/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
D | modulefinder.py | 123 def import_hook(self, name, caller=None, fromlist=None, level=-1): argument 124 self.msg(3, "import_hook", name, caller, fromlist, level) 125 parent = self.determine_parent(caller, level=level) 134 def determine_parent(self, caller, level=-1): argument 135 self.msgin(4, "determine_parent", caller, level) 136 if not caller or level == 0: 139 pname = caller.__name__ 141 if caller.__path__: 145 assert parent is caller 154 if caller.__path__: [all …]
|
D | pstats.py | 263 for func2, caller in callers.iteritems(): 264 newcallers[func_strip_path(func2)] = caller 289 for func2, caller in callers.iteritems(): 292 all_callees[func2][func] = caller 517 for func, caller in target.iteritems(): 518 new_callers[func] = caller 519 for func, caller in source.iteritems(): 521 if isinstance(caller, tuple): 524 zip(caller, new_callers[func])]) 527 new_callers[func] += caller [all …]
|
D | warnings.py | 186 caller = sys._getframe(stacklevel) 191 globals = caller.f_globals 192 lineno = caller.f_lineno
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Lib/ |
D | modulefinder.py | 123 def import_hook(self, name, caller=None, fromlist=None, level=-1): argument 124 self.msg(3, "import_hook", name, caller, fromlist, level) 125 parent = self.determine_parent(caller, level=level) 134 def determine_parent(self, caller, level=-1): argument 135 self.msgin(4, "determine_parent", caller, level) 136 if not caller or level == 0: 139 pname = caller.__name__ 141 if caller.__path__: 145 assert parent is caller 154 if caller.__path__: [all …]
|
D | warnings.py | 190 caller = sys._getframe(stacklevel) 195 globals = caller.f_globals 196 lineno = caller.f_lineno
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
D | _lsprof.c | 261 getSubEntry(ProfilerObject *pObj, ProfilerEntry *caller, ProfilerEntry* entry) in getSubEntry() argument 263 return (ProfilerSubEntry*) RotatingTree_Get(&caller->calls, in getSubEntry() 268 newSubEntry(ProfilerObject *pObj, ProfilerEntry *caller, ProfilerEntry* entry) in newSubEntry() argument 282 RotatingTree_Add(&caller->calls, &self->header); in newSubEntry() 329 ProfilerEntry *caller = self->previous->ctxEntry; in initContext() local 330 ProfilerSubEntry *subentry = getSubEntry(pObj, caller, entry); in initContext() 332 subentry = newSubEntry(pObj, caller, entry); in initContext() 355 ProfilerEntry *caller = self->previous->ctxEntry; in Stop() local 356 ProfilerSubEntry *subentry = getSubEntry(pObj, caller, entry); in Stop()
|
/device/linaro/bootloader/edk2/OvmfPkg/Library/XenHypercallLib/Ia32/ |
D | hypercall.nasm | 13 ; saved by the caller
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/Pei/PeiLib/Ia32/ |
D | ProcessorAsms.S | 131 # This allows the caller to switch the stack and goes to the new entry point 169 # This allows the caller to switch the stack and goes to the new entry point
|
D | ProcessorAsms.Asm | 151 ; This allows the caller to switch the stack and goes to the new entry point 186 ; This allows the caller to switch the stack and goes to the new entry point
|
/device/linaro/bootloader/edk2/Nt32Pkg/Sec/ |
D | Stack.asm | 85 mov dword ptr [ebp], eax ; From now, Temporary's PPI caller's stack is in permenent memory
|
/device/linaro/bootloader/edk2/EmulatorPkg/Sec/Ia32/ |
D | SwitchRam.asm | 85 mov dword ptr [ebp], eax ; From now, Temporary's PPI caller's stack is in permenent memory
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | rt-svc-writers-guide.md | 86 from an AArch32 caller. 210 The `flags` parameter to this function indicates the caller security state 211 in bit[0], where a value of `1` indicates a non-secure caller. The 246 5. Returning the result to the caller. The [SMCCC] allows for up to 256 bits
|
D | change-log.md | 36 `CPU_OFF` calls to facilitate an early return to the caller in case a 38 returns `SUCCESS` to the caller if a pending interrupt is detected early
|
D | porting-guide.md | 407 Application Binary Interface for the ARM 64-bit architecture. The caller should 569 by the caller to store the return address.
|
D | interrupt-framework-design.md | 325 interrupts. This API also requires the caller to specify the routing model for
|
D | firmware-design.md | 725 manipulation; and with `flags` indicating the security state of the caller. The
|
/device/linaro/bootloader/edk2/OvmfPkg/VirtioNetDxe/ |
D | TechNotes.txt | 287 copies the data out to the caller, and recycles the index of the head 313 - Each tail descriptor is re-pointed to the caller-supplied packet buffer 315 Available Ring. The caller is responsible to hang on to the unmodified buffer 341 caller.
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/Pei/PeiLib/X64/ |
D | ProcessorAsms.S | 30 # This allows the caller to switch the stack and goes to the new entry point
|
D | ProcessorAsms.Asm | 26 ; This allows the caller to switch the stack and goes to the new entry point
|
/device/linaro/bootloader/edk2/ShellPkg/Library/UefiShellLevel1CommandsLib/ |
D | UefiShellLevel1CommandsLib.uni | 60 " caller. If not specified, then 0 will be returned.\r\n" 75 " * To exit a UEFI shell script with exit-code value returned to the caller:\r\n"
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Sample/ |
D | CommonTools.env | 549 # Let the caller define a NULL toolchain if they don't care. This way you can
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/zlib/ |
D | FAQ | 260 against a buffer overflow of a 4K string space, other than the caller of
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Modules/zlib/ |
D | FAQ | 264 gzbuffer()), other than the caller of gzprintf() assuring that the output
|