Home
last modified time | relevance | path

Searched refs:illegal (Results 1 – 8 of 8) sorted by relevance

/u-boot/arch/sandbox/
A DKconfig57 If an illegal instruction or an illegal memory access occurs, the
/u-boot/lib/efi_loader/
A Defi_unicode_collation.c15 static const char illegal[] = "+,<=>:;\"/\\|?*[]\x7f"; variable
304 (c && (c < 0x20 || strchr(illegal, c)))) { in efi_str_to_fat()
/u-boot/doc/usage/
A Dexception.rst43 illegal memory access
/u-boot/doc/
A DREADME.bedbug31 if it is an illegal instruction, privileged instruction or
/u-boot/arch/riscv/
A DKconfig263 old specification will result in an illegal instruction
/u-boot/scripts/
A Dspelling.txt569 iligal||illegal
570 illigal||illegal
/u-boot/fs/fat/
A Dfat_write.c1287 const char *p, illegal[] = "<>:\"/\\|?*"; in normalize_longname() local
1297 if (strchr(illegal, *p)) in normalize_longname()
/u-boot/doc/board/sipeed/
A Dmaix.rst84 to intercept run-time exceptions, e.g. for unaligned access or illegal

Completed in 16 milliseconds