Home
last modified time | relevance | path

Searched refs:weaker (Results 1 – 11 of 11) sorted by relevance

/Linux-v4.19/tools/memory-model/Documentation/
Drecipes.txt92 value of r1 must also be equal to 1. In contrast, the weaker rule would
119 the weaker rule would say nothing about the final value of r0.
347 weaker barriers.
/Linux-v4.19/Documentation/scheduler/
Dsched-nice-design.txt44 this was long ago when hardware was weaker and caches were smaller, and
Dsched-design-CFS.txt127 - SCHED_IDLE: This is even weaker than nice 19, but its not a true
/Linux-v4.19/fs/cifs/
DKconfig83 bool "Support legacy servers which use weaker LANMAN security"
/Linux-v4.19/drivers/net/wireless/intel/iwlwifi/mvm/
Drs.c2070 int *weaker, int *stronger) in rs_get_adjacent_txp() argument
2072 *weaker = index + IWL_MVM_RS_TPC_TX_POWER_STEP; in rs_get_adjacent_txp()
2073 if (*weaker > TPC_MAX_REDUCTION) in rs_get_adjacent_txp()
2074 *weaker = TPC_INVALID; in rs_get_adjacent_txp()
/Linux-v4.19/Documentation/block/
Ddata-integrity.txt67 The IP checksum is weaker than the CRC in terms of detecting bit
Dcfq-iosched.txt30 IO priority becomes weaker.
/Linux-v4.19/Documentation/
Dmemory-barriers.txt402 A data dependency barrier is a weaker form of read barrier. In the case
972 the "weaker" type.
1363 optimizations, so a weaker form called ``other multicopy atomicity''
1366 weaker form, but for brevity will call it simply ``multicopy atomicity''.
2656 These are similar to readX() and writeX(), but provide weaker memory
/Linux-v4.19/LICENSES/preferred/
DLGPL-2.094 most developers did not use the libraries. We concluded that weaker
/Linux-v4.19/Documentation/process/
Dmaintainer-pgp-guide.rst146 You should also make a new key if your current one is weaker than 2048 bits
/Linux-v4.19/Documentation/filesystems/cifs/
DREADME618 using weaker password hashes is 0x37037 (lanman,