| /linux/Documentation/firmware-guide/acpi/ |
| H A D | chromeos-acpi-device.rst | 4 Chrome OS ACPI Device 7 Hardware functionality specific to Chrome OS is exposed through a Chrome OS ACPI device. 8 The plug and play ID of a Chrome OS ACPI device is GGL0001 and the hardware ID is 19 - Chrome OS switch positions 22 - Chrome OS hardware ID 25 - Chrome OS firmware version 28 - Chrome OS read-only firmware version 31 - Chrome OS boot information 34 - Chrome OS GPIO assignments 37 - Chrome OS NVRAM locations [all …]
|
| H A D | osi.rst | 24 but where Linux was installed to replace the original OS (Windows or OSX). 71 interpreter in the kernel would return to it a string identifying the OS: 77 The idea was on a platform tasked with running multiple OS's, 78 the BIOS could use _OS to enable devices that an OS 80 necessary to make the platform compatible with that pre-existing OS. 83 of every possible version of the OS that would run on it, and needed to know 84 all the quirks of those OS's. Certainly it would make more sense 85 for the BIOS to ask *specific* things of the OS, such 102 and asks the OS: "YES/NO, are you compatible with this interface?" 104 eg. _OSI("3.0 Thermal Model") would return TRUE if the OS knows how [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-class-mic | 9 Integrated Core (MIC) architecture that runs a Linux OS. 42 MIC device in the context of the card OS. Possible values that 47 "ready" The MIC device is ready to boot the card OS. 52 "booting" The MIC device has initiated booting a card OS. 54 "shutting_down" The card OS is shutting down. 60 operations depending upon the current state of the card OS. 65 "boot" Boot the card OS image specified by the combination 69 "shutdown" Initiates card OS shutdown. 77 An Intel MIC device runs a Linux OS during its operation. This 78 OS can shutdown because of various reasons. When read, this [all …]
|
| H A D | sysfs-driver-ppi | 31 executed in the pre-OS environment. It is the only input from 32 the OS to the pre-OS environment. The request should be an 60 operation to be executed in the pre-OS environment by the BIOS 71 operation to be executed in the pre-OS environment by the BIOS
|
| H A D | sysfs-firmware-acpi | 14 loading the OS boot loader into memory. 17 launching the currently loaded OS boot loader 20 point when the OS loader calls the 24 just prior to the OS loader gaining control 29 OS write to SLP_TYP upon entry to S3. In 42 handoff to the OS waking vector. In nanoseconds. 48 The BGRT is an ACPI 5.0 feature that allows the OS 112 OS context. GPE 0x12, for example, would vector
|
| H A D | configfs-usb-gadget | 137 This group contains "OS String" extension handling attributes. 140 use flag turning "OS Descriptors" support on/off 143 qw_sign an identifier to be reported as "OS String"
|
| /linux/tools/perf/Documentation/ |
| H A D | guest-files.txt | 4 Guest OS /proc/kallsyms file copy. perf reads it to get guest 5 kernel symbols. Users copy it out from guest OS. 8 Guest OS /proc/modules file copy. perf reads it to get guest 9 kernel module information. Users copy it out from guest OS. 12 Guest OS kernel vmlinux.
|
| H A D | guestmount.txt | 2 Guest OS root file system mount directory. Users mount guest OS 5 For example, start 2 guest OS, one's pid is 8888 and the other's is 9999:
|
| /linux/fs/hpfs/ |
| H A D | Kconfig | 3 tristate "OS/2 HPFS file system support" 8 OS/2 is IBM's operating system for PC's, the same as Warp, and HPFS 9 is the file system used for organizing files on OS/2 hard disk 11 write files to an OS/2 HPFS partition on your hard drive. OS/2
|
| /linux/Documentation/PCI/ |
| H A D | acpi-info.rst | 8 OS might use unless there's another way for the OS to find it [1, 2]. 17 described via ACPI. The OS can discover them via the standard PCI 25 namespace [2]. The _CRS is like a generalized PCI BAR: the OS can read 27 a driver for the device [3]. That's important because it means an old OS 28 can work correctly even on a system with new devices unknown to the OS. 29 The new devices might not do anything, but the OS can at least make sure no 33 reserving address space. The static tables are for things the OS needs to 35 is defined, an old OS needs to operate correctly even though it ignores the 37 OS; a static table does not. 39 If the OS is expected to manage a non-discoverable device described via [all …]
|
| /linux/Documentation/filesystems/ |
| H A D | adfs.rst | 25 on a RISC OS Filecore filesystem, but will allow the data within files 45 the RISC OS file type will be added. Default 0. 95 RISC OS file type suffix 98 RISC OS file types are stored in bits 19..8 of the file load address. 100 To enable non-RISC OS systems to be used to store files without losing 104 naming convention is now also used by RISC OS emulators such as RPCEmu.
