Home
last modified time | relevance | path

Searched refs:jumped (Results 1 – 11 of 11) sorted by relevance

/Linux-v5.15/arch/sh/kernel/
Dentry-common.S9 ! to be jumped is too far, but it causes illegal slot exception.
/Linux-v5.15/fs/
Dnamei.c1320 static int __traverse_mounts(struct path *path, unsigned flags, bool *jumped, in __traverse_mounts() argument
1369 *jumped = need_mntput; in __traverse_mounts()
1373 static inline int traverse_mounts(struct path *path, bool *jumped, in traverse_mounts() argument
1380 *jumped = false; in traverse_mounts()
1385 return __traverse_mounts(path, flags, jumped, count, lookup_flags); in traverse_mounts()
1412 bool jumped; in follow_down() local
1413 int ret = traverse_mounts(path, &jumped, NULL, 0); in follow_down()
1477 bool jumped; in handle_mounts() local
1494 ret = traverse_mounts(path, &jumped, &nd->total_link_count, nd->flags); in handle_mounts()
1495 if (jumped) { in handle_mounts()
/Linux-v5.15/lib/
Dassoc_array.c198 jumped: in assoc_array_walk()
233 goto jumped; in assoc_array_walk()
285 goto jumped; in assoc_array_walk()
/Linux-v5.15/arch/sh/kernel/cpu/sh3/
Dentry.S20 ! to be jumped is too far, but it causes illegal slot exception.
/Linux-v5.15/net/core/
Dfib_rules.c301 jumped: in fib_rules_lookup()
313 goto jumped; in fib_rules_lookup()
/Linux-v5.15/arch/m68k/ifpsp060/
DTEST.DOC92 routine would simply execute a "bsr" or "jsr" that jumped to the selected
Dfpsp.doc97 would simply execute a "bra" or "jmp" that jumped to the selected function
Disp.doc105 would simply execute a "bra" or "jmp" that jumped to the selected function
/Linux-v5.15/Documentation/powerpc/
Dbootwrapper.rst68 can be loaded to any location in RAM and jumped to.
/Linux-v5.15/Documentation/x86/
Dboot.rst1314 A 32-bit flat-mode routine *jumped* to immediately after the
/Linux-v5.15/Documentation/filesystems/
Dvfs.rst1211 called when the VFS needs to revalidate a "jumped" dentry. This