/openbmc/phosphor-power/phosphor-regulators/test/ |
H A D | system_tests.cpp | 69 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 70 devices.emplace_back(createDevice("reg1", {"rail1"})); in TEST() 103 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 104 devices.emplace_back(std::move(device)); in TEST() 158 std::vector<std::unique_ptr<Device>> devices{}; in TEST() local 159 devices.emplace_back(std::move(device)); in TEST() 315 devices.emplace_back(std::move(device)); in TEST() 343 devices.emplace_back(std::move(device)); in TEST() 398 devices.emplace_back(createDevice("reg4")); in TEST() 498 devices.emplace_back(std::move(device)); in TEST() [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-platform-sh_mobile_lcdc_fb | 1 What: /sys/devices/platform/sh_mobile_lcdc_fb.[0-3]/graphics/fb[0-9]/ovl_alpha 5 This file is only available on fb[0-9] devices corresponding 12 What: /sys/devices/platform/sh_mobile_lcdc_fb.[0-3]/graphics/fb[0-9]/ovl_mode 16 This file is only available on fb[0-9] devices corresponding 25 What: /sys/devices/platform/sh_mobile_lcdc_fb.[0-3]/graphics/fb[0-9]/ovl_position 29 This file is only available on fb[0-9] devices corresponding 35 What: /sys/devices/platform/sh_mobile_lcdc_fb.[0-3]/graphics/fb[0-9]/ovl_rop3 39 This file is only available on fb[0-9] devices corresponding
|
H A D | sysfs-bus-iio-dac-ltc2688 | 1 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_en 12 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_raw 20 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_raw_available 26 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_offset 33 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_frequency 45 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_phase 51 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_dither_phase_available 57 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_toggle_en 69 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_raw0 70 What: /sys/bus/iio/devices/iio:deviceX/out_voltageY_raw1 [all …]
|
H A D | sysfs-devices-platform-trackpoint | 1 What: /sys/devices/platform/i8042/.../sensitivity 8 What: /sys/devices/platform/i8042/.../intertia 16 What: /sys/devices/platform/i8042/.../reach 23 What: /sys/devices/platform/i8042/.../draghys 31 What: /sys/devices/platform/i8042/.../mindrag 38 What: /sys/devices/platform/i8042/.../speed 45 What: /sys/devices/platform/i8042/.../thresh 53 What: /sys/devices/platform/i8042/.../upthresh 61 What: /sys/devices/platform/i8042/.../ztime 69 What: /sys/devices/platform/i8042/.../jenks [all …]
|
H A D | sysfs-bus-event_source-devices-events | 1 What: /sys/devices/cpu/events/ 2 /sys/devices/cpu/events/branch-misses 3 /sys/devices/cpu/events/cache-references 4 /sys/devices/cpu/events/cache-misses 5 /sys/devices/cpu/events/stalled-cycles-frontend 6 /sys/devices/cpu/events/branch-instructions 7 /sys/devices/cpu/events/stalled-cycles-backend 8 /sys/devices/cpu/events/instructions 9 /sys/devices/cpu/events/cpu-cycles 30 What: /sys/bus/event_source/devices/<pmu>/events/<event> [all …]
|
H A D | sysfs-platform-ideapad-laptop | 1 What: /sys/bus/platform/devices/VPC2004:*/camera_power 8 What: /sys/bus/platform/devices/VPC2004:*/fan_mode 21 What: /sys/bus/platform/devices/VPC2004:*/touchpad 30 What: /sys/bus/platform/devices/VPC2004:*/conservation_mode 39 What: /sys/bus/platform/devices/VPC2004:*/fn_lock 52 /sys/bus/pci/devices/0000:00:1f.0/PNP0C09:00/VPC2004:00/fn_lock 54 What: /sys/bus/platform/devices/VPC2004:*/usb_charging 60 enabled or not. This feature enables charging USB devices
|
