| /openbmc/openbmc/meta-facebook/meta-harma/recipes-phosphor/configuration/entity-manager/ |
| H A D | device-driver-probe | 29 echo pca9546 0x71 > /sys/bus/i2c/devices/i2c-9/new_device 32 echo pca9546 0x71 > /sys/bus/i2c/devices/i2c-11/new_device 43 echo adc128d818 0x1d > /sys/bus/i2c/devices/i2c-36/new_device 44 echo ina238 0x44 > /sys/bus/i2c/devices/i2c-36/new_device 45 echo ina238 0x45 > /sys/bus/i2c/devices/i2c-36/new_device 46 echo MCP9600 0x60 > /sys/bus/i2c/devices/i2c-34/new_device 47 echo MCP9600 0x62 > /sys/bus/i2c/devices/i2c-34/new_device 48 echo MCP9600 0x63 > /sys/bus/i2c/devices/i2c-34/new_device 49 echo MCP9600 0x64 > /sys/bus/i2c/devices/i2c-34/new_device 50 echo MCP9600 0x65 > /sys/bus/i2c/devices/i2c-34/new_device [all …]
|
| /openbmc/qemu/docs/system/ |
| H A D | device-emulation.rst | 6 QEMU supports the emulation of a large number of devices from 7 peripherals such network cards and USB devices to integrated systems 10 used to describes devices within QEMU. 20 system is expecting to see. All devices can be specified with the 22 options ``--device help`` will list all devices it is aware of. Using 32 Most devices will exist on a BUS of some sort. Depending on the 35 can be inferred, for example PCI devices are generally automatically 41 Some devices, for example a PCI SCSI host controller, will add an 42 additional buses to the system that other devices can be attached to. 43 A hypothetical chain of devices might look like: [all …]
|
| H A D | virtio-net-failover.rst | 6 is used to create a net_failover pair of devices. 8 The general idea is that we have a pair of devices, a (vfio-)pci and a 12 module will pair net devices with the same MAC address. 14 The two devices are called primary and standby device. The fast hardware based 21 Currently only PCIe devices are allowed as primary devices, this restriction 23 devices are allowed as primary device. The user needs to ensure that primary 24 and standby devices are not plugged into the same PCIe slot. 55 This is only for pairing the devices within QEMU. The guest kernel 56 module net_failover will match devices with identical MAC addresses. 69 failover primary devices are present in the configuration, migration [all …]
|
| /openbmc/dbus-sensors/src/mctp/ |
| H A D | MCTPDeviceRepository.hpp | 17 std::map<std::string, std::shared_ptr<MCTPDevice>> devices; member in MCTPDeviceRepository 22 return std::ranges::find_if(devices, pred); in lookup() 37 auto [entry, fresh] = devices.emplace(inventory, device); in add() 50 if (entry == devices.end()) in remove() 57 devices.erase(entry); in remove() 62 return lookup(device) != devices.end(); in contains() 69 if (entry == devices.end()) in inventoryFor() 78 auto entry = devices.find(inventory); in deviceFor() 79 if (entry == devices.end()) in deviceFor()
|
| H A D | MCTPReactor.cpp | 56 if (self->devices.contains(ep->device())) in trackEndpoint() 78 std::optional<std::string> item = devices.inventoryFor(ep->device()); in trackEndpoint() 148 devices.add(path, device); in manageMCTPDevice() 160 auto current = devices.deviceFor(path); in manageMCTPDevice() 177 devices.add(path, device); in manageMCTPDevice() 186 auto device = devices.deviceFor(path); in unmanageMCTPDevice() 201 devices.remove(device); in unmanageMCTPDevice()
|
| /openbmc/phosphor-power/phosphor-regulators/src/ |
| H A D | chassis.cpp | 27 for (std::unique_ptr<Device>& device : devices) in addToIDMap() 36 for (std::unique_ptr<Device>& device : devices) in clearCache() 45 for (std::unique_ptr<Device>& device : devices) in clearErrorHistory() 58 for (std::unique_ptr<Device>& device : devices) in closeDevices() 71 for (std::unique_ptr<Device>& device : devices) in configure() 80 for (std::unique_ptr<Device>& device : devices) in detectPhaseFaults() 89 for (std::unique_ptr<Device>& device : devices) in monitorSensors()
|
| H A D | chassis.hpp | 70 std::vector<std::unique_ptr<Device>> devices = in Chassis() argument 73 devices{std::move(devices)} 142 return devices; in getDevices() 196 std::vector<std::unique_ptr<Device>> devices{}; member in phosphor::power::regulators::Chassis
|
| /openbmc/phosphor-power/phosphor-regulators/test/ |
| H A D | chassis_tests.cpp | 92 std::vector<std::unique_ptr<Device>> devices{}; in TEST_F() local 93 devices.emplace_back(createDevice("vdd_reg1")); in TEST_F() 94 devices.emplace_back(createDevice("vdd_reg2")); in TEST_F() 97 Chassis chassis{1, defaultInventoryPath, std::move(devices)}; in TEST_F() 122 std::vector<std::unique_ptr<Device>> devices{}; in TEST_F() local 123 devices.emplace_back(createDevice("reg1", {"rail1"})); in TEST_F() 124 devices.emplace_back(createDevice("reg2", {"rail2a", "rail2b"})); in TEST_F() 125 devices.emplace_back(createDevice("reg3")); in TEST_F() 128 Chassis chassis{1, defaultInventoryPath, std::move(devices)}; in TEST_F() 164 std::vector<std::unique_ptr<Device>> devices{}; in TEST_F() local [all …]
|
| H A D | system_tests.cpp | 69 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 70 devices.emplace_back(createDevice("reg1", {"rail1"})); in TEST() 72 std::make_unique<Chassis>(1, chassisInvPath, std::move(devices))); in TEST() 103 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 104 devices.emplace_back(std::move(device)); in TEST() 106 std::make_unique<Chassis>(1, chassisInvPath, std::move(devices)); in TEST() 158 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 159 devices.emplace_back(std::move(device)); in TEST() 161 std::make_unique<Chassis>(1, chassisInvPath, std::move(devices)); in TEST() 314 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local [all …]
|
| /openbmc/qemu/tests/qtest/ |
| H A D | display-vga-test.c | 31 static const char *devices[] = { in main() local 41 for (int i = 0; i < ARRAY_SIZE(devices); i++) { in main() 42 if (qtest_has_device(devices[i])) { in main() 43 char *testpath = g_strdup_printf("/display/pci/%s", devices[i]); in main() 44 qtest_add_data_func(testpath, devices[i], test_vga); in main()
|
| H A D | readconfig-test.c | 231 static void test_docs_q35(const char *input_file, struct device *devices) in test_docs_q35() argument 241 for (i = 0; devices[i].name; i++) { in test_docs_q35() 242 if (!qtest_has_device(devices[i].type)) { in test_docs_q35() 286 for (i = 0; devices[i].name; i++) { in test_docs_q35() 287 test_object_available(qobj, devices[i].name, devices[i].type); in test_docs_q35() 308 struct device devices[] = { in test_docs_q35_emulated() local 331 test_docs_q35("docs/config/q35-emulated.cfg", devices); in test_docs_q35_emulated() 336 struct device devices[] = { in test_docs_q35_virtio_graphical() local 357 test_docs_q35("docs/config/q35-virtio-graphical.cfg", devices); in test_docs_q35_virtio_graphical() 362 struct device devices[] = { in test_docs_q35_virtio_serial() local [all …]
|
| /openbmc/u-boot/examples/api/ |
| H A D | glue.c | 164 static struct device_info devices[UB_MAX_DEV]; variable 168 return ((i < 0 || i >= UB_MAX_DEV) ? NULL : &devices[i]); in ub_dev_get() 182 memset(&devices, 0, sizeof(struct device_info) * UB_MAX_DEV); in ub_dev_enum() 183 di = &devices[0]; in ub_dev_enum() 197 di->cookie = devices[n - 1].cookie; in ub_dev_enum() 219 di = &devices[handle]; in ub_dev_open() 234 di = &devices[handle]; in ub_dev_close() 255 if (devices[handle].state != DEV_STA_OPEN) in dev_valid() 266 if (!(devices[handle].type & DEV_TYP_STOR)) in dev_stor_valid() 282 di = &devices[handle]; in ub_dev_read() [all …]
|
| /openbmc/qemu/block/ |
| H A D | snapshot.c | 483 bdrv_all_get_snapshot_devices(bool has_devices, strList *devices, in bdrv_all_get_snapshot_devices() argument 489 if (!devices) { in bdrv_all_get_snapshot_devices() 494 while (devices) { in bdrv_all_get_snapshot_devices() 495 BlockDriverState *bs = bdrv_find_node(devices->value); in bdrv_all_get_snapshot_devices() 497 error_setg(errp, "No block device node '%s'", devices->value); in bdrv_all_get_snapshot_devices() 501 devices = devices->next; in bdrv_all_get_snapshot_devices() 532 bool bdrv_all_can_snapshot(bool has_devices, strList *devices, in bdrv_all_can_snapshot() argument 541 if (bdrv_all_get_snapshot_devices(has_devices, devices, &bdrvs, errp) < 0) { in bdrv_all_can_snapshot() 550 if (devices || bdrv_all_snapshots_includes_bs(bs)) { in bdrv_all_can_snapshot() 566 bool has_devices, strList *devices, in bdrv_all_delete_snapshot() argument [all …]
|
| /openbmc/qemu/include/block/ |
| H A D | snapshot.h | 91 bool bdrv_all_can_snapshot(bool has_devices, strList *devices, 94 bdrv_all_delete_snapshot(const char *name, bool has_devices, strList *devices, 97 bool has_devices, strList *devices, 100 bool has_devices, strList *devices, 106 strList *devices, 110 bool has_devices, strList *devices,
|
| /openbmc/u-boot/drivers/block/ |
| H A D | Kconfig | 2 bool "Support block devices" 6 Enable support for block devices, such as SCSI, MMC and USB 9 devices often have a partition table which allows the device to 16 Some devices require block support whether or not DM is enabled 19 bool "Support block devices in SPL" 23 Enable support for block devices, such as SCSI, MMC and USB 26 devices often have a partition table which allows the device to 31 bool "Support block devices in TPL" 35 Enable support for block devices, such as SCSI, MMC and USB 38 devices often have a partition table which allows the device to [all …]
