Searched refs:weaker (Results 1 – 11 of 11) sorted by relevance
92 value of r1 must also be equal to 1. In contrast, the weaker rule would119 the weaker rule would say nothing about the final value of r0.347 weaker barriers.
974 make weaker guarantees than architectures. In fact, it is
48 this was long ago when hardware was weaker and caches were smaller, and
132 - SCHED_IDLE: This is even weaker than nice 19, but its not a true
1848 int *weaker, int *stronger) in rs_get_adjacent_txp() argument1850 *weaker = index + IWL_MVM_RS_TPC_TX_POWER_STEP; in rs_get_adjacent_txp()1851 if (*weaker > TPC_MAX_REDUCTION) in rs_get_adjacent_txp()1852 *weaker = TPC_INVALID; in rs_get_adjacent_txp()
71 The IP checksum is weaker than the CRC in terms of detecting bit
400 An address-dependency barrier is a weaker form of read barrier. In the980 the "weaker" type.1371 optimizations, so a weaker form called ``other multicopy atomicity''1374 weaker form, but for brevity will call it simply ``multicopy atomicity''.2604 These are similar to readX() and writeX(), but provide weaker memory
295 memory (e.g. I/O registers). Other modes can offer weaker or stronger
94 most developers did not use the libraries. We concluded that weaker
134 You should also make a new key if your current one is weaker than 2048
734 using weaker password hashes is 0x37037 (lanman,