/external/fsck_msdos/ |
D | boot.c | 48 readboot(int dosfs, struct bootblock *boot) in readboot() argument 65 memset(boot, 0, sizeof *boot); in readboot() 66 boot->ValidFat = -1; in readboot() 71 boot->bpbBytesPerSec = block[11] + (block[12] << 8); in readboot() 72 if (boot->bpbBytesPerSec < DOSBOOTBLOCKSIZE_REAL || in readboot() 73 boot->bpbBytesPerSec > DOSBOOTBLOCKSIZE || in readboot() 74 !powerof2(boot->bpbBytesPerSec)) { in readboot() 75 pfatal("Invalid sector size: %u", boot->bpbBytesPerSec); in readboot() 80 boot->bpbSecPerClust = block[13]; in readboot() 81 if (boot->bpbSecPerClust == 0 || !powerof2(boot->bpbSecPerClust)) { in readboot() [all …]
|
D | fat.c | 170 struct bootblock *boot; member 525 return (fat->boot); in boot_of_() 559 const struct bootblock *boot = boot_of_(fat); in valid_cl() local 561 return (cl >= CLUST_FIRST && cl < boot->NumClusters); in valid_cl() 582 checkdirty(int fs, struct bootblock *boot) in checkdirty() argument 589 if (boot->ClustMask != CLUST16_MASK && boot->ClustMask != CLUST32_MASK) in checkdirty() 592 off = boot->bpbResSectors; in checkdirty() 593 off *= boot->bpbBytesPerSec; in checkdirty() 595 buffer = malloc(len = boot->bpbBytesPerSec); in checkdirty() 606 if ((size_t)read(fs, buffer, boot->bpbBytesPerSec) != in checkdirty() [all …]
|
D | check.c | 52 struct bootblock boot; in checkfilesys() local 81 if (readboot(dosfs, &boot) == FSFATAL) { in checkfilesys() 87 if (skipclean && preen && checkdirty(dosfs, &boot)) { in checkfilesys() 98 mod |= readfat(dosfs, &boot, &fat); in checkfilesys() 134 freebytes = (int64_t)boot.NumFree * boot.ClusterSize; in checkfilesys() 135 badbytes = (int64_t)boot.NumBad * boot.ClusterSize; in checkfilesys() 142 if (boot.NumBad) { in checkfilesys() 147 boot.NumFiles, freestr, boot.NumFree, in checkfilesys() 148 badstr, boot.NumBad); in checkfilesys() 151 boot.NumFiles, freestr, boot.NumFree); in checkfilesys() [all …]
|
D | dir.c | 227 struct bootblock *boot; in resetDosDirSection() local 229 boot = fat_get_boot(fat); in resetDosDirSection() 231 rootdir_size = boot->bpbRootDirEnts * 32; in resetDosDirSection() 232 cluster_size = boot->bpbSecPerClust * boot->bpbBytesPerSec; in resetDosDirSection() 253 if (boot->flags & FAT32) { in resetDosDirSection() 254 if (!fat_is_cl_head(fat, boot->bpbRootClust)) { in resetDosDirSection() 258 rootDir->head = boot->bpbRootClust; in resetDosDirSection() 304 struct bootblock *boot; in delete() local 306 boot = fat_get_boot(fat); in delete() 308 clsz = boot->bpbSecPerClust * boot->bpbBytesPerSec; in delete() [all …]
|
/external/mtools/ |
D | mformat.c | 49 static uint16_t init_geometry_boot(union bootsector *boot, struct device *dev, in init_geometry_boot() argument 58 set_word(boot->boot.nsect, dev->sectors); in init_geometry_boot() 59 set_word(boot->boot.nheads, dev->heads); in init_geometry_boot() 66 set_word(boot->boot.psect, (uint16_t) *tot_sectors); in init_geometry_boot() 67 set_dword(boot->boot.bigsect, 0); in init_geometry_boot() 68 set_word(boot->boot.nhs, (uint16_t) dev->hidden); in init_geometry_boot() 70 set_word(boot->boot.psect, 0); in init_geometry_boot() 71 set_dword(boot->boot.bigsect, (uint32_t) *tot_sectors); in init_geometry_boot() 72 set_dword(boot->boot.nhs, dev->hidden); in init_geometry_boot() 80 strncpy(boot->boot.banner, "2M-STV04", 8); in init_geometry_boot() [all …]
|
D | init.c | 44 static int read_boot(Stream_t *Stream, union bootsector * boot, size_t size) in read_boot() argument 54 if (force_pread(Stream, boot->characters, 0, size) != (ssize_t) size) in read_boot() 58 if(boot_sector_size < sizeof(boot->bytes)) { in read_boot() 60 memset(boot->bytes+boot_sector_size, 0, in read_boot() 61 sizeof(boot->bytes) - boot_sector_size); in read_boot() 100 static int get_media_type(Stream_t *St, union bootsector *boot) in get_media_type() argument 104 media = boot->boot.descr; in get_media_type() 127 union bootsector *boot) { in boot_to_geom() argument 171 labelBlock = &boot->boot.ext.old.labelBlock; in boot_to_geom() 173 labelBlock = &boot->boot.ext.fat32.labelBlock; in boot_to_geom() [all …]
