Home
last modified time | relevance | path

Searched full:backdoor (Results 1 – 25 of 41) sorted by relevance

12

/linux/Documentation/devicetree/bindings/net/
H A Dti,cc1352p7.yaml32 bootloader-backdoor-gpios:
35 gpios to enable bootloader backdoor in cc1352p7 bootloader to allow
55 bootloader-backdoor-gpios = <&pio 36 GPIO_ACTIVE_LOW>;
/linux/include/linux/
H A Dvbox_utils.h13 * vboxguest logging functions, these log both to the backdoor and call
21 /* Only use backdoor logging for non-dynamic debug builds */
/linux/drivers/scsi/csiostor/
H A Dcsio_hw_t5.c43 * 64-bit BAR0/BAR1 ... We use the hardware backdoor mechanism to in csio_t5_set_mem_win()
134 * csio_t5_mc_read - read from MC through backdoor accesses
181 * csio_t5_edc_read - read from EDC through backdoor accesses
/linux/sound/pci/cs46xx/
H A Dcs46xx.h550 * The following defines are for the flags in the serial port backdoor sample
557 * The following defines are for the flags in the serial port backdoor status
564 * The following defines are for the flags in the serial port backdoor command
571 * The following defines are for the flags in the serial port backdoor address
582 * The following defines are for the flags in the serial port backdoor
588 * The following defines are for the flags in the serial port backdoor write
595 * The following defines are for the flags in the serial port backdoor read
/linux/Documentation/driver-api/usb/
H A Dcallbacks.rst26 2. Odd backdoor through usbfs:
/linux/drivers/video/fbdev/
H A Dsstfb.c878 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_detect_att()
903 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_detect_ti()
976 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_pll_att_ti()
1066 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_vidmod_att_ti()
1074 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_vidmod_att_ti()
/linux/drivers/gpu/drm/vmwgfx/
H A Dvmwgfx_msg.c148 * high-bandwidth port if available, or through the backdoor otherwise.
197 * high-bandwidth port if available, or through the backdoor otherwise.
1133 * vmw_disable_backdoor: Disables all backdoor communication
/linux/arch/powerpc/platforms/44x/
H A Dfsp2.h218 #define CMUN_ETDRB 0x3F /* ETDR Backdoor */
/linux/include/video/
H A Dgbe.h313 #define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/
H A Dsw.c56 * backdoor ASPM setting such as EPHY setting. in rtl92c_init_aspm_vars()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/
H A Dsw.c56 * backdoor ASPM setting such as EPHY setting. in rtl92ee_init_aspm_vars()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192de/
H A Dsw.c57 * backdoor ASPM setting such as EPHY setting. in rtl92d_init_aspm_vars()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192se/
H A Dsw.c50 * backdoor ASPM setting such as EPHY setting. in rtl92s_init_aspm_vars()
H A Dphy.c1570 * This is the backdoor solution to switch clock in rtl92s_phy_switch_ephy_parameter()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/
H A Dsw.c55 * backdoor ASPM setting such as EPHY setting. in rtl8723be_init_aspm_vars()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/
H A Dsw.c50 * backdoor ASPM setting such as EPHY setting. in rtl88e_init_aspm_vars()
/linux/drivers/gpu/drm/i915/gt/uc/
H A Dintel_guc.h310 * @fast_response_selftest: Backdoor to CT handler for fast response selftest
/linux/drivers/net/ethernet/chelsio/cxgb4/
H A Dcudbg_lib.c2144 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_tid()
2436 * backdoor access. in cudbg_collect_dump_context()
2449 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_dump_context()
2627 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_tcam_index()
/linux/drivers/gpu/drm/amd/display/dmub/
H A Ddmub_srv.h672 * Resets the DMUB hardware and performs backdoor loading of the
/linux/drivers/greybus/
H A Dgb-beagleplay.c1055 desc = devm_gpiod_get(&bg->sd->dev, "bootloader-backdoor", GPIOD_IN); in gb_fw_init()
/linux/arch/arm64/boot/dts/ti/
H A Dk3-am625-beagleplay.dts897 bootloader-backdoor-gpios = <&main_gpio0 13 GPIO_ACTIVE_HIGH>;
/linux/sound/pci/lx6464es/
H A Dlx_core.c1091 /* backdoor for ethersound commands in lx_interrupt()
/linux/arch/x86/kvm/svm/
H A Dsvm.c316 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer()
1260 * Guest access to VMware backdoor ports could legitimately in init_vmcb()
2387 * 2) VMware backdoor
2410 * VMware backdoor emulation on #GP interception only handles in gp_interception()
/linux/Documentation/translations/it_IT/process/
H A Dmaintainer-pgp-guide.rst679 Oppure, cosa succede se viene scoperta una backdoor nel codice e la riga
/linux/Documentation/process/
H A Dmaintainer-pgp-guide.rst659 Or what happens if a backdoor is discovered in the code and the "Author"

12