HomeSort by relevance Sort by last modified time
    Searched refs:Boot (Results 1 - 25 of 60) sorted by null

1 2 3

  /toolchain/binutils/binutils-2.27/ld/testsuite/ld-mmix/
loc9.s 2 Boot GETA $0,Boot %set dynamic- and forced-trap handler
3 .globl Boot
loc10.s 0 Boot GETA $0,Boot %set dynamic- and forced-trap handler
loc8.s 3 Boot GETA $0,Boot %set dynamic- and forced-trap handler
loc9m.d 2 #ld: -e Boot -m mmo
11 8000000000000000 g \.text Boot
  /toolchain/binutils/binutils-2.27/gas/testsuite/gas/mmix/
loc-6.s 5 Boot GETA $0,Boot %set dynamic- and forced-trap handler
loc-7.s 5 Boot GETA $0,Boot %set dynamic- and forced-trap handler
  /compatibility/cdd/9_security-model/
9_13_safe-mode.md 1 ## 9.13\. Safe Boot Mode
3 Android provides Safe Boot Mode, which allows users to boot up into a mode
5 apps are disabled. This mode, known as "Safe Boot Mode", provides the user the
10 * [SR] STRONGLY RECOMMENDED to implement Safe Boot Mode.
12 If device implementations implement Safe Boot Mode, they:
15 enter Safe Boot Mode in such a way that is uninterruptible from third-party
24 * SHOULD provide the user an option to enter Safe Boot Mode from the
25 boot menu using a workflow that is different from that of a normal boot
    [all...]
9_9_full-disk-encryption.md 25 ### 9.9.1\. Direct Boot
29 * [C-0-1] MUST implement the [Direct Boot mode](
30 http://developer.android.com/preview/features/direct-boot.html) APIs even if
36 Intents MUST still be broadcast to signal Direct Boot aware applications that
44 * [C-1-1] MUST boot up without challenging the user for credentials and
45 allow Direct Boot aware apps to access to the Device Encrypted (DE) storage
53 * [C-1-4] MUST support Verified Boot and ensure that DE keys are
73 Direct Boot aware.
  /device/linaro/bootloader/edk2/MdeModulePkg/Universal/Disk/PartitionDxe/
ElTorito.c 131 // Read in the boot El Torito boot catalog
132 // The LBA unit used by El Torito boot catalog is 2KB unit
156 DEBUG ((EFI_D_ERROR, "EltCheckBootCatalog: El Torito boot catalog header IDs not correct\n"));
167 DEBUG ((EFI_D_ERROR, "EltCheckBootCatalog: El Torito boot catalog header checksum failed\n"));
181 if (Catalog->Boot.Indicator != ELTORITO_ID_SECTION_BOOTABLE || Catalog->Boot.Lba == 0) {
186 SectorCount = Catalog->Boot.SectorCount;
188 switch (Catalog->Boot.MediaType) {
210 DEBUG ((EFI_D_INIT, "EltCheckDevice: unsupported El Torito boot media type %x\n", Catalog->Boot.MediaType));
    [all...]
  /device/linaro/bootloader/edk2/FatPkg/FatPei/
Part.c 197 // Read in the boot El Torito boot catalog
242 if (Catalog->Boot.Indicator != ELTORITO_ID_SECTION_BOOTABLE || Catalog->Boot.Lba == 0) {
247 SectorCount = Catalog->Boot.SectorCount;
249 switch (Catalog->Boot.MediaType) {
253 SectorCount = Catalog->Boot.SectorCount;
278 SectorCount = (VolSpaceSize > ParentBlockDev->LastBlock + 1) ? (UINT32) (ParentBlockDev->LastBlock - Catalog->Boot.Lba + 1) : (UINT32) (VolSpaceSize - Catalog->Boot.Lba);
294 BlockDev->StartingPos = MultU64x32 (Catalog->Boot.Lba, ParentBlockDev->BlockSize);
    [all...]
  /external/syslinux/bios/dosutil/
copybs.com 6 $Boot sector read failed
  /bionic/libc/kernel/uapi/linux/
qnx4_fs.h 82 struct qnx4_inode_entry Boot;
  /device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
ElTorito.h 49 // ELTORITO_CATALOG.Boot.MediaTypes
