Home
last modified time | relevance | path

Searched refs:boot (Results 1 – 25 of 683) sorted by relevance

12345678910>>...28

/external/fsck_msdos/
Dboot.c48 readboot(int dosfs, struct bootblock *boot) in readboot() argument
65 memset(boot, 0, sizeof *boot); in readboot()
66 boot->ValidFat = -1; in readboot()
71 boot->bpbBytesPerSec = block[11] + (block[12] << 8); in readboot()
72 if (boot->bpbBytesPerSec < DOSBOOTBLOCKSIZE_REAL || in readboot()
73 boot->bpbBytesPerSec > DOSBOOTBLOCKSIZE || in readboot()
74 !powerof2(boot->bpbBytesPerSec)) { in readboot()
75 pfatal("Invalid sector size: %u", boot->bpbBytesPerSec); in readboot()
80 boot->bpbSecPerClust = block[13]; in readboot()
81 if (boot->bpbSecPerClust == 0 || !powerof2(boot->bpbSecPerClust)) { in readboot()
[all …]
Dfat.c170 struct bootblock *boot; member
525 return (fat->boot); in boot_of_()
559 const struct bootblock *boot = boot_of_(fat); in valid_cl() local
561 return (cl >= CLUST_FIRST && cl < boot->NumClusters); in valid_cl()
582 checkdirty(int fs, struct bootblock *boot) in checkdirty() argument
589 if (boot->ClustMask != CLUST16_MASK && boot->ClustMask != CLUST32_MASK) in checkdirty()
592 off = boot->bpbResSectors; in checkdirty()
593 off *= boot->bpbBytesPerSec; in checkdirty()
595 buffer = malloc(len = boot->bpbBytesPerSec); in checkdirty()
606 if ((size_t)read(fs, buffer, boot->bpbBytesPerSec) != in checkdirty()
[all …]
Dcheck.c52 struct bootblock boot; in checkfilesys() local
81 if (readboot(dosfs, &boot) == FSFATAL) { in checkfilesys()
87 if (skipclean && preen && checkdirty(dosfs, &boot)) { in checkfilesys()
98 mod |= readfat(dosfs, &boot, &fat); in checkfilesys()
134 freebytes = (int64_t)boot.NumFree * boot.ClusterSize; in checkfilesys()
135 badbytes = (int64_t)boot.NumBad * boot.ClusterSize; in checkfilesys()
142 if (boot.NumBad) { in checkfilesys()
147 boot.NumFiles, freestr, boot.NumFree, in checkfilesys()
148 badstr, boot.NumBad); in checkfilesys()
151 boot.NumFiles, freestr, boot.NumFree); in checkfilesys()
[all …]
Ddir.c227 struct bootblock *boot; in resetDosDirSection() local
229 boot = fat_get_boot(fat); in resetDosDirSection()
231 rootdir_size = boot->bpbRootDirEnts * 32; in resetDosDirSection()
232 cluster_size = boot->bpbSecPerClust * boot->bpbBytesPerSec; in resetDosDirSection()
253 if (boot->flags & FAT32) { in resetDosDirSection()
254 if (!fat_is_cl_head(fat, boot->bpbRootClust)) { in resetDosDirSection()
258 rootDir->head = boot->bpbRootClust; in resetDosDirSection()
304 struct bootblock *boot; in delete() local
306 boot = fat_get_boot(fat); in delete()
308 clsz = boot->bpbSecPerClust * boot->bpbBytesPerSec; in delete()
[all …]
/external/mtools/
Dmformat.c57 static int init_geometry_boot(union bootsector *boot, struct device *dev, in init_geometry_boot() argument
66 set_word(boot->boot.nsect, dev->sectors); in init_geometry_boot()
67 set_word(boot->boot.nheads, dev->heads); in init_geometry_boot()
74 set_word(boot->boot.psect, (uint16_t) *tot_sectors); in init_geometry_boot()
75 set_dword(boot->boot.bigsect, 0); in init_geometry_boot()
77 set_word(boot->boot.psect, 0); in init_geometry_boot()
78 set_dword(boot->boot.bigsect, (uint32_t) *tot_sectors); in init_geometry_boot()
89 strncpy(boot->boot.banner, "2M-STV04", 8); in init_geometry_boot()
90 boot->boot.ext.old.res_2m = 0; in init_geometry_boot()
91 boot->boot.ext.old.fmt_2mf = 6; in init_geometry_boot()
[all …]
Dinit.c39 static int read_boot(Stream_t *Stream, union bootsector * boot, int size) in read_boot() argument
49 if (force_read(Stream, boot->characters, 0, size) != size) in read_boot()
53 if(boot_sector_size < sizeof(boot->bytes)) { in read_boot()
55 memset(boot->bytes+boot_sector_size, 0, in read_boot()
56 sizeof(boot->bytes) - boot_sector_size); in read_boot()
93 static int get_media_type(Stream_t *St, union bootsector *boot) in get_media_type() argument
97 media = boot->boot.descr; in get_media_type()
