Home
last modified time | relevance | path

Searched refs:method (Results 1 – 23 of 23) sorted by relevance

/xen-4.10.0-shim-comet/tools/python/
A Dpylintrc88 # * redefinition of function / method / class
105 # Minimal length for module / class / function / method / argument / variable
118 # Regular expression which should only match correct method names
119 method-rgx=[a-z_][A-Za-z0-9_]*$
146 # Maximum number of arguments for function / method
149 # Maximum number of locals for function / method body
152 # Maximum number of return / yield for function / method body
155 # Maximum number of branch for function / method body
158 # Maximum number of statements in function / method body
179 # * attributes not defined in the __init__ method
/xen-4.10.0-shim-comet/tools/libacpi/
A Dssdt_pm.asl146 * Helper method 1 to write to battery command and data port.
161 * Helper method 2. Value 0x7b written to battery command port 0xb2
178 * Helper method 3. 0x7d written to battery command port 0xb2
192 * Helper method 4 to indirectly get battery data and store it in a
207 * Helper method 5 to indirectly initialize battery port and get
226 /* Helper method for local buffer housekeeping... */
311 /* Main battery information helper method. */
A Dssdt_laptop_slate.asl20 …en-us/windows/hardware/commercialize/design/device-experiences/continuum#method-2----use-the-injec…
A DCOPYING58 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/xen/common/
A Dinflate.c1194 char method; in gunzip() local
1201 method = NEXTBYTE(); in gunzip()
1210 if (method != 8) { in gunzip()
/xen-4.10.0-shim-comet/docs/misc/
A Dx86-xenpv-bootloader.markdown5 One method for booting an x86 Xen PV guest is to use a PV bootloader,
A Dxen-error-handling.txt9 domain. BUG() is a more appropriate failure method for hypervisor
A Dvtd-pi.txt40 VT-d Posted-interrupt is a more enhanced method to handle interrupts
323 A) Round robin: In this method, the chipset simply delivers lowest priority
328 B) Vector hashing: In this method, hardware would apply a hash function
A Dvtd.txt41 12) reboot system (not requires if you use the dynamic hiding method)
315 driver, you might want to use the dynamic hiding method mentioned above.
A Dxsm-flask.txt185 the flexibility of the type system. Another method to address this issue is to
323 source/destination is printed to the log, so labeling devices using this method
A Dxen-command-line.markdown1491 Specify the host reboot method.
1510 default it will use that method first).
A Dlivepatch.markdown227 With this method we can re-write the hypervisor - and as such we **MUST** be
/xen-4.10.0-shim-comet/tools/libxl/
A DCODING_STYLE184 _init method) in your own _init method.
186 cancel or destroy method.
/xen-4.10.0-shim-comet/docs/man/
A Dxen-vtpmmgr.pod.729 When combined with a platform that provides a trusted method for creating
163 key, there is currently no trusted method to inform the TPM Manager of the hash
189 domain due to changes in the on-disk format and the method used to seal data.
A Dxl.cfg.pod.5.in509 booted using the B<Direct Kernel Boot> method or the B<bootloader> option.
760 display. If the input method does not easily support raw keycodes
2154 display. If the input method does not easily support raw keycodes
/xen-4.10.0-shim-comet/stubdom/vtpmmgr/
A Dtpm2_types.h245 unsigned int method:1; member
/xen-4.10.0-shim-comet/tools/libxc/
A DCOPYING57 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/xen/common/libelf/
A DCOPYING57 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/tools/xenstore/
A DCOPYING55 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/tools/ocaml/
A DLICENSE44 We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you t…
/xen-4.10.0-shim-comet/tools/firmware/vgabios/
A DCOPYING48 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/tools/xenstat/libxenstat/
A DCOPYING50 We protect your rights with a two-step method: (1) we copyright the
/xen-4.10.0-shim-comet/xen/tools/kconfig/
A Dzconf.tab.c_shipped1080 if the built-in stack extension method is used).

Completed in 53 milliseconds