/linux/Documentation/devicetree/bindings/net/ |
H A D | ti,cc1352p7.yaml | 32 bootloader-backdoor-gpios: 35 gpios to enable bootloader backdoor in cc1352p7 bootloader to allow 55 bootloader-backdoor-gpios = <&pio 36 GPIO_ACTIVE_LOW>;
|
/linux/include/linux/ |
H A D | vbox_utils.h | 13 * vboxguest logging functions, these log both to the backdoor and call 21 /* Only use backdoor logging for non-dynamic debug builds */
|
/linux/drivers/scsi/csiostor/ |
H A D | csio_hw_t5.c | 43 * 64-bit BAR0/BAR1 ... We use the hardware backdoor mechanism to in csio_t5_set_mem_win() 134 * csio_t5_mc_read - read from MC through backdoor accesses 181 * csio_t5_edc_read - read from EDC through backdoor accesses
|
/linux/sound/pci/cs46xx/ |
H A D | cs46xx.h | 550 * The following defines are for the flags in the serial port backdoor sample 557 * The following defines are for the flags in the serial port backdoor status 564 * The following defines are for the flags in the serial port backdoor command 571 * The following defines are for the flags in the serial port backdoor address 582 * The following defines are for the flags in the serial port backdoor 588 * The following defines are for the flags in the serial port backdoor write 595 * The following defines are for the flags in the serial port backdoor read
|
/linux/Documentation/driver-api/usb/ |
H A D | callbacks.rst | 26 2. Odd backdoor through usbfs:
|
/linux/drivers/video/fbdev/ |
H A D | sstfb.c | 878 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_detect_att() 903 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_detect_ti() 976 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_pll_att_ti() 1066 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_vidmod_att_ti() 1074 sst_dac_write(DACREG_WMA, 0); /* backdoor */ in sst_set_vidmod_att_ti()
|
/linux/drivers/gpu/drm/vmwgfx/ |
H A D | vmwgfx_msg.c | 148 * high-bandwidth port if available, or through the backdoor otherwise. 197 * high-bandwidth port if available, or through the backdoor otherwise. 1133 * vmw_disable_backdoor: Disables all backdoor communication
|
/linux/arch/powerpc/platforms/44x/ |
H A D | fsp2.h | 218 #define CMUN_ETDRB 0x3F /* ETDR Backdoor */
|
/linux/include/video/ |
H A D | gbe.h | 313 #define GBE_VOF_MAGICKEY 0x2000 /* Backdoor key */
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
H A D | sw.c | 56 * backdoor ASPM setting such as EPHY setting. in rtl92c_init_aspm_vars()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/ |
H A D | sw.c | 56 * backdoor ASPM setting such as EPHY setting. in rtl92ee_init_aspm_vars()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
H A D | sw.c | 57 * backdoor ASPM setting such as EPHY setting. in rtl92d_init_aspm_vars()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
H A D | sw.c | 50 * backdoor ASPM setting such as EPHY setting. in rtl92s_init_aspm_vars()
|
H A D | phy.c | 1570 * This is the backdoor solution to switch clock in rtl92s_phy_switch_ephy_parameter()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
H A D | sw.c | 55 * backdoor ASPM setting such as EPHY setting. in rtl8723be_init_aspm_vars()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
H A D | sw.c | 50 * backdoor ASPM setting such as EPHY setting. in rtl88e_init_aspm_vars()
|
/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_guc.h | 310 * @fast_response_selftest: Backdoor to CT handler for fast response selftest
|
/linux/drivers/net/ethernet/chelsio/cxgb4/ |
H A D | cudbg_lib.c | 2144 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_tid() 2436 * backdoor access. in cudbg_collect_dump_context() 2449 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_dump_context() 2627 /* If firmware is not attached/alive, use backdoor register in cudbg_collect_tcam_index()
|
/linux/drivers/gpu/drm/amd/display/dmub/ |
H A D | dmub_srv.h | 672 * Resets the DMUB hardware and performs backdoor loading of the
|
/linux/drivers/greybus/ |
H A D | gb-beagleplay.c | 1055 desc = devm_gpiod_get(&bg->sd->dev, "bootloader-backdoor", GPIOD_IN); in gb_fw_init()
|
/linux/arch/arm64/boot/dts/ti/ |
H A D | k3-am625-beagleplay.dts | 897 bootloader-backdoor-gpios = <&main_gpio0 13 GPIO_ACTIVE_HIGH>;
|
/linux/sound/pci/lx6464es/ |
H A D | lx_core.c | 1091 /* backdoor for ethersound commands in lx_interrupt()
|
/linux/arch/x86/kvm/svm/ |
H A D | svm.c | 316 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer() 1260 * Guest access to VMware backdoor ports could legitimately in init_vmcb() 2387 * 2) VMware backdoor 2410 * VMware backdoor emulation on #GP interception only handles in gp_interception()
|
/linux/Documentation/translations/it_IT/process/ |
H A D | maintainer-pgp-guide.rst | 679 Oppure, cosa succede se viene scoperta una backdoor nel codice e la riga
|
/linux/Documentation/process/ |
H A D | maintainer-pgp-guide.rst | 659 Or what happens if a backdoor is discovered in the code and the "Author"
|