Searched full:manipulation (Results 1 – 25 of 302) sorted by relevance
12345678910>>...13
39 char s_flock; /* lock during free block list manipulation */40 char s_ilock; /* lock during inode cache manipulation */80 char s_flock; /* lock during free block list manipulation */81 char s_ilock; /* lock during inode cache manipulation */109 char s_flock; /* lock during free block list manipulation */110 char s_ilock; /* lock during inode cache manipulation */139 char s_flock; /* lock during free block list manipulation */140 char s_ilock; /* lock during inode cache manipulation */177 char s_flock; /* lock during free block list manipulation */178 char s_ilock; /* lock during inode cache manipulation */
28 * Operations on objects and index keys for use by array manipulation routines.50 * Access and manipulation functions.
84 …"PublicDescription": "This event counts architecturally executed inter-element manipulation operat…87 …"BriefDescription": "This event counts architecturally executed inter-element manipulation operati…90 …"PublicDescription": "This event counts architecturally executed inter-register manipulation opera…93 …"BriefDescription": "This event counts architecturally executed inter-register manipulation operat…
41 * This helper macro allows manipulation the argument list before passing it58 * This helper macro allows manipulation the argument list before passing it75 * This helper macro allows manipulation the argument list before passing it95 * This helper macro allows manipulation the argument list before passing it
248 The standard Zba bit-manipulation extension for address generation255 The standard Zbb bit-manipulation extension for basic bit-manipulation261 The standard Zbc bit-manipulation extension for carry-less285 The standard Zbs bit-manipulation extension for single-bit488 The standard Zvbb extension for vectored basic bit-manipulation542 The standard Zvkb extension for vector cryptography bit-manipulation
86 the BMX Bit Manipulation Extension instructions. Enables94 the CDX Bit Manipulation Extension instructions. Enables
85 supported, as defined in version 1.0 of the Bit-Manipulation ISA89 in version 1.0 of the Bit-Manipulation ISA extensions.92 in version 1.0 of the Bit-Manipulation ISA extensions.98 in version 1.0 of the Bit-Manipulation ISA extensions.
37 * This is only for internal list manipulation where we know67 * This is only for internal list manipulation where we know
3 * names.h -- USB name database manipulation routines
12 /* Utilities related to string manipulation */
115 manipulation, nor state tracking. This is useful for things like the143 SA1111 INTPOL manipulation, and the set_GPIO_IRQ_edge()
62 /* Lock protecting the Rx queue manipulation */79 /* Lock protecting the Tx queue manipulation */
149 /* Allows setgid(2) manipulation */155 /* Allows set*uid(2) manipulation (including fsuid). */311 /* Allow manipulation of system clock */
3 * libfdt - Flat Device Tree manipulation
5 * libfdt - Flat Device Tree manipulation
5 * This file contains AppArmor basic path manipulation function definitions.
47 and specialized DMA dedicated to image manipulation.
35 Select to enable support for timestamping & PTP clock manipulation in
21 manipulation and allow for testing arbitrary commands. This
3 * Guest PC manipulation helpers
2 /* include/net/dsfield.h - Manipulation of the Differentiated Services field */
3 * ip22-hpc.c: Routines for generic manipulation of the HPC controllers.
166 bool "Enable tracepoint to track down page reference manipulation"171 manipulation. This tracking is useful to diagnose functional failure