H A D | sysfs-platform-dfl-fme | 1 What: /sys/bus/platform/devices/dfl-fme.0/ports_num 9 What: /sys/bus/platform/devices/dfl-fme.0/bitstream_id 17 What: /sys/bus/platform/devices/dfl-fme.0/bitstream_metadata 25 What: /sys/bus/platform/devices/dfl-fme.0/cache_size 31 What: /sys/bus/platform/devices/dfl-fme.0/fabric_version 39 What: /sys/bus/platform/devices/dfl-fme.0/socket_id 48 What: /sys/bus/platform/devices/dfl-fme.0/errors/pcie0_errors 57 What: /sys/bus/platform/devices/dfl-fme.0/errors/pcie1_errors 87 What: /sys/bus/platform/devices/dfl-fme.0/errors/fme_errors 103 What: /sys/bus/platform/devices/dfl-fme.0/errors/next_error [all …]
|
H A D | sysfs-bus-cdx | 6 and devices on the CDX bus. Any new devices are scanned and 7 added to the list of Linux devices and any devices removed are 14 What: /sys/bus/cdx/devices/.../vendor 22 What: /sys/bus/cdx/devices/.../device 31 What: /sys/bus/cdx/devices/.../reset 44 What: /sys/bus/cdx/devices/.../remove 56 # echo 1 > /sys/bus/cdx/devices/.../remove
|
H A D | sysfs-bus-mei | 1 What: /sys/bus/mei/devices/.../modalias 9 What: /sys/bus/mei/devices/.../name 16 What: /sys/bus/mei/devices/.../uuid 23 What: /sys/bus/mei/devices/.../version 30 What: /sys/bus/mei/devices/.../max_conn 37 What: /sys/bus/mei/devices/.../fixed 44 What: /sys/bus/mei/devices/.../vtag 51 What: /sys/bus/mei/devices/.../max_len
|
H A D | sysfs-bus-nfit | 5 What: /sys/bus/nd/devices/nmemX/nfit/serial 14 What: /sys/bus/nd/devices/nmemX/nfit/handle 23 What: /sys/bus/nd/devices/nmemX/nfit/device 31 What: /sys/bus/nd/devices/nmemX/nfit/rev_id 39 What: /sys/bus/nd/devices/nmemX/nfit/phys_id 49 What: /sys/bus/nd/devices/nmemX/nfit/flags 66 What: /sys/bus/nd/devices/nmemX/nfit/format 67 What: /sys/bus/nd/devices/nmemX/nfit/format1 84 What: /sys/bus/nd/devices/nmemX/nfit/vendor 102 What: /sys/bus/nd/devices/nmemX/nfit/family [all …]
|
H A D | sysfs-bus-pci-devices-cciss | 1 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/model 8 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/rev 15 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/unique_id 22 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/vendor 29 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/block:cciss!cXdY 35 What: /sys/bus/pci/devices/<dev>/ccissX/rescan 42 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/lunid 49 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/raid_level 56 What: /sys/bus/pci/devices/<dev>/ccissX/cXdY/usage_count 63 What: /sys/bus/pci/devices/<dev>/ccissX/resettable [all …]
|
H A D | sysfs-bus-iio-bno055 | 1 What: /sys/bus/iio/devices/iio:deviceX/in_accel_raw_range 10 What: /sys/bus/iio/devices/iio:deviceX/in_anglvel_raw_range 19 What: /sys/bus/iio/devices/iio:deviceX/in_accel_raw_range_available 25 What: /sys/bus/iio/devices/iio:deviceX/in_anglvel_raw_range_available 31 What: /sys/bus/iio/devices/iio:deviceX/in_magn_calibration_fast_enable 38 What: /sys/bus/iio/devices/iio:deviceX/fusion_enable 45 What: /sys/bus/iio/devices/iio:deviceX/calibration_data 51 What: /sys/bus/iio/devices/iio:deviceX/in_accel_calibration_auto_status 59 What: /sys/bus/iio/devices/iio:deviceX/in_gyro_calibration_auto_status 67 What: /sys/bus/iio/devices/iio:deviceX/in_magn_calibration_auto_status [all …]
|
H A D | sysfs-devices-soc | 1 What: /sys/devices/socX 5 The /sys/devices/ directory contains a sub-directory for each 11 about devices which are commonly contained in /sys/devices/platform. 13 devices would be better suited to appear as children of that SoC. 15 What: /sys/devices/socX/machine 22 What: /sys/devices/socX/family 53 What: /sys/devices/socX/serial_number 60 What: /sys/devices/socX/soc_id 73 What: /sys/devices/socX/revision 80 What: /sys/devices/socX/process [all …]