|
D | minfo.c | 40 static void displayInfosector(Stream_t *Stream, union bootsector *boot) in displayInfosector() argument 62 static uint32_t getHidden(union bootsector *boot) { in getHidden() argument 66 static void displayBPB(Stream_t *Stream, union bootsector *boot) { in displayBPB() argument 71 printf("banner:\"%.8s\"\n", boot->boot.banner); in displayBPB() 73 printf("cluster size: %d sectors\n", boot->boot.clsiz); in displayBPB() 75 printf("fats: %d\n", boot->boot.nfat); in displayBPB() 79 printf("media descriptor byte: 0x%x\n", boot->boot.descr); in displayBPB() 83 printf("hidden sectors: %d\n", getHidden(boot)); in displayBPB() 88 labelBlock = &boot->boot.ext.old.labelBlock; in displayBPB() 90 labelBlock = &boot->boot.ext.fat32.labelBlock; in displayBPB() [all …]
|
D | mlabel.c | 126 union bootsector boot; in mlabel() local 286 have_boot = (force_pread(Fs,boot.characters,0,sizeof(boot)) == in mlabel() 287 sizeof(boot)); in mlabel() 291 labelBlock = &boot.boot.ext.old.labelBlock; in mlabel() 293 labelBlock = &boot.boot.ext.fat32.labelBlock; in mlabel() 307 if(have_boot && boot.boot.descr >= 0xf0 && has_BPB4) { in mlabel() 316 if(have_boot && boot.boot.descr >= 0xf0 && has_BPB4) { in mlabel() 323 force_pwrite(Fs, (char *)&boot, 0, sizeof(boot)); in mlabel() 327 force_pwrite(Fs, (char *)&boot, in mlabel() 329 sizeof(boot)); in mlabel()
|
D | msdos.h | 192 struct bootsector_s boot; member 195 #define CHAR(x) (boot->x[0]) 196 #define WORD(x) (_WORD(boot->boot.x)) 197 #define DWORD(x) (_DWORD(boot->boot.x)) 199 #define WORD_S(x) (_WORD(boot.boot.x)) 200 #define DWORD_S(x) (_DWORD(boot.boot.x)) 202 #define OFFSET(x) (((char *) (boot->x)) - ((char *)(boot->jump)))
|
D | fat.c | 661 static int check_media_type(Fs_t *This, union bootsector *boot) in check_media_type() argument 686 if((address[0] != boot->boot.descr && boot->boot.descr >= 0xf0 && in check_media_type() 688 || boot->boot.descr != 0xf0)) || address[0] < 0xf0) { in check_media_type() 692 boot->boot.descr); in check_media_type() 704 static int fat_32_read(Fs_t *This, union bootsector *boot) in fat_32_read() argument 709 This->writeAllFats = !(boot->boot.ext.fat32.extFlags[0] & 0x80); in fat_32_read() 710 This->primaryFat = boot->boot.ext.fat32.extFlags[0] & 0xf; in fat_32_read() 732 return(check_media_type(This, boot) || check_fat(This)); in fat_32_read() 736 static int old_fat_read(Fs_t *This, union bootsector *boot, int nodups) in old_fat_read() argument 746 if(check_media_type(This, boot)) in old_fat_read() [all …]
|
/external/arm-trusted-firmware/docs/plat/ |
D | warp7.rst | 20 We need to use a file generated by u-boot in order to generate a .imx image the 21 BootROM will boot. It is therefore _required_ to build u-boot before TF-A and 22 furthermore it is _recommended_ to use the mkimage in the u-boot/tools directory 28 https://git.linaro.org/landing-teams/working/mbl/u-boot.git 34 make u-boot.imx arch=ARM CROSS_COMPILE=arm-linux-gnueabihf- 53 - u-boot.bin 54 The binary output from the u-boot instructions above 78 BL33=fiptool_images/u-boot.bin certificates all 80 …/path/to/u-boot/tools/mkimage -n /path/to/u-boot/u-boot.cfgout -T imximage -e 0x9df00000 -d ./buil… 87 cp /path/to/uboot/u-boot.bin fiptool_images [all …]
|
D | imx8m.rst | 15 Bootrom --> SPL --> BL31 --> BL33(u-boot) --> Linux kernel 25 - Build spl and u-boot firstly, and get binary images: u-boot-spl.bin, 26 u-boot-nodtb.bin and dtb for the target board. 44 TF-A binary(bl31.bin), u-boot-spl.bin u-boot-nodtb.bin and dtb are combined 47 with certain offset for BOOT ROM. the u-boot and imx-mkimage will be upstreamed 54 boot sequence to support TBBR. 56 Bootrom --> SPL --> BL2 --> BL31 --> BL33(u-boot with UEFI) --> grub 61 In U-boot we turn on the UEFI secure boot features so it can verify