136 union bootsector *boot, in find_device() argument
200 if ((r=read_boot(Stream, boot, out_dev->blocksize)) < 0){ in find_device()
207 if((*media= get_media_type(Stream, boot)) <= 0xf0 ){ in find_device()
[all …]
Dminfo.c39 static void displayInfosector(Stream_t *Stream, union bootsector *boot) in displayInfosector() argument
59 static void displayBPB(Stream_t *Stream, union bootsector *boot) { in displayBPB() argument
64 printf("banner:\"%.8s\"\n", boot->boot.banner); in displayBPB()
66 printf("cluster size: %d sectors\n", boot->boot.clsiz); in displayBPB()
68 printf("fats: %d\n", boot->boot.nfat); in displayBPB()
72 printf("media descriptor byte: 0x%x\n", boot->boot.descr); in displayBPB()
80 labelBlock = &boot->boot.ext.old.labelBlock; in displayBPB()
82 labelBlock = &boot->boot.ext.fat32.labelBlock; in displayBPB()
115 displayInfosector(Stream, boot); in displayBPB()
122 union bootsector boot; in minfo() local
[all …]
Dmlabel.c126 union bootsector boot; in mlabel() local
286 have_boot = (force_read(Fs,boot.characters,0,sizeof(boot)) == in mlabel()
287 sizeof(boot)); in mlabel()
291 labelBlock = &boot.boot.ext.old.labelBlock; in mlabel()
293 labelBlock = &boot.boot.ext.fat32.labelBlock; in mlabel()
307 if(have_boot && boot.boot.descr >= 0xf0 && has_BPB4) { in mlabel()
316 if(have_boot && boot.boot.descr >= 0xf0 && has_BPB4) { in mlabel()
323 force_write(Fs, (char *)&boot, 0, sizeof(boot)); in mlabel()
327 force_write(Fs, (char *)&boot, in mlabel()
329 sizeof(boot)); in mlabel()
Dmsdos.h192 struct bootsector_s boot; member
195 #define CHAR(x) (boot->x[0])
196 #define WORD(x) (_WORD(boot->boot.x))
197 #define DWORD(x) (_DWORD(boot->boot.x))
199 #define WORD_S(x) (_WORD(boot.boot.x))
200 #define DWORD_S(x) (_DWORD(boot.boot.x))
202 #define OFFSET(x) (((char *) (boot->x)) - ((char *)(boot->jump)))
Dmclasserase.c83 union bootsector boot; in do_mclasserase() local
121 if(! (Stream = find_device(drive, O_RDONLY, &dev, &boot, in do_mclasserase()
130 labelBlock = &bbelBlock = &boot->ext.old.labelBlock; in do_mclasserase()
132 labelBlock = &boot->ext.fat32.labelBlock; in do_mclasserase()
137 labelBlock = &boot.boot.ext.old.labelBlock; in do_mclasserase()
Dfat.c625 static int check_media_type(Fs_t *This, union bootsector *boot, in check_media_type() argument
653 if((address[0] != boot->boot.descr && boot->boot.descr >= 0xf0 && in check_media_type()
655 || boot->boot.descr != 0xf0)) || address[0] < 0xf0) { in check_media_type()
659 boot->boot.descr); in check_media_type()
671 static int fat_32_read(Fs_t *This, union bootsector *boot, in fat_32_read() argument
677 This->writeAllFats = !(boot->boot.ext.fat32.extFlags[0] & 0x80); in fat_32_read()
678 This->primaryFat = boot->boot.ext.fat32.extFlags[0] & 0xf; in fat_32_read()
701 return(check_media_type(This, boot, tot_sectors) || in fat_32_read()
706 static int old_fat_read(Fs_t *This, union bootsector *boot, in old_fat_read() argument
718 if(check_media_type(This,boot, tot_sectors)) in old_fat_read()
[all …]
/external/arm-trusted-firmware/docs/plat/
Dwarp7.rst20 We need to use a file generated by u-boot in order to generate a .imx image the
21 BootROM will boot. It is therefore _required_ to build u-boot before TF-A and
22 furthermore it is _recommended_ to use the mkimage in the u-boot/tools directory
28 https://git.linaro.org/landing-teams/working/mbl/u-boot.git
34 make u-boot.imx arch=ARM CROSS_COMPILE=arm-linux-gnueabihf-
53 - u-boot.bin
54 The binary output from the u-boot instructions above
78 BL33=fiptool_images/u-boot.bin certificates all
80 …/path/to/u-boot/tools/mkimage -n /path/to/u-boot/u-boot.cfgout -T imximage -e 0x9df00000 -d ./buil…
87 cp /path/to/uboot/u-boot.bin fiptool_images
[all …]
Dimx8m.rst12 Bootrom --> SPL --> BL31 --> BL33(u-boot) --> Linux kernel
22 - Build spl and u-boot firstly, and get binary images: u-boot-spl.bin,
23 u-boot-nodtb.bin and dtb for the target board.
