/bootable/libbootloader/gbl/libgbl/src/ |
D | slots.rs | 34 fn from(u: usize) -> Self { in from() method 39 fn from(u: u8) -> Self { in from() method 51 fn from(u: usize) -> Self { in from() method 56 fn from(u: u8) -> Self { in from() method 74 -i64::from(u32::from(self.0)) in rank() 79 fn from(c: char) -> Self { in from() method 104 fn from(val: Suffix) -> Self { in from() method 137 fn from(val: u8) -> Self { in from() method 149 fn from(reason: UnbootableReason) -> Self { in from() method
|
/bootable/libbootloader/gbl/libstorage/src/ |
D | lib.rs | 141 fn from(err: safemath::Error) -> Self { in from() method 147 fn from(_: core::num::TryFromIntError) -> Self { in from() method 153 fn from(val: BlockIoError) -> Self { in from() method 179 Ok((SafeNum::from(self.block_size) * self.num_blocks).try_into()?) in total_size() 267 (SafeNum::from(self.entry.blocks()?) * self.block_size) in size() 357 Ok((SafeNum::from(self.block_size()?) * self.num_blocks()?).try_into()?) in total_size() 559 let blk_count = SafeNum::from(buffer.len()) / block_size; in check_range() 585 let block_size = SafeNum::from(blk_io.block_size()); in read_aligned_offset_and_buffer() 589 let aligned_read: usize = SafeNum::from(out.len()).round_down(block_size).try_into()?; in read_aligned_offset_and_buffer() 600 let aligned_offset = SafeNum::from(offset) + aligned_read; in read_aligned_offset_and_buffer() [all …]
|
D | gpt.rs | 73 u64::try_from((SafeNum::from(self.last) - self.first) + 1).map_err(|e| e.into()) in blocks() 194 let entries_size = SafeNum::from(info.max_entries) * GPT_ENTRY_SIZE; in from_existing() 195 let header_size: usize = SafeNum::from(GPT_HEADER_SIZE_PADDED).try_into()?; in from_existing() 212 let entries_size = SafeNum::from(max_entries) * GPT_ENTRY_SIZE; in required_buffer_size() 262 (SafeNum::from(blk_dev.num_blocks()) - 1) * blk_dev.block_size(), in validate_gpt() 275 let entries_size = SafeNum::from(header.entries_count) * GPT_ENTRY_SIZE; in validate_gpt() 276 let entries_offset = SafeNum::from(header.entries) * blk_dev.block_size(); in validate_gpt() 279 > ((SafeNum::from(blk_dev.num_blocks()) - 1) * blk_dev.block_size()).try_into()? in validate_gpt() 284 let crc32_offset = SafeNum::from(GPT_CRC32_OFFSET).try_into()?; in validate_gpt() 318 let primary_entries_pos = SafeNum::from(primary_entries_blk) * block_size; in load_and_sync() [all …]
|
D | testlib.rs | 179 let offset = (SafeNum::from(*blk_offset) * self.block_size).try_into().unwrap(); in check_status() 224 fn from(data: &[u8]) -> Self { in from() method 393 DiskDescription::Disk(BackingStore::Data(slice)) => Vec::from(slice), in build() 448 let entry_blocks: u64 = ((SafeNum::from(partitions.len()) * std::mem::size_of::<GptEntry>()) in partitions_to_disk_data() 475 let last = (SafeNum::from(v.size()).round_up(block_size) / block_size + block - 1) in partitions_to_disk_data()
|
/bootable/libbootloader/gbl/third_party/libzbi/ |
D | README.md | 9 Currently [`sdk/lib/zbi-format`](sdk/lib/zbi-format) is not ready to provide Rust bindings from FID… 10 So we are using `buildgen` generated version from C headers: [`src/firmware/lib/zbi-rs/src/zbi_form… 22 To get just `zbi-rs` from Fuchsia following commands can be used:
|
/bootable/recovery/minadbd/ |
D | Android.bp | 19 // all of the 'license_kinds' from "bootable_recovery_license" 101 "android.hardware.health-V3-ndk", // from librecovery_utils 133 "android.hardware.health-V3-ndk", // from librecovery_utils
|
/bootable/recovery/updater_sample/ |
D | README.md | 27 In real-life update system the config files expected to be served from a server 32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app 61 1. If sample app is unbound from update_engine (MainActivity is paused, destroyed), 68 `cancel` and `applyPayload` (which picks up from where it left). 92 - `Reload` - reloads update configs from device storage. 105 ## Sending HTTP headers from UpdateEngine 159 The commands are expected to be run from `$ANDROID_BUILD_TOP` and for demo 201 9. Push OTA packages to the device if there is no server to stream packages from; 221 - [x] Add UpdateManager; extract update logic from MainActivity 222 - [x] Add Sample app update state (separate from update_engine status) [all …]
|
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|
/bootable/libbootloader/gbl/docs/ |
D | EFI_ANDROID_BOOT_PROTOCOL.md | 174 USB interface started by `FastbootUsbInterfaceStart()` from the USB descriptors. 176 device from the host. 191 Receives a USB packet from the interface started by 222 packet from the Fastboot USB interface into the provided buffer. 231 | EFI_NOT_READY | No packet has been received from the interface.| 239 Sends a USB packet from the USB interface started by
|
/bootable/libbootloader/gbl/ |
D | bazel.MODULE.bazel | 17 Ideally, MODULE.bazel from Kleaf should be used instead because Kleaf is the 24 # TODO(b/328465178): Use MODULE.bazel from Kleaf instead.
