/third_party/FreeBSD/sbin/fsck_msdosfs/ |
D | boot.c | 48 readboot(int dosfs, struct bootblock *boot) in readboot() argument 65 memset(boot, 0, sizeof *boot); in readboot() 66 boot->ValidFat = -1; in readboot() 71 boot->bpbBytesPerSec = block[11] + (block[12] << 8); in readboot() 72 if (boot->bpbBytesPerSec < DOSBOOTBLOCKSIZE_REAL || in readboot() 73 boot->bpbBytesPerSec > DOSBOOTBLOCKSIZE || in readboot() 74 !powerof2(boot->bpbBytesPerSec)) { in readboot() 75 pfatal("Invalid sector size: %u", boot->bpbBytesPerSec); in readboot() 80 boot->bpbSecPerClust = block[13]; in readboot() 81 if (boot->bpbSecPerClust == 0 || !powerof2(boot->bpbSecPerClust)) { in readboot() [all …]
|
D | fat.c | 170 struct bootblock *boot; member 525 return (fat->boot); in boot_of_() 559 const struct bootblock *boot = boot_of_(fat); in valid_cl() local 561 return (cl >= CLUST_FIRST && cl < boot->NumClusters); in valid_cl() 582 checkdirty(int fs, struct bootblock *boot) in checkdirty() argument 589 if (boot->ClustMask != CLUST16_MASK && boot->ClustMask != CLUST32_MASK) in checkdirty() 592 off = boot->bpbResSectors; in checkdirty() 593 off *= boot->bpbBytesPerSec; in checkdirty() 595 buffer = malloc(len = boot->bpbBytesPerSec); in checkdirty() 606 if ((size_t)read(fs, buffer, boot->bpbBytesPerSec) != in checkdirty() [all …]
|
D | check.c | 52 struct bootblock boot; in checkfilesys() local 81 if (readboot(dosfs, &boot) == FSFATAL) { in checkfilesys() 87 if (skipclean && preen && checkdirty(dosfs, &boot)) { in checkfilesys() 98 mod |= readfat(dosfs, &boot, &fat); in checkfilesys() 134 freebytes = (int64_t)boot.NumFree * boot.ClusterSize; in checkfilesys() 135 badbytes = (int64_t)boot.NumBad * boot.ClusterSize; in checkfilesys() 142 if (boot.NumBad) { in checkfilesys() 147 boot.NumFiles, freestr, boot.NumFree, in checkfilesys() 148 badstr, boot.NumBad); in checkfilesys() 151 boot.NumFiles, freestr, boot.NumFree); in checkfilesys() [all …]
|
D | dir.c | 227 struct bootblock *boot; in resetDosDirSection() local 229 boot = fat_get_boot(fat); in resetDosDirSection() 231 rootdir_size = boot->bpbRootDirEnts * 32; in resetDosDirSection() 232 cluster_size = boot->bpbSecPerClust * boot->bpbBytesPerSec; in resetDosDirSection() 253 if (boot->flags & FAT32) { in resetDosDirSection() 254 if (!fat_is_cl_head(fat, boot->bpbRootClust)) { in resetDosDirSection() 258 rootDir->head = boot->bpbRootClust; in resetDosDirSection() 304 struct bootblock *boot; in delete() local 306 boot = fat_get_boot(fat); in delete() 308 clsz = boot->bpbSecPerClust * boot->bpbBytesPerSec; in delete() [all …]
|
D | Makefile | 10 SRCS= main.c check.c boot.c fat.c dir.c fsutil.c
|
/third_party/python/Modules/ |
D | _threadmodule.c | 1069 thread_bootstate_free(struct bootstate *boot) in thread_bootstate_free() argument 1071 Py_DECREF(boot->func); in thread_bootstate_free() 1072 Py_DECREF(boot->args); in thread_bootstate_free() 1073 Py_XDECREF(boot->kwargs); in thread_bootstate_free() 1074 PyMem_Free(boot); in thread_bootstate_free() 1081 struct bootstate *boot = (struct bootstate *) boot_raw; in thread_run() local 1084 tstate = boot->tstate; in thread_run() 1090 PyObject *res = PyObject_Call(boot->func, boot->args, boot->kwargs); in thread_run() 1096 _PyErr_WriteUnraisableMsg("in thread started by", boot->func); in thread_run() 1103 thread_bootstate_free(boot); in thread_run() [all …]
