| /freebsd/tools/tools/git/ghpr/ |
| H A D | ghpr-stage.sh | 11 local staging=$1 16 git rebase -i ${base} ${staging} 20 staging=staging 24 if [ "$(git config branch.${staging}.opabinia)" != "true" ]; then 25 die "Branch ${staging} has not been initialized" 28 base=$(git config branch.${staging}.opabinia.base) 29 [ -n "${base}" ] || die "No base set on ${staging}" 31 if [ -z "$(git config --get-all branch.${staging}.opabinia.prs)" ]; then 33 update_to_upstream ${staging} ${base} 35 # Otherwise checkout staging as is [all …]
|
| H A D | ghpr-push.sh | 10 staging=staging 22 for pr in $(git config --get-all branch.${staging}.opabinia.prs); do 23 upstream=$(git config --get branch.${staging}.opabinia.${pr}.upstream) 24 upstream_branch=$(git config --get branch.${staging}.opabinia.${pr}.upstream-branch) 31 git rebase freebsd/main ${staging} 42 for pr in $(git config --get-all branch.${staging}.opabinia.prs); do 48 git config --remove-section branch.${staging}.opabinia.${pr} 50 git config --remove-section branch.${staging}.opabinia 51 git branch -D ${staging}
|
| H A D | ghpr-init.sh | 10 # Create a fresh branch for the staging tree. 11 BRANCH=${1:-staging}
|
| /freebsd/stand/efi/loader/ |
| H A D | copy.c | 141 printf("Can't find valid memory map for staging area!\n"); in efi_verify_staging_size() 163 printf("Staging area's size is reduced: %ld -> %ld!\n", in efi_verify_staging_size() 191 EFI_PHYSICAL_ADDRESS staging, staging_end, staging_base; variable 236 printf("copy staging: %s\n", mode[copy_staging]); in command_copy_staging() 244 COMMAND_SET(copy_staging, "copy_staging", "copy staging", command_copy_staging); 268 printf("staging slop %#lx\n", staging_slop); in command_staging_slop() 276 COMMAND_SET(staging_slop, "staging_slop", "set staging slop", 281 * The staging area must reside in the first 1GB or 4GB physical 331 staging = get_staging_max(); in efi_copy_init() 334 nr_pages, &staging); in efi_copy_init() [all …]
|
| /freebsd/stand/kboot/kboot/arch/amd64/ |
| H A D | elf64_freebsd.c | 168 vm_offset_t staging; in elf64_exec() local 183 * physical memory where loading is possible (staging). in elf64_exec() 191 staging = trampolinebase = kboot_get_phys_load_segment(); in elf64_exec() 322 /* this maps past staging area */ in elf64_exec() 324 PT2_u0[i] = ((pd_entry_t)staging + in elf64_exec() 373 /* this maps past staging area */ in elf64_exec() 378 * kboot's staging + 2MB. For UEFI we do 'i - 1' since we load in elf64_exec() 379 * the kernel right at staging (and assume the first address we in elf64_exec() 380 * load is 2MB in efi_copyin). However for kboot, staging + 1 * in elf64_exec() 381 * NBPDR == staging + 2MB which is where the kernel starts. Our in elf64_exec() [all …]
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/MCA/ |
| H A D | IncrementalSourceMgr.h | 35 std::deque<Instruction *> Staging; variable 61 bool hasNext() const override { return !Staging.empty(); } in hasNext() 66 return SourceRef(TotalCounter, *Staging.front()); in peekNext() 72 Staging.push_back(InstStorage.back().get()); in addInst() 76 void addRecycledInst(Instruction *Inst) { Staging.push_back(Inst); } in addRecycledInst()
|
| /freebsd/contrib/unbound/util/ |
| H A D | edns.c | 326 /* For staging cookies, write a fresh cookie. */ in add_cookie_secret() 347 /* New cookie secret becomes the staging secret (position 1) in activate_cookie_secret() 349 * secret. If the UNBOUND_COOKIE_HISTORY_SIZE > 2 then all staging cookies in activate_cookie_secret() 375 /* The staging secret becomes the active secret. in drop_cookie_secret() 376 * The active secret becomes a staging secret. in drop_cookie_secret() 377 * If the UNBOUND_COOKIE_HISTORY_SIZE > 2 then all staging secrets are moved in drop_cookie_secret() 379 * staging secret. in drop_cookie_secret() 396 /* Drops a staging cookie secret. If there are more than one, it will 397 * drop the last staging secret. */
|
| H A D | edns.h | 250 * the active secret. Otherwise it will become the staging secret. 252 * Staging secrets are only used to verify DNS Cookies. Caller has to lock. 258 * Makes the staging cookie secret active and the active secret staging. 264 * Drop a cookie secret. Drops the staging secret. An active secret will not
|
| /freebsd/crypto/openssl/VMS/ |