|
D | MODULE.bazel | 3 # Please consider migrating your external dependencies from WORKSPACE to MODULE.bazel.
|
D | README.md | 5 can be loaded directly from the firmware. 9 The GBL project are intended to be built from the
|
/bootable/recovery/fonts/ |
D | README | 3 from:
|
/bootable/libbootloader/gbl/libfastboot/src/ |
D | lib.rs | 193 fn from(val: T) -> Self { in from() method 1204 fastboot_impl.vars = BTreeMap::from(vars); in test_get_var() 1220 VecDeque::<Vec<u8>>::from([ in test_get_var() 1241 fastboot_impl.vars = BTreeMap::from(vars); in test_get_var_all() 1250 VecDeque::<Vec<u8>>::from([ in test_get_var_all() 1277 VecDeque::<Vec<u8>>::from([b"DATA0x400".into(), b"OKAY".into(),]) in test_download() 1312 assert_eq!(transport.out_queue, VecDeque::<Vec<u8>>::from([msg.as_bytes().into()])); in test_download_size() 1339 VecDeque::<Vec<u8>>::from([ in test_download_more_than_expected() 1371 VecDeque::<Vec<u8>>::from([ in test_oem_cmd() 1402 VecDeque::<Vec<u8>>::from([b"DATA0x400".into(), b"OKAY".into(), b"OKAY".into(),]) in test_flash() [all …]
|
/bootable/libbootloader/gbl/libefi/src/ |
D | lib.rs | 102 fn from(efi_status: EfiStatus) -> EfiError { in from() method 1042 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_open_close_protocol() 1099 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_null_efi_method() 1126 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_NOT_FOUND)]); in test_error_efi_method() 1148 VecDeque::from([(located_handles.len(), located_handles.as_mut_ptr())]); in test_locate_handle_buffer_by_protocol() 1182 VecDeque::from([(located_handles.len(), located_handles.as_mut_ptr())]); in test_find_first_and_open() 1189 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_find_first_and_open() 1236 VecDeque::from([(map_key, 1 * size_of::<EfiMemoryDescriptor>())]); in test_exit_boot_services() 1301 VecDeque::from([(map_key, 2 * size_of::<EfiMemoryDescriptor>())]); in test_exit_boot_services_unaligned_buffer()
|
/bootable/libbootloader/gbl/libefi/src/protocol/ |
D | simple_text_output.rs | 65 fn from(_: core::fmt::Error) -> EfiError { in from() method
|
/bootable/recovery/ |
D | README.md | 16 # Manually choose `Recovery mode` from bootloader menu. 59 When running recovery image from debuggable builds (i.e. `-eng` or `-userdebug` build variants, or 68 Although `/system/bin/adbd` is built from the same code base as the one in the normal boot, only a 70 `adb pull` etc. Since Android Q, `adb shell` no longer requires manually mounting `/system` from
|
D | NOTICE | 43 "Object" form shall mean any form resulting from mechanical 54 form, that is based on (or derived from) the Work and for which the 58 separable from, or merely link (or bind by name) to the interfaces of, 115 attribution notices from the Source form of the Work, 132 or as an addendum to the NOTICE text from the Work, provided
|
/bootable/libbootloader/gbl/toolchain/ |
D | gbl_workspace_util.bzl | 133 """Assemble a rust toolchain repo from the Android rust prebuilts repo. 135 The Android rust prebuilts repo is expected to be from 149 # Ignore native BUILD file as we'll use override from `ctx.attr.build_file` instead.
|
/bootable/recovery/tools/image_generator/ |
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|
/bootable/recovery/tools/recovery_l10n/ |
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|
/bootable/recovery/uncrypt/ |
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|
/bootable/recovery/fuse_sideload/ |
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|
/bootable/deprecated-ota/ |
D | NOTICE | 43 "Object" form shall mean any form resulting from mechanical 54 form, that is based on (or derived from) the Work and for which the 58 separable from, or merely link (or bind by name) to the interfaces of, 115 attribution notices from the Source form of the Work, 132 or as an addendum to the NOTICE text from the Work, provided
|
/bootable/deprecated-ota/edify/ |
D | Android.bp | 18 // all of the 'license_kinds' from "bootable_recovery_license"
|