Home
last modified time | relevance | path

Searched refs:method (Results 1 – 25 of 26) sorted by relevance

12

/xen/tools/python/
A Dpylintrc88 # * redefinition of function / method / class
105 # Minimal length for module / class / function / method / argument / variable
118 # Regular expression which should only match correct method names
119 method-rgx=[a-z_][A-Za-z0-9_]*$
146 # Maximum number of arguments for function / method
149 # Maximum number of locals for function / method body
152 # Maximum number of return / yield for function / method body
155 # Maximum number of branch for function / method body
158 # Maximum number of statements in function / method body
179 # * attributes not defined in the __init__ method
/xen/tools/libacpi/
A Dssdt_pm.asl146 * Helper method 1 to write to battery command and data port.
161 * Helper method 2. Value 0x7b written to battery command port 0xb2
178 * Helper method 3. 0x7d written to battery command port 0xb2
192 * Helper method 4 to indirectly get battery data and store it in a
207 * Helper method 5 to indirectly initialize battery port and get
226 /* Helper method for local buffer housekeeping... */
311 /* Main battery information helper method. */
A Dssdt_laptop_slate.asl20 …en-us/windows/hardware/commercialize/design/device-experiences/continuum#method-2----use-the-injec…
A DCOPYING58 We protect your rights with a two-step method: (1) we copyright the
/xen/docs/features/
A Dqemu-deprivilege.pandoc53 Two comments on this method:
80 If you use this method, you should also allocate one "reaper" user to
/xen/xen/common/
A Dinflate.c1194 char method; in gunzip() local
1201 method = NEXTBYTE(); in gunzip()
1210 if (method != 8) { in gunzip()
/xen/docs/misc/
A Dx86-xenpv-bootloader.pandoc5 One method for booting an x86 Xen PV guest is to use a PV bootloader,
A Dxen-error-handling.txt9 domain. BUG() is a more appropriate failure method for hypervisor
A Dvtd-pi.txt40 VT-d Posted-interrupt is a more enhanced method to handle interrupts
323 A) Round robin: In this method, the chipset simply delivers lowest priority
328 B) Vector hashing: In this method, hardware would apply a hash function
A Dvtd.txt41 12) reboot system (not requires if you use the dynamic hiding method)
315 driver, you might want to use the dynamic hiding method mentioned above.
A Dxsm-flask.txt149 the flexibility of the type system. Another method to address this issue is to
287 source/destination is printed to the log, so labeling devices using this method
A Dkconfig.rst30 Alternatively, you can use the brute force method::
A Dxen-command-line.pandoc1821 Specify the host reboot method.
1840 default it will use that method first).
/xen/tools/libxl/
A DCODING_STYLE184 _init method) in your own _init method.
186 cancel or destroy method.
/xen/docs/man/
A Dxen-vtpmmgr.7.pod33 When combined with a platform that provides a trusted method for creating
167 key, there is currently no trusted method to inform the TPM Manager of the hash
193 domain due to changes in the on-disk format and the method used to seal data.
A Dxl.cfg.5.pod.in510 booted using the B<Direct Kernel Boot> method or the B<bootloader> option.
844 display. If the input method does not easily support raw keycodes
2435 display. If the input method does not easily support raw keycodes
/xen/stubdom/vtpmmgr/
A Dtpm2_types.h245 unsigned int method:1; member
/xen/docs/designs/
A Dargo.pandoc293 An alternative method that is better suited to the Argo software is to consider
/xen/tools/libxc/
A DCOPYING57 We protect your rights with a two-step method: (1) we copyright the
/xen/xen/common/libelf/
A DCOPYING57 We protect your rights with a two-step method: (1) we copyright the
/xen/tools/xenstore/
A DCOPYING55 We protect your rights with a two-step method: (1) we copyright the
/xen/tools/firmware/vgabios/
A DCOPYING48 We protect your rights with a two-step method: (1) we copyright the
/xen/tools/golang/xenlight/
A DLICENSE48 We protect your rights with a two-step method: (1) we copyright the
/xen/tools/ocaml/
A DLICENSE44 We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you t…
/xen/tools/xenstat/libxenstat/
A DCOPYING50 We protect your rights with a two-step method: (1) we copyright the

Completed in 26 milliseconds

12