|
/openbmc/linux/tools/testing/selftests/cpu-hotplug/ |
H A D | cpu-on-off-test.sh | 27 if ! ls $SYSFS/devices/system/cpu/cpu* > /dev/null 2>&1; then 33 online_cpus=`cat $SYSFS/devices/system/cpu/online` 41 present_cpus=`cat $SYSFS/devices/system/cpu/present` 47 offline_cpus=`cat $SYSFS/devices/system/cpu/offline` 63 for cpu in $SYSFS/devices/system/cpu/cpu*; do 82 grep -q 1 $SYSFS/devices/system/cpu/cpu$1/online 87 grep -q 0 $SYSFS/devices/system/cpu/cpu$1/online 92 echo 1 > $SYSFS/devices/system/cpu/cpu$1/online 97 echo 0 > $SYSFS/devices/system/cpu/cpu$1/online
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 25 devices.deny. For instance:: 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 32 echo a > /sys/fs/cgroup/1/devices.deny 36 echo a > /sys/fs/cgroup/1/devices.allow 79 # echo "c 116:* r" > A/devices.deny 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will [all …]
|
/openbmc/linux/Documentation/driver-api/ |
H A D | s390-drivers.rst | 11 drive s390 based channel attached I/O devices. This includes interfaces 25 The s390 common I/O layer also provides access to some devices that are 26 not strictly considered I/O devices. They are considered here as well, 52 command structure used to address its devices, the ccw bus contains 53 so-called channel attached devices. They are addressed via I/O 55 channel-attached devices, however, will never interact with the 59 I/O functions for channel-attached devices 70 ccw devices 75 provides the abstractions of ccw devices and ccw device drivers. 110 devices as slave devices and can be associated with the netdevice. [all …]
|
H A D | vfio-mediated-device.rst | 5 VFIO Mediated devices 14 Virtual Function I/O (VFIO) Mediated devices[1] 18 SR_IOV capability is increasing. Previously, to virtualize such devices, 22 interface for such devices. 46 devices as examples, as these devices are the first devices to use this module:: 145 * Multiple mediated devices in a single virtual machine 146 * Multiple mediated devices from different physical devices 167 | | |--- [devices] 174 | | |--- [devices] 181 | |--- [devices] [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | sysfs-rules.rst | 38 - devices are only "devices" 43 applications that look for devices in sysfs. 104 and this is below: ``/sys/devices.`` 112 symlinks pointing to the unified ``/sys/devices`` tree. 120 "devices" directory at ``/sys/subsystem/<name>/devices``, 142 ``/sys/devices/`` like the bus devices. If the link-resolving of a 144 "device"-link to find the parent devices in ``/sys/devices/``, That is the 152 that class devices are not created in ``/sys/devices.`` If a device 161 directories live in ``/sys/devices.`` 163 - Position of devices along device chain can change. [all …]
|
H A D | thunderbolt.rst | 105 /sys/bus/thunderbolt/devices/0-1/authorized - 0 106 /sys/bus/thunderbolt/devices/0-1/device - 0x8004 108 /sys/bus/thunderbolt/devices/0-1/vendor - 0x1 124 /sys/bus/thunderbolt/devices/0-3/authorized - 0 125 /sys/bus/thunderbolt/devices/0-3/device - 0x305 127 /sys/bus/thunderbolt/devices/0-3/key - 128 /sys/bus/thunderbolt/devices/0-3/vendor - 0x41 142 # echo $key > /sys/bus/thunderbolt/devices/0-3/key 151 # echo $key > /sys/bus/thunderbolt/devices/0-3/key 163 De-authorizing devices [all …]
|
/openbmc/qemu/tests/qtest/ |
H A D | display-vga-test.c | 31 static const char *devices[] = { in main() local 41 for (int i = 0; i < ARRAY_SIZE(devices); i++) { in main() 42 if (qtest_has_device(devices[i])) { in main() 43 char *testpath = g_strdup_printf("/display/pci/%s", devices[i]); in main() 44 qtest_add_data_func(testpath, devices[i], test_vga); in main()
