Lines Matching full:operations
120 operations on a unix socket done from either the upper (nullfs) or lower
163 simply bypassing all possible operations to the lower layer
166 on the bypass routine, through which nearly all vnode operations
169 The bypass routine accepts arbitrary vnode operations for
180 Although bypass handles most operations,
208 are created as a result of vnode operations on
237 Later operations on the null-node
256 .Sh INVOKING OPERATIONS ON LOWER LAYERS
257 There are two techniques to invoke operations on a lower layer
275 A second approach is to directly invoke vnode operations on
280 arbitrary operations on the lower layer.