| H A D | msg_staging.com | 5 $ ! P1 staging software installation directory 6 $ ! P2 staging data installation directory 19 $ WRITE SYS$OUTPUT "Staging installation complete"
|
| /freebsd/stand/kboot/kboot/arch/aarch64/ |
| H A D | exec.c | 109 vm_offset_t staging; in elf64_exec() local 193 * possible (staging). in elf64_exec() 202 staging = kboot_get_phys_load_segment(); in elf64_exec() 203 printf("Load address at %#jx\n", (uintmax_t)staging); in elf64_exec() 240 trampoline_data->entry = ehdr->e_entry - fp->f_addr + staging; in elf64_exec() 249 efi_map_phys_dst = md->md_addr + staging + in elf64_exec() 267 trampolinebase = staging + (kernendp - fp->f_addr); in elf64_exec()
|
| /freebsd/contrib/llvm-project/llvm/lib/MCA/ |
| H A D | IncrementalSourceMgr.cpp | 23 Staging.clear(); in clear() 31 Instruction *I = Staging.front(); in updateNext() 32 Staging.pop_front(); in updateNext()
|
| /freebsd/stand/efi/loader/arch/i386/ |
| H A D | elf64_freebsd.c | 163 /* Copy staging enabled */ in elf64_exec() 241 /* this maps past staging area */ in elf64_exec() 243 PT2_u0[i] = (staging + (i - 1) * M(2)) in elf64_exec() 249 "staging %#llx (%scopying) tramp %p PT4 %p GDT %p\n" in elf64_exec() 250 "Start @ %#llx ...\n", staging, in elf64_exec()
|
| /freebsd/share/mk/ |
| H A D | bsd.opts.mk | 91 STAGING_MAN/STAGING \ 92 STAGING_PROG/STAGING \ 93 STALE_STAGED/STAGING \
|
| H A D | meta.stage.mk | 73 # a staging conflict should cause an error 95 # common logic for staging files 316 staging: ${STAGE_TARGETS:N*_links} ${STAGE_TARGETS:M*_links} 325 # generally we want staging to wait until everything else is done 329 all: ${STAGING_WAIT} staging 337 # if ${INSTALL} gets run during 'all' assume it is for staging? 358 stale_staged: staging .NOMETA
|
| H A D | src.init.linux.mk | 17 # for sane staging behavior
|
| /freebsd/stand/efi/loader/arch/amd64/ |
| H A D | elf64_freebsd.c | 199 /* this maps past staging area */ in elf64_exec() 201 PT2_u0[i] = ((pd_entry_t)staging + in elf64_exec() 207 printf("staging %#lx (%scopying) tramp %p PT4 %p\n", in elf64_exec() 208 staging, copy_staging == COPY_STAGING_ENABLE ? "" : "not ", in elf64_exec()
|
| /freebsd/contrib/bmake/mk/ |
| H A D | meta.stage.mk | 73 # a staging conflict should cause an error 97 # common logic for staging files 331 staging: ${STAGE_TARGETS:N*_links} ${STAGE_TARGETS:M*_links} 340 # generally we want staging to wait until everything else is done 344 all: ${STAGING_WAIT} staging 352 # if ${INSTALL} gets run during 'all' assume it is for staging? 373 stale_staged: staging .NOMETA
|
| H A D | own.mk | 106 STAGING_MAN/STAGING \ 107 STAGING_PROG/STAGING \
|
| /freebsd/stand/man/ |
| H A D | loader.efi.8 | 220 .Ss Staging Slop 255 Force-disable copying staging area to 258 Force-enable copying staging area to 279 BIOS loaders on i386 and amd64 put the staging area starting
|
| /freebsd/contrib/unbound/doc/ |
| H A D | unbound-control.8 | 507 Cookie secrets can be either \fIactive\fR or \fIstaging\fR. \fIActive\fR cookie 509 succeeds with any of the \fIactive\fR or \fIstaging\fR cookie secrets. The 515 is added as \fIstaging\fR or replacing an existing \fIstaging\fR secret. 518 added as staging secret to \fBall\fR nodes in the anycast set. When \fBall\fR 529 Drop the \fIstaging\fR cookie secret. 532 Make the current \fIstaging\fR cookie secret \fIactive\fR, and the current 533 \fIactive\fR cookie secret \fIstaging\fR.
|
| H A D | unbound-control.8.in | 767 Cookie secrets can be either \fBactive\fP or \fBstaging\fP\&. 769 of a DNS Cookie succeeds with any of the \fBactive\fP or \fBstaging\fP cookie 778 \fBstaging\fP or replacing an existing \fBstaging\fP secret. 781 The new secret has to be added as \fBstaging\fP secret to \fBall\fP nodes in 801 Drop the \fBstaging\fP cookie secret. 806 Make the current \fBstaging\fP cookie secret \fBactive\fP, and the current 807 \fBactive\fP cookie secret \fBstaging\fP\&.
|
| /freebsd/sys/opencrypto/ |
| H A D | cbc_mac.c | 103 * the staging block when necessary. in AES_CBC_MAC_Update() 111 * copying to the staging block. in AES_CBC_MAC_Update()
|
| /freebsd/tools/build/options/ |
| H A D | WITH_STAGING_PROG | 1 Enable staging of PROGs to stage tree.
|
| H A D | WITH_STAGING_MAN | 1 Enable staging of man pages to stage tree.
|
| H A D | WITH_STAGING | 1 Enable staging of files to a stage tree.
|