41 TF-A binary(bl31.bin), u-boot-spl.bin u-boot-nodtb.bin and dtb are combined
44 with certain offset for BOOT ROM. the u-boot and imx-mkimage will be upstreamed
Dbrcm-stingray.rst16 Bootrom --> TF-A BL2 --> TF-A BL31 --> BL33(u-boot)
31 - Build u-boot first, and get the binary image: u-boot.bin,
39 … make CROSS_COMPILE=aarch64-linux-gnu- PLAT=stingray BOARD_CFG=bcm958742t all fip BL33=u-boot.bin
43 The u-boot will be upstreamed soon, this doc will be updated once they are ready, and the link will…
Dpoplar.rst29 At the start of the boot sequence, the bootROM executes the so called l-loader
35 l-loader --> Trusted Firmware-A --> u-boot
49 - u-boot:
50 `link <http://git.denx.de/u-boot.git>`__
60 - Build u-boot using poplar_defconfig
67 - Build atf providing the previously generated u-boot.bin as the BL33 image
72 BL33=u-boot.bin
88 The system will boot into a u-boot shell which you can then use to write the
102 Entry boot auxiliary code
/external/python/cpython2/Modules/
Dthreadmodule.c611 struct bootstate *boot = (struct bootstate *) boot_raw; in t_bootstrap() local
615 tstate = boot->tstate; in t_bootstrap()
621 boot->func, boot->args, boot->keyw); in t_bootstrap()
633 PyFile_WriteObject(boot->func, file, 0); in t_bootstrap()
635 PyObject_Print(boot->func, stderr, 0); in t_bootstrap()
643 Py_DECREF(boot->func); in t_bootstrap()
644 Py_DECREF(boot->args); in t_bootstrap()
645 Py_XDECREF(boot->keyw); in t_bootstrap()
657 struct bootstate *boot; in thread_PyThread_start_new_thread() local
678 boot = PyMem_NEW(struct bootstate, 1); in thread_PyThread_start_new_thread()
[all …]
/external/arm-trusted-firmware/docs/plat/arm/fvp-ve/
Dindex.rst13 BL1 --> BL2 --> BL32(sp_min) --> BL33(u-boot) --> Linux kernel
20 - `U-boot <https://git.linaro.org/landing-teams/working/arm/u-boot.git>`__
31 - Fetch and build u-boot.
38 Make the u-boot binary for Cortex-A5 using the command:
44 Make the u-boot binary for Cortex-A7 using the command:
59 ARM_XLAT_TABLES_LIB_V1=1 BL33=<path_to_u-boot.bin> all fip
67 BL33=<path_to_u-boot.bin> all fip
72 The following model parameters should be used to boot Linux using the build of
/external/toolchain-utils/debug_info_test/
Dngcc_dso_path.allowlist6 .*/boot/u-boot\.debug
7 .*/boot/vmlinux\.debug
8 .*/uboot/u-boot\.debug
9 .*/firmware/u-boot\.debug
/external/arm-trusted-firmware/docs/design/
Dreset-design.rst7 resulting in a simplified and more optimised boot flow.
11 specifically for the cold boot path.
38 warm boot to direct CPUs to the right execution path.
42 at the right address, both on a cold and warm reset. Therefore, the boot type
43 detection can be skipped, resulting in the following boot flow:
47 To enable this boot flow, compile TF-A with ``PROGRAMMABLE_RESET_ADDRESS=1``.
54 Cold boot on a single CPU
58 Therefore, the cold boot code has to arbitrate access to hardware resources
60 which is responsible for initialising shared hardware and coordinating the boot
65 applies. This results in the following boot flow:
[all …]
/external/arm-trusted-firmware/docs/plat/marvell/armada/
Dbuild.rst20 > export BL33=path/to/u-boot.bin
22 For example: if U-Boot project (and its images) is located at ``~/project/u-boot``,
23 BL33 should be ``~/project/u-boot/u-boot.bin``
27 *u-boot.bin* should be used and not *u-boot-spl.bin*
70 implementation that is not compatible with Xmodem protocol used for boot image download.