71 /// Boot Record Volume Descriptor, defined in "El Torito" Specification.
79 UINT8 EltCatalog[4]; ///< Absolute pointer to first sector of Boot Catalog
131 } Boot;
  /device/linaro/bootloader/edk2/UefiCpuPkg/ResetVector/Vtf0/Ia32/
SearchForBfvBase.asm 3 ; Search for the Boot Firmware Volume (BFV) base address
29 ; @param[out] EBP Address of Boot Firmware Volume (BFV)
  /external/kernel-headers/original/uapi/linux/
qnx4_fs.h 85 struct qnx4_inode_entry Boot;
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
qnx4_fs.h 84 struct qnx4_inode_entry Boot;
  /device/linaro/bootloader/edk2/UefiCpuPkg/ResetVector/Vtf0/
Main.asm 24 ; @param[in,out] DI 'BP': boot-strap processor, or
26 ; @param[out] RBP/EBP Address of Boot Firmware Volume (BFV)
41 ; Search for the Boot Firmware Volume (BFV)
  /frameworks/base/cmds/incident_helper/src/parsers/
SystemPropertiesParser.cpp 111 Table bootTable(SystemPropertiesProto::Ro::Boot::_FIELD_NAMES,
112 SystemPropertiesProto::Ro::Boot::_FIELD_IDS,
113 SystemPropertiesProto::Ro::Boot::_FIELD_COUNT);
114 Message boot(&bootTable);
115 ro.addSubMessage(SystemPropertiesProto::Ro::BOOT, &boot);
  /device/linaro/bootloader/edk2/CorebootModulePkg/SecCore/Ia32/
SecEntry.S 34 # @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
35 # @param[in] EBP Pointer to the start of the Boot Firmware Volume
SecEntry.asm 41 ; @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
42 ; @param[in] EBP Pointer to the start of the Boot Firmware Volume
  /device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/
fip_create.sh 27 --tb-fw FILENAME Trusted Boot Firmware BL2
40 --tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate
  /build/make/target/board/generic_x86_64/
BoardConfig.mk 28 # Enable dex-preoptimization to speed up the first boot sequence
71 # Android Verified Boot (AVB):
  /device/linaro/bootloader/edk2/MdeModulePkg/Library/UefiBootManagerLib/
BmMisc.c 126 save them into the variables for next boot. It resets the system when
127 memory information is updated and the current boot option belongs to
128 boot category instead of application category. It doesn't count the
131 @param Boot TRUE if current boot option belongs to boot
136 IN BOOLEAN Boot
166 // Only check the the Memory Type Information variable in the boot mode
168 // Information is not valid in this boot mode.
212 // Use a heuristic to adjust the Memory Type Information for the next boot
    [all...]
  /external/python/cpython2/RISCOS/
Makefile 16 # change from time to time (don't forget to change !Boot also)
191 SUPPORT_FILES = @.^.!Boot @.^.!Run @.^.!Sprites @.^.!Sprites22 @.^.AddToPath
212 @.^.!Boot: support.!Boot
213 copy support.!Boot @.^.!Boot ~C~VF
214 settype @.^.!Boot feb
  /device/linaro/bootloader/edk2/DuetPkg/BootSector/
bs32.S 57 #The structure for FAT32 starting at offset 36 of the boot sector. (At this point,
58 #the BPB/boot sector for FAT12 and FAT16 differs from the BPB/boot sector for FAT32.)
71 Signature: .byte 0 # Extended Boot Signature - 1 byte
108 cmpw $0xaa55, SectorSignature(%bp) # Verify Boot Sector Signature
114 jne BadBootSector # If is isn't, then the boot sector is bad.
296 # LBA Offset for BootSector, need patched by tool for HD boot.
309 .word 0xaa55 # Boot Sector Signature

Completed in 509 milliseconds

1 2 3