|
D | brcm-stingray.rst | 16 Bootrom --> TF-A BL2 --> TF-A BL31 --> BL33(u-boot) 31 - Build u-boot first, and get the binary image: u-boot.bin, 39 … make CROSS_COMPILE=aarch64-linux-gnu- PLAT=stingray BOARD_CFG=bcm958742t all fip BL33=u-boot.bin 43 The u-boot will be upstreamed soon, this doc will be updated once they are ready, and the link will…
|
D | poplar.rst | 29 At the start of the boot sequence, the bootROM executes the so called l-loader 35 l-loader --> Trusted Firmware-A --> u-boot 49 - u-boot: 50 `link <http://git.denx.de/u-boot.git>`__ 60 - Build u-boot using poplar_defconfig 67 - Build atf providing the previously generated u-boot.bin as the BL33 image 72 BL33=u-boot.bin 88 The system will boot into a u-boot shell which you can then use to write the 102 Entry boot auxiliary code
|
/external/python/cpython2/Modules/ |
D | threadmodule.c | 611 struct bootstate *boot = (struct bootstate *) boot_raw; in t_bootstrap() local 615 tstate = boot->tstate; in t_bootstrap() 621 boot->func, boot->args, boot->keyw); in t_bootstrap() 633 PyFile_WriteObject(boot->func, file, 0); in t_bootstrap() 635 PyObject_Print(boot->func, stderr, 0); in t_bootstrap() 643 Py_DECREF(boot->func); in t_bootstrap() 644 Py_DECREF(boot->args); in t_bootstrap() 645 Py_XDECREF(boot->keyw); in t_bootstrap() 657 struct bootstate *boot; in thread_PyThread_start_new_thread() local 678 boot = PyMem_NEW(struct bootstate, 1); in thread_PyThread_start_new_thread() [all …]
|
/external/arm-trusted-firmware/docs/plat/arm/fvp-ve/ |
D | index.rst | 13 BL1 --> BL2 --> BL32(sp_min) --> BL33(u-boot) --> Linux kernel 20 - `U-boot <https://git.linaro.org/landing-teams/working/arm/u-boot.git>`__ 31 - Fetch and build u-boot. 38 Make the u-boot binary for Cortex-A5 using the command: 44 Make the u-boot binary for Cortex-A7 using the command: 59 ARM_XLAT_TABLES_LIB_V1=1 BL33=<path_to_u-boot.bin> all fip 67 BL33=<path_to_u-boot.bin> all fip 72 The following model parameters should be used to boot Linux using the build of
|
/external/arm-trusted-firmware/docs/plat/marvell/armada/ |
D | build.rst | 20 > export BL33=path/to/u-boot.bin 22 For example: if U-Boot project (and its images) is located at ``~/project/u-boot``, 23 BL33 should be ``~/project/u-boot/u-boot.bin`` 27 *u-boot.bin* should be used and not *u-boot-spl.bin* 71 implementation that is not compatible with Xmodem protocol used for boot image download. 212 The flash boot device, default is ``SPINOR``. 216 - SPINOR - SPI NOR flash boot 217 - SPINAND - SPI NAND flash boot 220 Download boot loader or program code from eMMC flash into CM3 or CA53 223 - SATA - SATA device boot [all …]
|
/external/toolchain-utils/debug_info_test/ |
D | ngcc_dso_path.allowlist | 6 .*/boot/u-boot\.debug 7 .*/boot/vmlinux\.debug 8 .*/uboot/u-boot\.debug 9 .*/firmware/u-boot\.debug
|
/external/arm-trusted-firmware/docs/design/ |
D | reset-design.rst | 7 resulting in a simplified and more optimised boot flow. 11 specifically for the cold boot path. 38 warm boot to direct CPUs to the right execution path. 42 at the right address, both on a cold and warm reset. Therefore, the boot type 43 detection can be skipped, resulting in the following boot flow: 47 To enable this boot flow, compile TF-A with ``PROGRAMMABLE_RESET_ADDRESS=1``. 54 Cold boot on a single CPU 58 Therefore, the cold boot code has to arbitrate access to hardware resources 60 which is responsible for initialising shared hardware and coordinating the boot 65 applies. This results in the following boot flow: [all …]
|
/external/libese/apps/boot/ |
D | Android.bp | 27 name: "libese-app-boot", 29 srcs: ["boot.c"], 37 name: "libese-app-boot-fortest", 39 srcs: ["boot.c"], 52 name: "ese-boot-tool", 60 "libese-app-boot",
|
D | README.md | 14 The verified boot storage applet provides a mechanism to store this 47 See `ese_boot_lock_*` in include/ese/app/boot.h for the specific interfaces. 56 such that the carrier can determine if the device is allowed to boot an 61 `'ese-boot-tool.cpp':collect_device_data()`. This data is then provided to 138 determine if the boot lock can be changed. It may only be set by the 149 The boot lock is used by the bootloader to control whether it should 150 only boot verified system software or not. When the lock value 151 is cleared (0x0), the bootloader will boot anything. When the lock 152 value is non-zero, it should only boot software that is signed by a key 281 determine a safe delay or recovery path until boot can proceed securely. [all …]
|
/external/avb/examples/uefi/ |
D | uefi_avb_boot.c | 125 AvbPartitionData* boot; in uefi_avb_boot_kernel() local 143 boot = &slot_data->loaded_partitions[0]; in uefi_avb_boot_kernel() 144 if (avb_strcmp(boot->partition_name, "boot") != 0) { in uefi_avb_boot_kernel() 146 "Unexpected partition name '", boot->partition_name, "'.\n", NULL); in uefi_avb_boot_kernel() 151 header = (const boot_img_hdr*)boot->data; in uefi_avb_boot_kernel() 168 if (total_size > boot->data_size) { in uefi_avb_boot_kernel() 185 avb_memcpy(kernel_buf, boot->data + header->page_size, header->kernel_size); in uefi_avb_boot_kernel() 204 avb_memcpy(initramfs_buf, boot->data + offset, header->ramdisk_size); in uefi_avb_boot_kernel() 206 avb_memcpy(initramfs_buf, boot->data + offset, header->second_size); in uefi_avb_boot_kernel()
|
/external/google-breakpad/src/processor/testdata/ |
D | microdump-withcrashreason.dmp | 33 …2 F/google-breakpad(25655): M 70D29000 00000000 00806000 E9166D3ED622EE65A3A4086EBEA4A7950 boot.oat 34 …reakpad(25655): M 71531000 00000000 006C0000 668D96384E4368B01BC9B9F365028CA20 boot-core-libart.oat 35 …-breakpad(25655): M 71BF3000 00000000 000AA000 0D160B642FB1639805B72AC6F4DF3F380 boot-conscrypt.oat 36 …gle-breakpad(25655): M 71C9F000 00000000 000D1000 9D69BDC94BD07F2468D5B7DB0AEEF0140 boot-okhttp.oat 37 …breakpad(25655): M 71D72000 00000000 0000C000 566CD32860A984FD445A4852058609CB0 boot-core-junit.oat 38 …eakpad(25655): M 71D80000 00000000 0019F000 09C1E8B1D7FC826CB75691EC5BDBA1DB0 boot-bouncycastle.oat 39 …google-breakpad(25655): M 71F21000 00000000 0014B000 069BAE4D2D7831B857A3C236021D868A0 boot-ext.oat 40 …-breakpad(25655): M 7206E000 00000000 0223E000 D0BEBD37E215DDC845099212203F792F0 boot-framework.oat 41 …ad(25655): M 742AE000 00000000 00502000 B41E052DBA2949CE100713743053E1E40 boot-telephony-common.oat 42 …reakpad(25655): M 747B2000 00000000 0003D000 65E4B1E28F33F9C51062E2D0630394830 boot-voip-common.oat [all …]
|
/external/python/cpython3/Modules/ |
D | _threadmodule.c | 1069 thread_bootstate_free(struct bootstate *boot) in thread_bootstate_free() argument 1071 Py_DECREF(boot->func); in thread_bootstate_free() 1072 Py_DECREF(boot->args); in thread_bootstate_free() 1073 Py_XDECREF(boot->kwargs); in thread_bootstate_free() 1074 PyMem_Free(boot); in thread_bootstate_free() 1081 struct bootstate *boot = (struct bootstate *) boot_raw; in thread_run() local 1084 tstate = boot->tstate; in thread_run() 1090 PyObject *res = PyObject_Call(boot->func, boot->args, boot->kwargs); in thread_run() 1096 _PyErr_WriteUnraisableMsg("in thread started by", boot->func); in thread_run() 1103 thread_bootstate_free(boot); in thread_run() [all …]
|
/external/autotest/server/site_tests/firmware_ConsecutiveBootPowerButton/ |
D | control.100 | 9 PURPOSE = "Servo based consecutive boot test (100 iterations)" 10 CRITERIA = "This test will fail if DUT fails to boot from power-off" 20 does boot into Chrome OS and then does power off later. 22 Runs 100 boot iterations.
|