Searched full:involves (Results 1 – 25 of 240) sorted by relevance
12345678910
26 - If the new functionality involves operations where the kernel notifies130 If your new :manpage:`xyzzy(2)` system call involves a filename argument::150 If your new :manpage:`xyzzy(2)` system call involves a parameter describing an154 If your new :manpage:`xyzzy(2)` system call involves privileged functionality,256 way (see below), this involves a "common" entry (for x86_64 and x32) in314 If the system call involves a structure that is laid out differently on 32-bit407 This is arch-specific, but typically involves defining assembly entry points467 involves a new userspace-visible structure, the corresponding header will need
27 * Enabling/disabling an interrupt line involves asserting/clearing28 * the corresponding bit in IMR. ACK'ing a request simply involves
28 * Enabling/disabling an interrupt line involves setting/clearing
7 - in the user-space fastpath a PI-enabled futex involves no kernel work79 mutexes involves no kernel work at all - they behave quite similarly to
97 The solution involves two new rt_mutex helper routines,
11 involves determining the ARS capabilities of a given address
25 * Static DRRS involves changing refresh rate (RR) by doing a full modeset27 * Seamless DRRS involves changing RR without any visual effect to the user
8 /* The right way to do this involves valignb
9 * The right way to do this involves valignb
14 to route interrupts across various subsystems. It involves a three-level
12 involves one or more virtual Ethernet switches overlaid on the Omni-Path114 It involves HW resource allocation/management for VNIC functionality.
19 * OPFN involves the communication between two QPs on the HFI
30 The board only supports DMA on the receive side. Transmission involves
15 cases involves slightly different operations and different interactions with
30 /* bit set means command submit involves a preamble IB */
10 involves a reboot because it has implications for in-flight memory
16 A cross-HT attack involves the attacker and victim running on different Hyper27 core involves additional overhead - especially when the system is lightly
18 * The sequence involves sending 3 broadcast messages (reconfiguration
11 The basic mechanism involves the application registering for notification
6 translate user and group names into ids. Part of this translation involves
58 Transparent proxying often involves "intercepting" traffic on a router. This is
72 * Initialize the PSC. For now this just involves shutting down all
40 * involves equalizing a metric between groups), or for flags describing some
26 involves performing potentially destructive operations affecting a group511 typically involves platform-specific setup code,
271 sleep states and the hibernation state ("suspend-to-disk"). Each phase involves445 of the resume methods. This generally involves undoing the actions of449 state, so that it can perform normal I/O. This generally involves510 because it involves creating and saving a system image. Therefore there are624 the memory contents preserved), although it involves different phases: