/linux-4.1.27/arch/arm/mm/ |
H A D | copypage-v6.c | 31 * attack the kernel's existing mapping of these pages. 47 * attack the kernel's existing mapping of this page.
|
/linux-4.1.27/include/uapi/sound/ |
H A D | asound_fm.h | 53 unsigned char attack; /* 4 bits: attack rate */ member in struct:snd_dm_fm_voice
|
H A D | sfnt_info.h | 91 unsigned short modatkhld; /* modulation attack & hold time (0x7f7f) */ 96 unsigned short volatkhld; /* volume attack & hold time (0x7f7f) */
|
/linux-4.1.27/sound/synth/emux/ |
H A D | emux_effect.c | 58 {PARM_BYTE_LO, 1, 0x80, parm_offset(modatkhld), 0}, /* env1 attack */ 67 {PARM_BYTE_LO, 1, 0x80, parm_offset(volatkhld), 0}, /* env2 attack */
|
H A D | emux_nrpn.c | 233 /* attack: */ gs_attack() 341 /* attack: */ xg_attack()
|
H A D | soundfont.c | 632 * Env1/2: delay=0, attack=0, hold=0, sustain=0, decay=0, release=0. 870 /* attack & decay/release time table (msec) */ 918 /* attack time: search from time table */ 1052 int attack, hold, decay, release; load_guspatch() local 1053 attack = calc_gus_envelope_time load_guspatch() 1072 snd_sf_calc_parm_attack(attack); load_guspatch()
|
/linux-4.1.27/sound/pci/asihpi/ |
H A D | hpifunc.c | 1885 u32 attack) hpi_compander_set_attack_time_constant() 1887 return hpi_control_param_set(h_control, HPI_COMPANDER_ATTACK, attack, hpi_compander_set_attack_time_constant() 1892 u32 *attack) hpi_compander_get_attack_time_constant() 1895 index, attack, NULL); hpi_compander_get_attack_time_constant() 2062 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay) hpi_meter_set_rms_ballistics() argument 2065 attack, decay); hpi_meter_set_rms_ballistics() 2070 u32 attack; hpi_meter_get_rms_ballistics() local 2075 &attack, &decay); hpi_meter_get_rms_ballistics() 2078 *pn_attack = (unsigned short)attack; hpi_meter_get_rms_ballistics() 2085 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay) hpi_meter_set_peak_ballistics() argument 2088 attack, decay); hpi_meter_set_peak_ballistics() 2094 u32 attack; hpi_meter_get_peak_ballistics() local 2099 &attack, &decay); hpi_meter_get_peak_ballistics() 2102 *pn_attack = (short)attack; hpi_meter_get_peak_ballistics() 1884 hpi_compander_set_attack_time_constant(u32 h_control, unsigned int index, u32 attack) hpi_compander_set_attack_time_constant() argument 1891 hpi_compander_get_attack_time_constant(u32 h_control, unsigned int index, u32 *attack) hpi_compander_get_attack_time_constant() argument
|
H A D | hpi.h | 1406 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay); 1408 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay); 1410 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay); 1412 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay); 1645 u32 attack);
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
H A D | p80211conv.c | 368 /* Is someone trying an oflow attack? */ skb_p80211_to_ether() 397 /* Is someone trying an oflow attack? */ skb_p80211_to_ether() 429 /* Is someone trying an oflow attack? */ skb_p80211_to_ether() 464 /* Is someone trying an oflow attack? */ skb_p80211_to_ether()
|
/linux-4.1.27/sound/soc/codecs/ |
H A D | sta32x.h | 180 /* 0x12 0x13 0x14 0x15 limiter attack/release */
|
H A D | sta350.h | 197 /* 0x12 0x13 0x14 0x15 limiter attack/release */
|
H A D | sta32x.c | 485 /* depending on mode, the attack/release thresholds have
|
H A D | sta350.c | 512 * depending on mode, the attack/release thresholds have
|
/linux-4.1.27/fs/ |
H A D | binfmt_aout.c | 221 * as part of an exploit attack against /proc-related vulnerabilities. load_aout_binary() 361 * as part of an exploit attack against /proc-related vulnerabilities. load_aout_library()
|
/linux-4.1.27/sound/drivers/opl3/ |
H A D | opl3_synth.c | 507 /* Set attack phase level */ snd_opl3_set_voice() 508 reg_val = (voice->attack << 4) & OPL3_ATTACK_MASK; snd_opl3_set_voice()
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | tls.c | 68 * Non-present segments with DPL 3 present an interesting attack tls_desc_okay()
|
/linux-4.1.27/include/net/ |
H A D | request_sock.h | 159 * against spoofing attack.
