/linux-6.12.1/Documentation/devicetree/bindings/soc/loongson/ |
D | loongson,ls2k-pmc.yaml | 35 RAM) firmware entry address which was jumped from kernel and it's
|
/linux-6.12.1/drivers/rtc/ |
D | rtc-at91sam9.c | 156 /* time jumped backwards, increase time until alarm */ in at91_rtc_settime() 159 /* time jumped forwards, decrease time until alarm */ in at91_rtc_settime() 162 /* time jumped past the alarm, disable alarm */ in at91_rtc_settime()
|
/linux-6.12.1/arch/x86/kernel/ |
D | rethook.c | 28 ANNOTATE_NOENDBR /* This is only jumped from ret instruction */
|
/linux-6.12.1/arch/nios2/kernel/ |
D | head.S | 59 * First executable code - detected and jumped to by the ROM bootstrap
|
/linux-6.12.1/arch/arc/kernel/ |
D | head.S | 94 ; Default Reset Handler (jumped into from Reset vector)
|
/linux-6.12.1/Documentation/arch/powerpc/ |
D | bootwrapper.rst | 68 can be loaded to any location in RAM and jumped to.
|
/linux-6.12.1/arch/powerpc/kvm/ |
D | book3s_interrupts.S | 130 * This is the handler in module memory. It gets jumped at from the
|
/linux-6.12.1/drivers/net/ethernet/i825xx/ |
D | lasi_82596.c | 6 but there were too many hoops which HP wants jumped through to
|
/linux-6.12.1/arch/m68k/ifpsp060/ |
D | TEST.DOC | 92 routine would simply execute a "bsr" or "jsr" that jumped to the selected
|
D | isp.doc | 105 would simply execute a "bra" or "jmp" that jumped to the selected function
|
D | fpsp.doc | 97 would simply execute a "bra" or "jmp" that jumped to the selected function
|
/linux-6.12.1/drivers/scsi/sym53c8xx_2/ |
D | sym_hipd.h | 447 * SCRIPTS address jumped by SCRIPTS on reselection. 545 u32 start; /* Jumped by SCRIPTS after selection */ 546 u32 restart; /* Jumped by SCRIPTS on relection */
|
/linux-6.12.1/drivers/clk/ti/ |
D | clk-43xx.c | 292 * clockcheck: clock jumped backward or running slower than expected! in am43xx_dt_clk_init()
|
/linux-6.12.1/arch/sh/kernel/ |
D | entry-common.S | 9 ! to be jumped is too far, but it causes illegal slot exception.
|
/linux-6.12.1/fs/ |
D | namei.c | 1403 static int __traverse_mounts(struct path *path, unsigned flags, bool *jumped, in __traverse_mounts() argument 1452 *jumped = need_mntput; in __traverse_mounts() 1456 static inline int traverse_mounts(struct path *path, bool *jumped, in traverse_mounts() argument 1463 *jumped = false; in traverse_mounts() 1468 return __traverse_mounts(path, flags, jumped, count, lookup_flags); in traverse_mounts() 1495 bool jumped; in follow_down() local 1496 int ret = traverse_mounts(path, &jumped, NULL, flags); in follow_down() 1555 bool jumped; in handle_mounts() local 1571 ret = traverse_mounts(path, &jumped, &nd->total_link_count, nd->flags); in handle_mounts() 1572 if (jumped) { in handle_mounts() [all …]
|
/linux-6.12.1/drivers/hid/ |
D | hid-udraw-ps3.c | 188 * to user-space otherwise it'll look as if it jumped. in udraw_raw_event()
|
/linux-6.12.1/fs/ecryptfs/ |
D | miscdev.c | 250 /* Something else jumped in since the in ecryptfs_miscdev_read()
|
/linux-6.12.1/drivers/net/can/usb/etas_es58x/ |
D | es581_4.c | 81 netdev_err(netdev, "Echo packet idx jumped from %u to %u\n", in es581_4_echo_msg()
|
D | es58x_fd.c | 85 netdev_err(netdev, "Packet idx jumped from %u to %u\n", in es58x_fd_echo_msg()
|
/linux-6.12.1/arch/sh/kernel/cpu/sh3/ |
D | entry.S | 20 ! to be jumped is too far, but it causes illegal slot exception.
|
/linux-6.12.1/lib/ |
D | assoc_array.c | 198 jumped: in assoc_array_walk() 233 goto jumped; in assoc_array_walk() 285 goto jumped; in assoc_array_walk()
|
/linux-6.12.1/net/core/ |
D | fib_rules.c | 301 jumped: in fib_rules_lookup() 313 goto jumped; in fib_rules_lookup()
|
/linux-6.12.1/arch/powerpc/kernel/ |
D | head_book3s_32.S | 87 * This is jumped to on prep systems right after the kernel is relocated 748 * This code is jumped to from the startup code to copy
|
/linux-6.12.1/arch/xtensa/kernel/ |
D | vectors.S | 198 * a0: last address before we jumped to the unrecoverable_exception.
|
/linux-6.12.1/fs/afs/ |
D | inode.c | 248 /* Only update the size if the data version jumped. If the in afs_apply_status()
|