Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 29) sorted by relevance

12

/Linux-v4.19/Documentation/devicetree/bindings/sound/
Dmax98504.txt20 applied during the "attack hold" and "timed hold" phase, the value must be
22 - maxim,brownout-attack-hold-ms - the brownout attack hold phase time in ms,
/Linux-v4.19/Documentation/admin-guide/
Dl1tf.rst56 similar to the Meltdown attack.
59 allows to attack any physical memory address in the system and the attack
60 works across all protection domains. It allows an attack of SGX and also
73 application to attack the physical memory to which these PTEs resolve.
78 The Linux kernel contains a mitigation for this attack vector, PTE
92 PTE inversion mitigation for L1TF, to attack physical host memory.
98 only to attack data which is present in L1D, a malicious guest running
99 on one Hyperthread can attack the data which is brought into the L1D by
103 If the processor does not support Extended Page Tables, the attack is
107 While solutions exist to mitigate these attack vectors fully, these
[all …]
/Linux-v4.19/Documentation/security/
Dself-protection.rst9 and actively detecting attack attempts. Not all topics are explored in
20 attack surface. (Especially when they have the ability to load arbitrary
115 bug to an attack.
128 unexpectedly extend the available attack surface. (The on-demand loading
147 to gain execution control during an attack, By far the most commonly
150 kind of attack exist, and protections exist to defend against them.
165 A less well understood attack is using a bug that triggers the
167 allocations. With this attack it is possible to write beyond the end of
201 defense, in that an attack must gather enough information about a
225 mounting a successful attack, making the location non-deterministic
/Linux-v4.19/include/uapi/sound/
Dasound_fm.h54 unsigned char attack; /* 4 bits: attack rate */ member
/Linux-v4.19/Documentation/input/devices/
Diforce-protocol.rst126 0a-0b Address of attack and fade parameters, or ffff if none.
147 02-03 Duration of attack (little endian encoding, in ms)
148 04 Level at end of attack. Signed byte.
356 - attack and fade : 0e
/Linux-v4.19/sound/pci/asihpi/
Dhpi.h1406 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay);
1408 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay);
1410 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay);
1412 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay);
1645 u32 attack);
Dhpifunc.c1886 u32 attack) in hpi_compander_set_attack_time_constant() argument
1888 return hpi_control_param_set(h_control, HPI_COMPANDER_ATTACK, attack, in hpi_compander_set_attack_time_constant()
1893 u32 *attack) in hpi_compander_get_attack_time_constant() argument
1896 index, attack, NULL); in hpi_compander_get_attack_time_constant()
2063 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_rms_ballistics() argument
2066 attack, decay); in hpi_meter_set_rms_ballistics()
2071 u32 attack; in hpi_meter_get_rms_ballistics() local
2076 &attack, &decay); in hpi_meter_get_rms_ballistics()
2079 *pn_attack = (unsigned short)attack; in hpi_meter_get_rms_ballistics()
2086 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_peak_ballistics() argument
[all …]
/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst52 - By itself, ``no_new_privs`` can be used to reduce the attack surface
Dseccomp_filter.rst79 time, but allow for further decreasing the attack surface during
/Linux-v4.19/net/ipv4/
DKconfig98 attack or a misconfigured system somewhere. The information is
270 Normal TCP/IP networking is open to an attack known as "SYN
271 flooding". This denial-of-service attack prevents legitimate remote
273 attack and requires very little work from the attacker, who can
276 SYN cookies provide protection against this type of attack. If you
279 continue to connect, even when your machine is under attack. There
/Linux-v4.19/Documentation/admin-guide/LSM/
DYama.rst20 of their attack without resorting to user-assisted phishing.
/Linux-v4.19/sound/synth/emux/
Dsoundfont.c1052 int attack, hold, decay, release; in load_guspatch() local
1053 attack = calc_gus_envelope_time in load_guspatch()
1072 snd_sf_calc_parm_attack(attack); in load_guspatch()
/Linux-v4.19/Documentation/media/v4l-drivers/
Dsi4713.rst111 - acomp_attack_time - Sets the attack time for audio dynamic range control.
/Linux-v4.19/sound/drivers/opl3/
Dopl3_synth.c512 reg_val = (voice->attack << 4) & OPL3_ATTACK_MASK; in snd_opl3_set_voice()
/Linux-v4.19/drivers/firmware/efi/
DKconfig170 bool "Reset memory attack mitigation"
/Linux-v4.19/security/integrity/ima/
DKconfig153 the security extended attributes from offline attack, enable
/Linux-v4.19/fs/cifs/
DKconfig105 attack.
/Linux-v4.19/Documentation/networking/
Dipvs-sysctl.txt103 syn-flooding attack.
DREADME.sb1000173 messages to figure out what the attack is and where it's coming from. Next,
Dscaling.txt174 source Denial of Service attack.
Dip-sysctl.txt573 overflows. This is to prevent against the common 'SYN flood attack'
/Linux-v4.19/Documentation/filesystems/
Dfscrypt.rst79 attacker to mount a side channel attack against the online system.
90 a physical attack or by exploiting any kernel security vulnerability
/Linux-v4.19/Documentation/sysctl/
Dnet.txt197 denial-of-service attack impossible. A higher message_cost factor, results in
/Linux-v4.19/arch/
DKconfig442 overwrite the canary, which gets detected and the attack is then
/Linux-v4.19/Documentation/filesystems/cifs/
DREADME71 many advanced security features such as downgrade attack detection

12