|
/openbmc/linux/drivers/staging/iio/Documentation/ |
H A D | sysfs-bus-iio-dds | 2 What: /sys/bus/iio/devices/.../out_altvoltageX_frequencyY 13 What: /sys/bus/iio/devices/.../out_altvoltageX_frequencyY_scale 22 What: /sys/bus/iio/devices/.../out_altvoltageX_frequencysymbol 32 What: /sys/bus/iio/devices/.../out_altvoltageX_phaseY 43 What: /sys/bus/iio/devices/.../out_altvoltageX_phaseY_scale 52 What: /sys/bus/iio/devices/.../out_altvoltageX_phasesymbol 61 What: /sys/bus/iio/devices/.../out_altvoltageX_pincontrol_en 63 What: /sys/bus/iio/devices/.../out_altvoltageX_pincontrol_phase_en 74 What: /sys/bus/iio/devices/.../out_altvoltageX_out_enable 75 What: /sys/bus/iio/devices/.../out_altvoltageX_outY_enable [all …]
|
/openbmc/u-boot/drivers/block/ |
H A D | Kconfig | 2 bool "Support block devices" 6 Enable support for block devices, such as SCSI, MMC and USB 9 devices often have a partition table which allows the device to 16 Some devices require block support whether or not DM is enabled 19 bool "Support block devices in SPL" 23 Enable support for block devices, such as SCSI, MMC and USB 26 devices often have a partition table which allows the device to 31 bool "Support block devices in TPL" 35 Enable support for block devices, such as SCSI, MMC and USB 38 devices often have a partition table which allows the device to [all …]
|
/openbmc/linux/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_encoders.c | 50 if (amdgpu_encoder->devices & amdgpu_connector->devices) { in amdgpu_link_encoder_connector() 52 if (amdgpu_encoder->devices & (ATOM_DEVICE_LCD_SUPPORT)) { in amdgpu_link_encoder_connector() 74 amdgpu_encoder->active_device = amdgpu_encoder->devices & amdgpu_connector->devices; in amdgpu_encoder_set_active_device() 76 amdgpu_encoder->active_device, amdgpu_encoder->devices, in amdgpu_encoder_set_active_device() 77 amdgpu_connector->devices, encoder->encoder_type); in amdgpu_encoder_set_active_device() 95 if (amdgpu_encoder->active_device & amdgpu_connector->devices) { in amdgpu_get_connector_for_encoder() 116 if (amdgpu_encoder->devices & amdgpu_connector->devices) { in amdgpu_get_connector_for_encoder_init() 140 (amdgpu_encoder->devices & other_amdgpu_encoder->devices)) in amdgpu_get_external_encoder()
|
/openbmc/linux/Documentation/trace/coresight/ |
H A D | coresight-tpda.rst | 22 Root: ``/sys/bus/coresight/devices/tpda<N>`` 28 "/sys/bus/coresight/devices". 30 /sys/bus/coresight/devices # ls -l | grep tpd 31 tpda0 -> ../../../devices/platform/soc@0/6004000.tpda/tpda0 32 tpdm0 -> ../../../devices/platform/soc@0/6c08000.mm.tpdm/tpdm0 38 echo 1 > /sys/bus/coresight/devices/tmc_etf0/enable_sink 39 echo 1 > /sys/bus/coresight/devices/tpdm0/enable_source 40 echo 1 > /sys/bus/coresight/devices/tpdm0/integration_test 41 echo 2 > /sys/bus/coresight/devices/tpdm0/integration_test
|
/openbmc/qemu/docs/ |
H A D | bypass-iommu.txt | 7 devices in the system can only support go through vIOMMU or not, which 9 coexist of devices go through vIOMMU and devices not. This is useful to 10 passthrough devices with no-iommu mode and devices go through vIOMMU in 14 determine whether the devices attached on the PCI host bridge will bypass 16 virtual iommu in the system, it is implemented to allow some devices to 18 the attached devices will go through vIOMMU by default. 66 There might be potential security risk when devices bypass iommu, because 67 devices might send malicious dma request to virtual machine if there is no 76 space for devices bypass iommu. 79 RID mapping for devices which do not bypass iommu. [all …]
|