Searched refs:jumped (Results 1 – 10 of 10) sorted by relevance
| /linux/arch/sh/kernel/ |
| H A D | entry-common.S | 9 ! to be jumped is too far, but it causes illegal slot exception.
|
| /linux/lib/ |
| H A D | assoc_array.c | 198 jumped: in assoc_array_walk() 233 goto jumped; in assoc_array_walk() 285 goto jumped; in assoc_array_walk()
|
| /linux/fs/ |
| H A D | namei.c | 1569 static int __traverse_mounts(struct path *path, unsigned flags, bool *jumped, in __traverse_mounts() argument 1626 *jumped = need_mntput; in __traverse_mounts() 1630 static inline int traverse_mounts(struct path *path, bool *jumped, in traverse_mounts() argument 1637 *jumped = false; in traverse_mounts() 1642 return __traverse_mounts(path, flags, jumped, count, lookup_flags); in traverse_mounts() 1669 bool jumped; in follow_down() local 1670 int ret = traverse_mounts(path, &jumped, NULL, flags); in follow_down() 1726 bool jumped; in handle_mounts() local 1744 ret = traverse_mounts(path, &jumped, &nd->total_link_count, nd->flags); in handle_mounts() 1745 if (jumped) in handle_mounts()
|
| /linux/arch/sh/kernel/cpu/sh3/ |
| H A D | entry.S | 20 ! to be jumped is too far, but it causes illegal slot exception.
|
| /linux/Documentation/arch/powerpc/ |
| H A D | bootwrapper.rst | 68 can be loaded to any location in RAM and jumped to.
|
| /linux/arch/m68k/ifpsp060/ |
| H A D | TEST.DOC | 92 routine would simply execute a "bsr" or "jsr" that jumped to the selected
|
| H A D | fpsp.doc | 97 would simply execute a "bra" or "jmp" that jumped to the selected function
|
| H A D | isp.doc | 105 would simply execute a "bra" or "jmp" that jumped to the selected function
|
| /linux/net/core/ |
| H A D | fib_rules.c | 322 jumped: in fib_rules_lookup() 334 goto jumped; in fib_rules_lookup()
|
| /linux/Documentation/arch/x86/ |
| H A D | boot.rst | 1313 A 32-bit flat-mode routine *jumped* to immediately after the
|