183 For Armada37x0 only, the flash boot device, default is ``SPINOR``.
187 - SPINOR - SPI NOR flash boot
188 - SPINAND - SPI NAND flash boot
191 Download boot loader or program code from eMMC flash into CM3 or CA53
194 - SATA - SATA device boot
[all …]
/external/libese/apps/boot/
DAndroid.bp27 name: "libese-app-boot",
29 srcs: ["boot.c"],
37 name: "libese-app-boot-fortest",
39 srcs: ["boot.c"],
52 name: "ese-boot-tool",
60 "libese-app-boot",
DREADME.md14 The verified boot storage applet provides a mechanism to store this
47 See `ese_boot_lock_*` in include/ese/app/boot.h for the specific interfaces.
56 such that the carrier can determine if the device is allowed to boot an
61 `'ese-boot-tool.cpp':collect_device_data()`. This data is then provided to
138 determine if the boot lock can be changed. It may only be set by the
149 The boot lock is used by the bootloader to control whether it should
150 only boot verified system software or not. When the lock value
151 is cleared (0x0), the bootloader will boot anything. When the lock
152 value is non-zero, it should only boot software that is signed by a key
281 determine a safe delay or recovery path until boot can proceed securely.
[all …]
/external/avb/examples/uefi/
Duefi_avb_boot.c125 AvbPartitionData* boot; in uefi_avb_boot_kernel() local
143 boot = &slot_data->loaded_partitions[0]; in uefi_avb_boot_kernel()
144 if (avb_strcmp(boot->partition_name, "boot") != 0) { in uefi_avb_boot_kernel()
146 "Unexpected partition name '", boot->partition_name, "'.\n", NULL); in uefi_avb_boot_kernel()
151 header = (const boot_img_hdr*)boot->data; in uefi_avb_boot_kernel()
168 if (total_size > boot->data_size) { in uefi_avb_boot_kernel()
185 avb_memcpy(kernel_buf, boot->data + header->page_size, header->kernel_size); in uefi_avb_boot_kernel()
204 avb_memcpy(initramfs_buf, boot->data + offset, header->ramdisk_size); in uefi_avb_boot_kernel()
206 avb_memcpy(initramfs_buf, boot->data + offset, header->second_size); in uefi_avb_boot_kernel()
/external/python/cpython3/Modules/
D_threadmodule.c1031 struct bootstate *boot = (struct bootstate *) boot_raw; in t_bootstrap() local
1035 tstate = boot->tstate; in t_bootstrap()
1040 res = PyObject_Call(boot->func, boot->args, boot->keyw); in t_bootstrap()
1046 _PyErr_WriteUnraisableMsg("in thread started by", boot->func); in t_bootstrap()
1052 Py_DECREF(boot->func); in t_bootstrap()
1053 Py_DECREF(boot->args); in t_bootstrap()
1054 Py_XDECREF(boot->keyw); in t_bootstrap()
1067 struct bootstate *boot; in thread_PyThread_start_new_thread() local
1096 boot = PyMem_NEW(struct bootstate, 1); in thread_PyThread_start_new_thread()
1097 if (boot == NULL) in thread_PyThread_start_new_thread()
[all …]
/external/google-breakpad/src/processor/testdata/
Dmicrodump-withcrashreason.dmp33 …2 F/google-breakpad(25655): M 70D29000 00000000 00806000 E9166D3ED622EE65A3A4086EBEA4A7950 boot.oat
34 …reakpad(25655): M 71531000 00000000 006C0000 668D96384E4368B01BC9B9F365028CA20 boot-core-libart.oat
35 …-breakpad(25655): M 71BF3000 00000000 000AA000 0D160B642FB1639805B72AC6F4DF3F380 boot-conscrypt.oat
36 …gle-breakpad(25655): M 71C9F000 00000000 000D1000 9D69BDC94BD07F2468D5B7DB0AEEF0140 boot-okhttp.oat
37 …breakpad(25655): M 71D72000 00000000 0000C000 566CD32860A984FD445A4852058609CB0 boot-core-junit.oat
38 …eakpad(25655): M 71D80000 00000000 0019F000 09C1E8B1D7FC826CB75691EC5BDBA1DB0 boot-bouncycastle.oat
39 …google-breakpad(25655): M 71F21000 00000000 0014B000 069BAE4D2D7831B857A3C236021D868A0 boot-ext.oat
40 …-breakpad(25655): M 7206E000 00000000 0223E000 D0BEBD37E215DDC845099212203F792F0 boot-framework.oat
41 …ad(25655): M 742AE000 00000000 00502000 B41E052DBA2949CE100713743053E1E40 boot-telephony-common.oat
42 …reakpad(25655): M 747B2000 00000000 0003D000 65E4B1E28F33F9C51062E2D0630394830 boot-voip-common.oat
[all …]

12345678910>>...28