|
| /linux/Documentation/userspace-api/ |
| H A D | dcdbas.rst | 11 power off after OS shutdown) on certain Dell systems. 55 to perform a power cycle or power off of the system after the OS has finished 57 a driver perform a SMI after the OS has finished shutting down. 73 4) Initiate OS shutdown. 74 (Driver will perform host control SMI when it is notified that the OS
|
| /linux/Documentation/devicetree/bindings/arm/ |
| H A D | secure.txt | 61 be used to pass data to the Secure OS. Only the properties defined 64 - stdout-path : specifies the device to be used by the Secure OS for 67 present, the Secure OS should not perform any console output. If 68 /secure-chosen does not exist, the Secure OS should use the value of 70 Normal world OS).
|
| /linux/arch/alpha/include/asm/ |
| H A D | core_t2.h | 578 #define IOPORT(OS, NS) \ argument 582 return t2_read##OS(xaddr); \ 584 return t2_in##OS((unsigned long)xaddr - T2_IO); \ 589 t2_write##OS(b, xaddr); \ 591 t2_out##OS(b, (unsigned long)xaddr - T2_IO); \
|
| /linux/Documentation/timers/ |
| H A D | no_hz.rst | 8 efficiency and reducing OS jitter. Reducing OS jitter is important for 83 1,500 OS instances might find that half of its CPU time was consumed by 202 So you enable all the OS-jitter features described in this document, 204 your workload isn't affected that much by OS jitter, or is it because 206 by providing a simple OS-jitter test suite, which is available on branch 213 whether or not you have succeeded in removing OS jitter from your system. 214 If this trace shows that you have removed OS jitter as much as is 216 sensitive to OS jitter. 219 We do not currently have a good way to remove OS jitter from single-CPU 286 of OS jitter, including interrupts and system-utility tasks [all …]
|
| /linux/Documentation/virt/hyperv/ |
| H A D | coco.rst | 53 guest OS with no knowledge of memory encryption or other aspects of CoCo VMs 56 aspects of CoCo VMs are handled by the Hyper-V paravisor while the guest OS 59 paravisor, and there is no standardized mechanism for a guest OS to query the 61 the paravisor provides is hard-coded in the guest OS. 72 and must be trusted by the guest OS. By implication, the hypervisor/VMM must 79 * With AMD SEV-SNP processors, in fully-enlightened mode the guest OS runs in 81 guest OS runs in VMPL 2 and the paravisor runs in VMPL 0. The paravisor 82 running in VMPL 0 has privileges that the guest OS in VMPL 2 does not have. 84 paravisor mode the guest OS operates in "virtual Top Of Memory" (vTOM) mode 88 * With Intel TDX processor, in fully-enlightened mode the guest OS runs in an [all …]
|
| /linux/Documentation/livepatch/ |
| H A D | module-elf-format.rst | 34 selected from OS-specific ranges according to the definitions from glibc. 168 SHF_RELA_LIVEPATCH flag ("o" - for OS-specific). 234 94: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.printk,0 285 73: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.snprintf,0 286 74: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.capable,0 287 75: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.find_next_bit,0 288 76: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.si_swapinfo,0 295 "OS" means OS-specific.
|
| /linux/Documentation/driver-api/mei/ |
| H A D | iamt.rst | 18 - OS updates 79 Intel AMT OS Health Watchdog 82 The Intel AMT Watchdog is an OS Health (Hang/Crash) watchdog. 83 Whenever the OS hangs or crashes, Intel AMT will send an event
|
| /linux/Documentation/devicetree/bindings/remoteproc/ |
| H A D | st-rproc.txt | 6 Co-processors can be controlled from the bootloader or the primary OS. If 7 the bootloader starts a co-processor, the primary OS must detect its state
|
| /linux/Documentation/tee/ |
| H A D | op-tee.rst | 50 | API | \/ | subsys | driver | | Trusted OS | 98 building block for OP-TEE OS in secure world to implement the top half and 116 * Attack vector: Replace the OP-TEE OS image in the rootfs to gain control of 135 OP-TEE can be exploited to then load an alternate OS image. 146 later and loading a modified OS.
|
| H A D | amd-tee.rst | 38 | API | | | | | OS | 53 The TEE commands supported by AMD-TEE Trusted OS are: 64 AMD-TEE Trusted OS is the firmware running on AMD Secure Processor.
|
| /linux/drivers/platform/x86/intel/int3472/ |
| H A D | Kconfig | 17 devices depending on the platform. On machines designed for Chrome OS 22 If your device was designed for Chrome OS, this driver will provide
|
| /linux/Documentation/translations/zh_TW/process/ |
| H A D | embargoed-hardware-issues.rst | 18 所有操作系統(“OS”),因此需要在不同的OS供應商、發行版、硬件供應商和其他各方
|
| /linux/Documentation/translations/zh_CN/process/ |
| H A D | embargoed-hardware-issues.rst | 15 所有操作系统(“OS”),因此需要在不同的OS供应商、发行版、硬件供应商和其他各方
|
| /linux/drivers/platform/chrome/ |
| H A D | Kconfig | 3 # Platform support for Chrome OS hardware (Chromebooks and Chromeboxes) 30 tristate "Chrome OS Laptop" 40 tristate "Chrome OS pstore support" 59 select Chrome OS systems. 163 tristate "Backlight LED support for Chrome OS keyboards" 168 select Chrome OS systems. 256 information from the Chrome OS EC.
|