Searched full:manipulation (Results 1 – 25 of 640) sorted by relevance
12345678910>>...26
39 char s_flock; /* lock during free block list manipulation */40 char s_ilock; /* lock during inode cache manipulation */80 char s_flock; /* lock during free block list manipulation */81 char s_ilock; /* lock during inode cache manipulation */109 char s_flock; /* lock during free block list manipulation */110 char s_ilock; /* lock during inode cache manipulation */139 char s_flock; /* lock during free block list manipulation */140 char s_ilock; /* lock during inode cache manipulation */177 char s_flock; /* lock during free block list manipulation */178 char s_ilock; /* lock during inode cache manipulation */
28 * Operations on objects and index keys for use by array manipulation routines.50 * Access and manipulation functions.
84 …"PublicDescription": "This event counts architecturally executed inter-element manipulation operat…87 …"BriefDescription": "This event counts architecturally executed inter-element manipulation operati…90 …"PublicDescription": "This event counts architecturally executed inter-register manipulation opera…93 …"BriefDescription": "This event counts architecturally executed inter-register manipulation operat…
170 The standard Zba bit-manipulation extension for address generation177 The standard Zbb bit-manipulation extension for basic bit-manipulation183 The standard Zbc bit-manipulation extension for carry-less189 The standard Zbs bit-manipulation extension for single-bit
71 supported, as defined in version 1.0 of the Bit-Manipulation ISA75 in version 1.0 of the Bit-Manipulation ISA extensions.78 in version 1.0 of the Bit-Manipulation ISA extensions.
68 * hash table manipulation functions are never run simultaneously.70 * with any of the manipulation functions as long as it's called from within
86 the BMX Bit Manipulation Extension instructions. Enables94 the CDX Bit Manipulation Extension instructions. Enables
37 * This is only for internal list manipulation where we know67 * This is only for internal list manipulation where we know
3 * names.h -- USB name database manipulation routines
79 * This is only for internal list manipulation where we know109 * This is only for internal list manipulation where we know
104 bool "Enable tracepoint to track down page reference manipulation"109 manipulation. This tracking is useful to diagnose functional failure
31 and specialized DMA dedicated to image manipulation.
63 /* Lock protecting the Rx queue manipulation */80 /* Lock protecting the Tx queue manipulation */
3 * libfdt - Flat Device Tree manipulation
5 * This file contains AppArmor basic path manipulation function definitions.
30 Select to enable support for timestamping & PTP clock manipulation in
115 manipulation, nor state tracking. This is useful for things like the143 SA1111 INTPOL manipulation, and the set_GPIO_IRQ_edge()