workloads with lots of tasks
192 Another approach is to offload RCU callback processing to "rcuo" kthreads
/Linux-v5.15/Documentation/vm/
Dhighmem.rst29 The traditional split for architectures using this approach is 3:1, 3GiB for
122 highmem. In such a case, the arithmetic approach will also be used.
Dremap_file_pages.rst10 over using repeated calls to mmap(2) is that the former approach does not
/Linux-v5.15/Documentation/devicetree/bindings/
Dxilinx.txt17 The new approach is to export the parameters into the device tree and
89 That covers the general approach to binding xilinx IP cores into the
/Linux-v5.15/Documentation/livepatch/
Dlivepatch.rst97 1. The first and most effective approach is stack checking of sleeping
104 2. The second approach, if needed, is kernel exit switching. A
119 (Note there's not yet such an approach for kthreads.)
122 the second approach. It's highly likely that some tasks may still be
/Linux-v5.15/drivers/acpi/dptf/
DKconfig11 a coordinated approach for different policies to effect the hardware
/Linux-v5.15/Documentation/admin-guide/
Dkernel-per-CPU-kthreads.rst304 the need for RCU priority boosting. This approach is feasible
307 kthreads from being created in the first place. This approach
313 to OS jitter. This approach prevents the rcuc/%u kthreads from
/Linux-v5.15/Documentation/userspace-api/media/mediactl/
Dmedia-controller-intro.rst22 approach will not scale. Device topologies are getting increasingly
/Linux-v5.15/Documentation/networking/caif/
Dlinux_caif.rst67 It implements the CAIF protocol stack in a layered approach, where
159 In this layered approach the following "rules" apply.
/Linux-v5.15/Documentation/trace/
Dosnoise-tracer.rst30 all the sources of *osnoise* during its execution. Using the same approach
152 approach: measuring thread and tracing.
/Linux-v5.15/arch/alpha/lib/
Dev6-csum_ipv6_magic.S39 * Finally, original 'folding' approach is to split the long into 4 unsigned shorts
44 * From doing some testing, using the approach in checksum.c:from64to16()
/Linux-v5.15/Documentation/RCU/
Dchecklist.rst16 should strongly consider some other approach, unless detailed
35 approach provides the same potential simplifications that garbage
91 This is almost always the best approach.
291 Older versions of the dcache subsystem take this approach,
/Linux-v5.15/drivers/remoteproc/
Domap_remoteproc.h23 * of the triggered virtqueue itself. the preferred approach will be decided
/Linux-v5.15/arch/sh/mm/
Dnuma.c21 * On SH machines the conventional approach is to stash system RAM

12345678910>>...19