/openbmc/linux/drivers/infiniband/hw/hfi1/ |
H A D | trace_ibhdrs.h | 91 const char *hfi1_trace_fmt_lrh(struct trace_seq *p, bool bypass, 97 const char *hfi1_trace_fmt_rest(struct trace_seq *p, bool bypass, u8 l4,
|
/openbmc/linux/kernel/dma/ |
H A D | Kconfig | 16 # IOMMU drivers that can bypass the IOMMU code and optionally use the direct 23 # Lets platform IOMMU driver choose between bypass and IOMMU
|
/openbmc/linux/net/atm/ |
H A D | Kconfig | 56 subnetwork boundaries. These shortcut connections bypass routers
|
/openbmc/u-boot/board/ge/bx50v3/ |
H A D | bx50v3.cfg | 137 /* set IPU AXI-id0 Qos=0xf(bypass) AXI-id1 Qos=0x7 */
|
/openbmc/linux/arch/arm/boot/dts/ti/omap/ |
H A D | dra76-evm.dts | 273 regulator-allow-bypass; 281 regulator-allow-bypass;
|
H A D | omap34xx.dtsi | 152 * "OCP bypass mode", or maybe there is OCP_SYSCONFIG that is
|
/openbmc/u-boot/board/logicpd/imx6/ |
H A D | README | 75 # Reset the board and it will bypass U-Boot and SPL will directly boot
|
/openbmc/u-boot/board/seco/mx6quq7/ |
H A D | mx6quq7-2g.cfg | 169 /* set IPU AXI-id0 Qos=0xf(bypass) AXI-id1 Qos=0x7 */
|
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/af/ |
H A D | mcs.c | 1228 return mcs_dev->bypass; in is_mcs_bypass() 1450 static void mcs_set_external_bypass(struct mcs *mcs, bool bypass) in mcs_set_external_bypass() argument 1456 if (bypass) in mcs_set_external_bypass() 1461 mcs->bypass = bypass; in mcs_set_external_bypass()
|
/openbmc/u-boot/board/barco/titanium/ |
H A D | imximage.cfg | 164 /* set IPU AXI-id0 Qos=0xf(bypass) AXI-id1 Qos=0x7 */
|
/openbmc/linux/arch/arm/boot/dts/qcom/ |
H A D | pm8941.dtsi | 114 boost_bypass_n_pin: boost-bypass-state {
|
/openbmc/linux/drivers/iommu/intel/ |
H A D | Kconfig | 81 Floppy disk drivers are known to bypass DMA API calls
|
/openbmc/linux/drivers/media/platform/samsung/exynos4-is/ |
H A D | fimc-is-param.c | 464 drc->control.bypass = val; in __is_set_drc_control() 686 isp->control.bypass = CONTROL_BYPASS_DISABLE; in fimc_is_set_initial_params() 858 fd->control.bypass = CONTROL_BYPASS_DISABLE; in fimc_is_set_initial_params()
|
/openbmc/linux/drivers/net/phy/mscc/ |
H A D | mscc_macsec.c | 415 else if (flow->action.bypass || flow->port == MSCC_MS_PORT_UNCONTROLLED) in vsc8584_macsec_flow() 660 flow->action.bypass = 1; in vsc8584_macsec_default_flows() 675 flow->action.bypass = 1; in vsc8584_macsec_default_flows()
|
H A D | mscc_macsec.h | 101 u8 bypass:1; member
|
/openbmc/qemu/hw/ppc/ |
H A D | spapr_iommu.c | 235 spapr_vio_set_bypass(tcet->vdev, tcet->bypass); in spapr_tce_table_post_load() 292 VMSTATE_BOOL(bypass, SpaprTceTable),
|
/openbmc/linux/drivers/net/ethernet/microchip/lan966x/ |
H A D | lan966x_main.h | 489 void lan966x_ifh_set_bypass(void *ifh, u64 bypass); 490 void lan966x_ifh_set_port(void *ifh, u64 bypass);
|
/openbmc/linux/sound/soc/fsl/ |
H A D | fsl_spdif.c | 148 bool bypass; member 989 ucontrol->value.integer.value[0] = priv->bypass ? 1 : 0; in fsl_spdif_bypass_get() 1008 if (priv->bypass == set) in fsl_spdif_bypass_put() 1040 priv->bypass = set; in fsl_spdif_bypass_put()
|
/openbmc/u-boot/arch/arm/include/asm/arch-sunxi/ |
H A D | display.h | 14 u32 bypass; /* 0x008 */ member
|
/openbmc/linux/Documentation/devicetree/bindings/interrupt-controller/ |
H A D | brcm,bcm7120-l2-intc.yaml | 117 outputs bypass this 2nd level interrupt controller completely; it is
|
/openbmc/linux/drivers/clk/at91/ |
H A D | pmc.h | 166 struct clk_parent_data *parent_data, bool bypass);
|
/openbmc/linux/arch/arm/boot/dts/nxp/imx/ |
H A D | imx27-phytec-phycore-rdk.dts | 313 nxp,no-comparator-bypass;
|
/openbmc/linux/drivers/iommu/ |
H A D | virtio-iommu.c | 73 bool bypass; member 692 vdomain->bypass = true; in viommu_domain_finalise() 764 if (vdomain->bypass) in viommu_attach_dev()
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | spectre.rst | 45 CVE-2017-5753 Bounds check bypass Spectre variant 1 69 The bounds check bypass attack :ref:`[2] <spec_ref2>` takes advantage 289 for indirect branches to bypass the poisoned branch target buffer, 601 (bounds check bypass). With this option data leaks are 737 [2] `Bounds check bypass <https://software.intel.com/security-software-guidance/software-guidance/b…
|
/openbmc/u-boot/arch/arm/dts/ |
H A D | omap34xx-omap36xx-clocks.dtsi | 173 ti,low-power-bypass;
|