|
| /openbmc/openbmc/poky/meta/recipes-extended/ghostscript/ghostscript/ |
| H A D | avoid-host-contamination.patch | 14 devices/devs.mak | 2 +- 17 diff --git a/devices/devs.mak b/devices/devs.mak 19 --- a/devices/devs.mak 20 +++ b/devices/devs.mak 28 ###### --------------- Memory-buffered printer devices --------------- ######
|
| /openbmc/qemu/docs/ |
| H A D | bypass-iommu.txt | 7 devices in the system can only support go through vIOMMU or not, which 9 coexist of devices go through vIOMMU and devices not. This is useful to 10 passthrough devices with no-iommu mode and devices go through vIOMMU in 14 determine whether the devices attached on the PCI host bridge will bypass 16 virtual iommu in the system, it is implemented to allow some devices to 18 the attached devices will go through vIOMMU by default. 66 There might be potential security risk when devices bypass iommu, because 67 devices might send malicious dma request to virtual machine if there is no 76 space for devices bypass iommu. 79 RID mapping for devices which do not bypass iommu. [all …]
|
| H A D | pcie.txt | 7 devices in PCI Express based machines and explains the reasoning behind 34 PCI Express devices should be plugged only into PCI Express Root Ports and 39 Place only the following kinds of devices directly on the Root Complex: 41 not controllers. Place only legacy PCI devices on 45 Although the PCI Express spec does not forbid PCI Express devices as 47 devices with the Root Complex. Guest OSes are suspected to behave 48 strangely when PCI Express devices are integrated 81 A PCI Express Root bus supports up to 32 devices. Since each 86 Prefer grouping PCI Express Root Ports into multi-function devices 92 Plug only PCI Express devices into PCI Express Ports. [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-extended/python-blivet/python3-blivet/ |
| H A D | 0006-tweak-btrfs-packages.patch | 13 blivet/devices/btrfs.py | 2 +- 17 diff --git a/blivet/devices/btrfs.py b/blivet/devices/btrfs.py 19 --- a/blivet/devices/btrfs.py 20 +++ b/blivet/devices/btrfs.py 23 """ Base class for BTRFS volume and sub-volume devices. """
|
| H A D | 0011-invoking-dd-with-infinite-timeout.patch | 13 blivet/devices/partition.py | 2 +- 16 diff --git a/blivet/devices/partition.py b/blivet/devices/partition.py 18 --- a/blivet/devices/partition.py 19 +++ b/blivet/devices/partition.py
|
| /openbmc/phosphor-power/phosphor-regulators/docs/config_file/ |
| H A D | chassis.md | 22 …devices | no | array of [devices](device.md) | One or more devices within the chassis… 31 "devices": [
|
| /openbmc/phosphor-host-ipmid/ |
| H A D | whitelist-filter.cpp | 41 const std::vector<std::string>& devices, 78 const std::vector<std::string>& devices, in cacheRestrictedMode() argument 85 for (auto& dev : devices) in cacheRestrictedMode() 111 size_t index = std::distance(&*std::begin(devices), &dev); in cacheRestrictedMode() 186 std::vector<std::string> devices; in postInit() local 189 devices = objects->map.at(restrictionModeIntf); in postInit() 198 cacheRestrictedMode(devices, objects->serviceMap); in postInit() 202 for (size_t index = 0; index < devices.size(); index++) in postInit() 204 deviceList.emplace(devices[index], index); in postInit()
|
| /openbmc/qemu/include/migration/ |
| H A D | snapshot.h | 34 bool has_devices, strList *devices, 49 bool has_devices, strList *devices, 62 bool has_devices, strList *devices,
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/ |
| H A D | multipath.conf.example | 8 ## By default, devices with vendor = "IBM" and product = "S/390.*" are 43 ## of how to blacklist devices by wwid. The 2 devnode lines are the 45 ## of devices, such as all scsi devices, you should use a devnode line. 46 ## However, if you want to blacklist specific devices, you should use 49 ## devnode lines are not recommended for blacklisting specific devices. 72 #devices {
|
| /openbmc/qemu/docs/system/devices/ |
| H A D | usb.rst | 5 plug virtual USB devices or real host USB devices (only works with 7 connect virtual USB hubs as necessary to connect multiple USB devices. 23 XHCI supports USB 1.1, USB 2.0 and USB 3.0 devices, so this is the 26 need to use the bus= parameter when adding USB devices. 32 The QEMU EHCI Adapter supports USB 2.0 devices. It can be used either 34 devices. The companion controller setup is more convenient to use 36 1.1 devices. See next section for details. 39 controllers for USB 1.1 devices too. Each controller creates its own 55 When adding USB devices using the ``-device`` switch you can specify the 89 Then use ``bus=ehci.0`` to assign your USB devices to that bus. [all …]
|