Home
last modified time | relevance | path

Searched full:manipulated (Results 1 – 25 of 185) sorted by relevance

12345678

/kernel/linux/linux-5.10/Documentation/devicetree/bindings/gpio/
Drockchip,rk3328-grf-gpio.txt4 control, can also be used for general purpose. It is manipulated by the
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/gpio/
Drockchip,rk3328-grf-gpio.yaml12 for general purpose. It is manipulated by the GRF_SOC_CON10 register.
/kernel/linux/linux-5.10/drivers/of/
DKconfig61 On some platforms, the device tree can be manipulated at runtime.
/kernel/linux/linux-6.6/drivers/i3c/master/mipi-i3c-hci/
Dcmd.h15 * may be manipulated by the core code.
/kernel/linux/linux-6.6/drivers/of/
DKconfig73 On some platforms, the device tree can be manipulated at runtime.
/kernel/linux/linux-5.10/Documentation/admin-guide/gpio/
Dgpio-mockup.rst8 using the standard GPIO character device interface as well as manipulated
/kernel/linux/linux-6.6/Documentation/admin-guide/gpio/
Dgpio-mockup.rst8 using the standard GPIO character device interface as well as manipulated
Dgpio-sim.rst8 using the standard GPIO character device interface as well as manipulated
/kernel/linux/linux-5.10/drivers/gpu/drm/
Ddrm_lease.c506 * @lessor_priv: the file being manipulated
633 * @lessor_priv: the file being manipulated
691 * @lessee_priv: the file being manipulated
753 * @lessor_priv: the file being manipulated
/kernel/linux/linux-5.10/Documentation/virt/kvm/arm/
Dpsci.rst22 pseudo-registers" that can be manipulated using the GET/SET_ONE_REG
/kernel/linux/linux-6.6/Documentation/security/
Dcredentials.rst155 These are manipulated implicitly by changes to the traditional UNIX
156 credentials, but can also be manipulated directly by the ``capset()``
176 credentials are manipulated and inherited over certain operations such as
/kernel/linux/linux-5.10/fs/jfs/
Djfs_extent.c260 * two extents will have to be manipulated. the first will be that in extRealloc()
261 * of the extent of the extend page and will be manipulated thru in extRealloc()
264 * extent will be manipulated (created) through an xtInsert() and in extRealloc()
/kernel/linux/linux-5.10/Documentation/security/
Dcredentials.rst155 These are manipulated implicitly by changes to the traditional UNIX
156 credentials, but can also be manipulated directly by the ``capset()``
176 credentials are manipulated and inherited over certain operations such as
/kernel/linux/linux-6.6/arch/x86/coco/
Dcore.c170 * source of entropy that can be neither observed nor manipulated is in cc_random_init()
/kernel/linux/linux-6.6/Documentation/livepatch/
Dsystem-state.rst53 The state can be manipulated using two functions:
/kernel/linux/linux-6.6/Documentation/virt/kvm/arm/
Dhypercalls.rst18 pseudo-registers" that can be manipulated using the GET/SET_ONE_REG
/kernel/linux/linux-5.10/Documentation/livepatch/
Dsystem-state.rst53 The state can be manipulated using two functions:
/kernel/linux/linux-5.10/include/uapi/linux/
Dquota.h59 * quota that is being manipulated (see above).
/kernel/linux/linux-6.6/include/uapi/linux/
Dquota.h59 * quota that is being manipulated (see above).
/kernel/linux/linux-6.6/Documentation/locking/
Dspinlocks.rst119 manipulated from a "process context", ie no interrupts involved.
/kernel/linux/linux-5.10/Documentation/locking/
Dspinlocks.rst119 manipulated from a "process context", ie no interrupts involved.
/kernel/linux/linux-6.6/tools/include/linux/
Dcompiler.h206 /* Make the optimizer believe the variable can be manipulated arbitrarily. */
/kernel/linux/linux-5.10/kernel/sched/
Dwait_bit.c143 * cases where bitflags are manipulated non-atomically under a lock, one
/kernel/linux/linux-6.6/kernel/sched/
Dwait_bit.c143 * cases where bitflags are manipulated non-atomically under a lock, one
/kernel/linux/linux-6.6/drivers/scsi/
Draid_class.c8 * manipulated in a form independent of the underlying raid. Ultimately this

12345678