Home
last modified time | relevance | path

Searched refs:jumped (Results 1 – 22 of 22) sorted by relevance

/OK3568_Linux_fs/kernel/arch/sh/kernel/
H A Dentry-common.S9 ! to be jumped is too far, but it causes illegal slot exception.
/OK3568_Linux_fs/kernel/fs/
H A Dnamei.c1301 static int __traverse_mounts(struct path *path, unsigned flags, bool *jumped, in __traverse_mounts() argument
1350 *jumped = need_mntput; in __traverse_mounts()
1354 static inline int traverse_mounts(struct path *path, bool *jumped, in traverse_mounts() argument
1361 *jumped = false; in traverse_mounts()
1366 return __traverse_mounts(path, flags, jumped, count, lookup_flags); in traverse_mounts()
1393 bool jumped; in follow_down() local
1394 int ret = traverse_mounts(path, &jumped, NULL, 0); in follow_down()
1460 bool jumped; in handle_mounts() local
1477 ret = traverse_mounts(path, &jumped, &nd->total_link_count, nd->flags); in handle_mounts()
1478 if (jumped) { in handle_mounts()
/OK3568_Linux_fs/kernel/lib/
H A Dassoc_array.c198 jumped: in assoc_array_walk()
233 goto jumped; in assoc_array_walk()
285 goto jumped; in assoc_array_walk()
/OK3568_Linux_fs/buildroot/package/dahdi-linux/
H A D0002-fix-build-with-32-bits-kernel.patch134 usec = 0; /* System clock jumped */
/OK3568_Linux_fs/kernel/arch/sh/kernel/cpu/sh3/
H A Dentry.S21 ! to be jumped is too far, but it causes illegal slot exception.
/OK3568_Linux_fs/u-boot/examples/standalone/
H A DREADME.smc91111_eeprom99 jumped to is 0x10d8). This is also the same as the entry point
/OK3568_Linux_fs/kernel/net/core/
H A Dfib_rules.c301 jumped: in fib_rules_lookup()
313 goto jumped; in fib_rules_lookup()
/OK3568_Linux_fs/kernel/arch/m68k/ifpsp060/
H A Dfpsp.doc97 would simply execute a "bra" or "jmp" that jumped to the selected function
H A DTEST.DOC92 routine would simply execute a "bsr" or "jsr" that jumped to the selected
H A Disp.doc105 would simply execute a "bra" or "jmp" that jumped to the selected function
/OK3568_Linux_fs/kernel/Documentation/powerpc/
H A Dbootwrapper.rst68 can be loaded to any location in RAM and jumped to.
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/lib/gcc/aarch64-none-linux-gnu/10.3.1/plugin/include/
H A Dgimple.def198 (regardless of whether EVAL finished normally, or jumped out or an
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/lib/gcc/arm-none-linux-gnueabihf/10.3.1/plugin/include/
H A Dgimple.def198 (regardless of whether EVAL finished normally, or jumped out or an
/OK3568_Linux_fs/u-boot/board/sandbox/
H A DREADME.sandbox160 It is also possible to tell U-Boot that it has jumped from a temporary
/OK3568_Linux_fs/kernel/Documentation/x86/
H A Dboot.rst1314 A 32-bit flat-mode routine *jumped* to immediately after the
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dvfs.rst1192 called when the VFS needs to revalidate a "jumped" dentry. This
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/share/info/
H A Dgccint.info12410 and then jumps to another function. When the jumped-to function
H A Dgcc.info10891 the block being cross-jumped from are matched.
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/share/info/
H A Dgccint.info12410 and then jumps to another function. When the jumped-to function
H A Dgcc.info10891 the block being cross-jumped from are matched.
/OK3568_Linux_fs/external/xserver/
H A DChangeLog103292 that the VBE call jumped to the routine setting AX=0x14F (VBE Failed)
/OK3568_Linux_fs/recovery/
HDrootfs.cpio.gz107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.�07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep��07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck����07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000bin���usr/bin�07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ...