代码搜索:如何学习 bootLoader?

找到约 10,000 项符合「如何学习 bootLoader?」的源代码

代码结果 10,000
www.eeworm.com/read/184038/5250806

s bootloader.s

;/****************************************Copyright (c)************************************************** ;** ;** ;**
www.eeworm.com/read/179911/5293358

lds bootloader.lds

OUTPUT_FORMAT("elf64-ia64-little") OUTPUT_ARCH(ia64) ENTRY(_start) SECTIONS { /* Read-only sections, merged into text segment: */ . = 0x100000; _text = .; .text : { *(__ivt_section) *(.text)
www.eeworm.com/read/179911/5293359

c bootloader.c

/* * arch/ia64/boot/bootloader.c * * Loads an ELF kernel. * * Copyright (C) 1998, 1999 Hewlett-Packard Co * Copyright (C) 1998, 1999 David Mosberger-Tang * Copyright (C) 199
www.eeworm.com/read/179911/5293996

lds bootloader.lds

OUTPUT_FORMAT("elf64-alpha") ENTRY(__start) SECTIONS { . = 0x20000000; .text : { *(.text) } _etext = .; PROVIDE (etext = .); .rodata : { *(.rodata) } .data : { *(.data) CONSTRUCTORS } .g
www.eeworm.com/read/167890/5451523

load_bootloader

#!/bin/sh if(-e ./boot.srec) avr-objcopy --target=srec boot.elf boot.srec #write the fuse so it allows serial programming uisp -dprog=dapa -dlpt=/dev/parport0 --wr_fuse_h=0x10 #erase what's th
www.eeworm.com/read/350097/3128260

lds bootloader.lds

OUTPUT_FORMAT("elf64-ia64-little") OUTPUT_ARCH(ia64) ENTRY(_start) SECTIONS { /* Read-only sections, merged into text segment: */ . = 0x100000; _text = .; .text : { *(__ivt_section) *(.text)
www.eeworm.com/read/350097/3128261

c bootloader.c

/* * arch/ia64/boot/bootloader.c * * Loads an ELF kernel. * * Copyright (C) 1998, 1999 Hewlett-Packard Co * Copyright (C) 1998, 1999 David Mosberger-Tang * Copyright (C) 199
www.eeworm.com/read/350097/3128894

lds bootloader.lds

OUTPUT_FORMAT("elf64-alpha") ENTRY(__start) SECTIONS { . = 0x20000000; .text : { *(.text) } _etext = .; PROVIDE (etext = .); .rodata : { *(.rodata) } .data : { *(.data) CONSTRUCTORS } .g
www.eeworm.com/read/340134/3291750

sym bootloader.sym

00003c00 l d .bootloader 00000000 00003c00 g F .bootloader 000000b8 CFReadSector 00003e52 g F .bootloader 000001ae flash_firmware 00003e26 g F .bootloader 00000020 CFWriteAdr 00003cb8
www.eeworm.com/read/340134/3291777

sym bootloader.sym

00003c00 l d .bootloader 00000000 00003c00 g F .bootloader 000000b8 CFReadSector 00003e52 g F .bootloader 000001ae flash_firmware 00003e26 g F .bootloader 00000020 CFWriteAdr 00003cb8