|
/third_party/toybox/scripts/ |
D | mkroot.sh | 157 VMLINUX=arch/arm/boot/zImage 191 DTB=arch/arm/boot/dts/versatile-pb.dtb 198 VMLINUX=arch/arm64/boot/Image 202 VMLINUX=arch/arm/boot/zImage 263 VMLINUX=arch/x86/boot/bzImage 371 VMLINUX=arch/s390/boot/bzImage 389 VMLINUX=arch/sh/boot/zImage
|
/third_party/gptfdisk/ |
D | README-efi.txt | 4 GPT fdisk for EFI is a binary build of gdisk to run as a pre-boot EFI 7 overcome boot problems caused by partition table damage or to prepare a 32 ESP. In that location, my rEFInd boot manager will detect the gdisk binary 34 launch the program using an EFI shell, register it as a boot program with 35 your firmware, or configure your boot manager (GRUB, gummiboot, etc.) to 36 launch it. Note that boot LOADERS, such as SYSLINUX and ELILO, can't launch 40 you boot from it. To do so, create a FAT filesystem on a partition on a USB 44 can use your firmware's built-in boot manager to boot from the USB flash 45 drive. Some such boot managers present two options for booting USB flash 61 --output /boot/efi/EFI/tooks/gdisk_x64.efi ./gdisk_x64.efi [all …]
|
/third_party/mesa3d/.gitlab-ci/container/ |
D | build-kernel.sh | 23 cp arch/${KERNEL_ARCH}/boot/${image} /lava-files/. 42 -d arch/arm64/boot/Image.lzma \ 44 -b arch/arm64/boot/dts/qcom/sdm845-cheza-r3.dtb \
|
/third_party/grpc/tools/gce/ |
D | create_win2019_container_vm.sh | 41 --boot-disk-size=400GB \ 42 --boot-disk-type pd-ssd \
|
D | create_windows_debug_worker.sh | 54 --boot-disk-size 500 \ 55 --boot-disk-type pd-ssd \
|
D | create_linux_kokoro_performance_worker_from_image.sh | 36 --boot-disk-size 300 \
|
D | create_linux_kokoro_performance_worker.sh | 41 --boot-disk-size 300 \
|
/third_party/ltp/testcases/kernel/mce-test/kvm/ |
D | README | 113 step 2: qemu-system-x86_64 -hda ./test.img -m 2048 -cdrom rhel6.iso -boot d 115 a) add necessary command line parameters under your boot item. 121 kernel /boot/vmlinuz-2.6.32kvm ro root=/dev/sda1 122 initrd /boot/initramfs-2.6.32kvm.img 126 kernel /boot/vmlinuz-2.6.32kvm ro root=/dev/sda1 console=tty0 console=ttyS0,115200n8 127 initrd /boot/initramfs-2.6.32kvm.img
|
/third_party/libwebsockets/minimal-examples/embedded/esp32/esp-wrover-kit/ |
D | CMakeLists.txt | 28 add_test(NAME boot COMMAND /usr/local/bin/sai-expect) 29 set_tests_properties(boot PROPERTIES
|
/third_party/libwebsockets/minimal-examples/embedded/esp32/esp-c3dev/ |
D | CMakeLists.txt | 31 add_test(NAME boot COMMAND /usr/local/bin/sai-expect) 32 set_tests_properties(boot PROPERTIES
|
/third_party/libwebsockets/minimal-examples/embedded/esp32/esp-heltec-wb32/ |
D | CMakeLists.txt | 30 add_test(NAME boot COMMAND /usr/local/bin/sai-expect) 31 set_tests_properties(boot PROPERTIES
|
/third_party/node/deps/icu-small/source/i18n/ |
D | dtptngen.cpp | 1912 boot[i] = nullptr; in PatternMap() 1925 otherElem = other.boot[bootIndex]; in copyFrom() 1942 if (this->boot[bootIndex] == nullptr) { in copyFrom() 1943 this->boot[bootIndex] = curElem; in copyFrom() 1963 curElem = boot[baseChar-CAP_A]; in getHeader() 1967 curElem = boot[26+baseChar-LOW_A]; in getHeader() 1978 if (boot[i] != nullptr ) { in ~PatternMap() 1979 delete boot[i]; in ~PatternMap() 1980 boot[i] = nullptr; in ~PatternMap() 1997 baseElem = boot[baseChar-CAP_A]; in add() [all …]
|
/third_party/flutter/skia/third_party/externals/icu/source/i18n/ |
D | dtptngen.cpp | 1771 boot[i] = nullptr; in PatternMap() 1784 otherElem = other.boot[bootIndex]; in copyFrom() 1801 if (this->boot[bootIndex] == nullptr) { in copyFrom() 1802 this->boot[bootIndex] = curElem; in copyFrom() 1822 curElem = boot[baseChar-CAP_A]; in getHeader() 1826 curElem = boot[26+baseChar-LOW_A]; in getHeader() 1837 if (boot[i] != nullptr ) { in ~PatternMap() 1838 delete boot[i]; in ~PatternMap() 1839 boot[i] = nullptr; in ~PatternMap() 1856 baseElem = boot[baseChar-CAP_A]; in add() [all …]
|
/third_party/skia/third_party/externals/icu/source/i18n/ |
D | dtptngen.cpp | 1920 boot[i] = nullptr; in PatternMap() 1933 otherElem = other.boot[bootIndex]; in copyFrom() 1950 if (this->boot[bootIndex] == nullptr) { in copyFrom() 1951 this->boot[bootIndex] = curElem; in copyFrom() 1971 curElem = boot[baseChar-CAP_A]; in getHeader() 1975 curElem = boot[26+baseChar-LOW_A]; in getHeader() 1986 if (boot[i] != nullptr ) { in ~PatternMap() 1987 delete boot[i]; in ~PatternMap() 1988 boot[i] = nullptr; in ~PatternMap() 2005 baseElem = boot[baseChar-CAP_A]; in add() [all …]
|
/third_party/icu/icu4c/source/i18n/ |
D | dtptngen.cpp | 1920 boot[i] = nullptr; in PatternMap() 1933 otherElem = other.boot[bootIndex]; in copyFrom() 1950 if (this->boot[bootIndex] == nullptr) { in copyFrom() 1951 this->boot[bootIndex] = curElem; in copyFrom() 1971 curElem = boot[baseChar-CAP_A]; in getHeader() 1975 curElem = boot[26+baseChar-LOW_A]; in getHeader() 1986 if (boot[i] != nullptr ) { in ~PatternMap() 1987 delete boot[i]; in ~PatternMap() 1988 boot[i] = nullptr; in ~PatternMap() 2005 baseElem = boot[baseChar-CAP_A]; in add() [all …]
|
/third_party/FreeBSD/ |
D | UPDATING | 111 if_tun_load="YES" entries in /boot/loader.conf to load the if_tuntap 136 /etc/rc.conf, fuse_load="YES" entries in /boot/loader.conf, and 262 driver. Make sure to edit /boot/etc/kboot.conf and fstab to use the 316 This should have no effect if the kernel is booted via BIOS/legacy boot. 318 has a buggy firmware that prevents a successful boot due to use of 328 UEFI boot manager protocol. loader.efi will now look at the 336 boot blocks. For a transition period, we will install a 338 until the boot blocks can be updated (hard link because old 339 zfs boot blocks don't understand symlinks). 347 in /boot/loader.conf [all …]
|
/third_party/flutter/flutter/packages/flutter/lib/src/services/ |
D | system_chrome.dart | 18 /// system first uses for its boot logo, or the orientation in which the 31 /// If the device shows its boot logo in portrait, then the boot logo is shown 32 /// in [portraitUp]. Otherwise, the device shows its boot logo in landscape 34 /// clockwise from its boot orientation. 39 /// If the device shows its boot logo in landscape, then the boot logo is
|
/third_party/libwebsockets/READMEs/ |
D | README.esp32.md | 14 …ry, and managing a switch to allow the user to force entry to user setup mode at boot subsequently. 18 …writes the new image to the OTA slot and copies it into place at the next boot, after which the us…
|
/third_party/eudev/rules/ |
D | 60-persistent-storage.rules | 74 KERNEL=="mmcblk[0-9]boot[0-9]", ENV{DEVTYPE}=="disk", ENV{ID_PATH}=="?*", SYMLINK+="disk/by-path/$e… 75 KERNEL!="mmcblk[0-9]boot[0-9]", ENV{DEVTYPE}=="disk", ENV{ID_PATH}=="?*", SYMLINK+="disk/by-path/$e…
|