Home
last modified time | relevance | path

Searched full:strategy (Results 1 – 25 of 30) sorted by relevance

12

/Documentation/admin-guide/pm/
Dstrategies.rst22 is affected by the state changes, this strategy is referred to as the
25 The other strategy, referred to as the :doc:`working-state power management
28 this strategy is in use, the working state of the system usually does not
Dcpuidle.rst194 the time sharing strategy of the CPU scheduler. Of course, if there are
348 for tickless systems. It follows the same basic strategy as the ``menu`` `one
/Documentation/networking/
Dipvs-sysctl.txt14 enough available memory, the respective strategy will be
16 the strategy is disabled and the variable is set to 1.
106 that this strategy is always disabled, 1 and 2 mean automatic
107 modes (when there is no enough available memory, the strategy
109 otherwise the strategy is disabled and the variable is set to
110 1), and 3 means that that the strategy is always enabled.
Dtimestamping.txt300 different from deciding on a strategy for IP fragmentation. There, the
/Documentation/firmware-guide/acpi/
Dosi.rst98 That is the *only* viable strategy, as that is what modern Windows does,
127 This strategy is problematic, as Linux is never completely compatible with
143 The result is a strategy for Linux to maximize compatibility with
175 Like Linux's _OSI("*Windows*") strategy, Linux defaults to
178 Just like on Windows-tested platforms, this strategy has risks.
/Documentation/driver-api/soundwire/
Derror_handling.rst28 viable recovery strategy.
/Documentation/devicetree/bindings/pci/
Dpci.txt23 drivers could add this as a strategy to avoid unnecessary operation for
/Documentation/x86/
Dmds.rst70 Mitigation strategy
73 All variants have the same mitigation strategy at least for the single CPU
Dtsx_async_abort.rst21 Mitigation strategy
Dpat.rst135 implementation defined, yet this strategy can be used as last resort on devices
/Documentation/devicetree/bindings/riscv/
Dcpus.yaml21 strategy. For example, an Intel laptop containing one socket with
/Documentation/media/uapi/dvb/
Ddvbproperty.rst23 In the past (up to DVB API version 3 - DVBv3), the strategy used was to have a
/Documentation/filesystems/
Dhpfs.txt271 Better anti-fragmentation strategy
287 Better allocation strategy
Derofs.txt59 cache_strategy=%s Select a strategy for cached decompression from now on:
Djournalling.rst100 strategy. Why? Because, if you do a delete, you need to ensure you
/Documentation/networking/device_drivers/toshiba/
Dspider_net.txt178 As of this writing, the spider_net_resync() strategy seems to work very
/Documentation/block/
Dqueue-sysfs.rst95 a device recovery strategy.
/Documentation/ABI/testing/
Dsysfs-block290 the request, to fail it or to start a device recovery strategy.
Dsysfs-class-power392 Pixel C's thermal management strategy to effectively limit the
/Documentation/networking/device_drivers/stmicro/
Dstmmac.txt278 available. As strategy adopted in this driver, the information from the HW
/Documentation/scsi/
DBusLogic.txt164 the bus device reset error recovery strategy is selected and sending a bus
/Documentation/cdrom/
Dcdrom-standard.rst719 The preferred strategy of *open()*
808 function becomes active. A strategy is implemented in this routine,
/Documentation/admin-guide/laptops/
Dlaptop-mode.rst93 To increase the effectiveness of the laptop_mode strategy, the laptop_mode
/Documentation/driver-api/gpio/
Dlegacy.rst72 optional code supporting such an implementation strategy, described later
/Documentation/kernel-hacking/
Dhacking.rst318 out-of-memory error-handling strategy.

12