|
/linux-4.1.27/net/core/ |
H A D | request_sock.c | 195 * This is a simple defense against TFO spoofing attack - by reqsk_fastopen_remove()
|
/linux-4.1.27/include/sound/ |
H A D | emu10k1.h | 481 #define ATKHLDV 0x11 /* Volume envelope hold and attack register */ 482 #define ATKHLDV_PHASE0 0x00008000 /* 0 = Begin attack phase */ 484 #define ATKHLDV_ATTACKTIME_MASK 0x0000007f /* Envelope attack time, log encoded */ 488 #define DCYSUSV_PHASE1_MASK 0x00008000 /* 0 = Begin attack phase, 1 = begin release phase */ 504 #define ATKHLDM 0x15 /* Modulation envelope hold and attack register */ 505 #define ATKHLDM_PHASE0 0x00008000 /* 0 = Begin attack phase */ 507 #define ATKHLDM_ATTACKTIME 0x0000007f /* Envelope attack time, log encoded */ 511 #define DCYSUSM_PHASE1_MASK 0x00008000 /* 0 = Begin attack phase, 1 = begin release phase */
|
/linux-4.1.27/include/uapi/linux/ |
H A D | input.h | 1023 * @attack_length: duration of the attack (ms) 1024 * @attack_level: level at the beginning of the attack 1031 * Valid range for the attack and fade levels is 0x0000 - 0x7fff
|
/linux-4.1.27/drivers/mtd/nand/ |
H A D | tmio_nand.c | 479 /* FIXME - is this required or merely another attack of the broken tmio_resume()
|
/linux-4.1.27/net/sctp/ |
H A D | sm_statetable.c | 70 pr_warn("table %p possible attack: event %d exceeds max %d\n", \
|
H A D | transport.c | 420 * against the ACK-Splitting attack outlined in [SAVAGE99]. sctp_transport_raise_cwnd()
|
H A D | sm_statefuns.c | 1228 /* Association is NULL since this may be a restart attack and we sctp_sf_send_restart_abort() 1262 * are being added as we may be under a takeover attack. 1721 * restart. Though this is a pretty complicated attack sctp_sf_do_dupcook_a() 2289 * lifetimes making the endpoint more subject to a replay attack. 2331 * a replay attack. sctp_sf_do_5_2_6_stale()
|
/linux-4.1.27/lib/ |
H A D | rhashtable.c | 758 * chain length to exceed it unless we are under attack rhashtable_init()
|
/linux-4.1.27/net/sched/ |
H A D | sch_fq.c | 229 * 2) We do not want to rate limit them (eg SYNFLOOD attack), fq_classify()
|
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/ |
H A D | lib-ptl.c | 855 * There's also a DOS attack risk. If users don't post match-all MDs on a
|
/linux-4.1.27/drivers/hid/usbhid/ |
H A D | hid-pidff.c | 262 hid_dbg(pidff->hid, "attack %u => %d\n", pidff_set_envelope_report()
|
/linux-4.1.27/include/linux/ |
H A D | vmw_vmci_defs.h | 522 * limit on event datagrams from the hypervisor to guard against DoS attack
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_minisocks.c | 777 * avoid becoming vulnerable to outside attack aiming at tcp_check_req()
|
H A D | tcp_input.c | 5738 * service attack, and SYN cookies can't defend tcp_rcv_state_process()
|
/linux-4.1.27/drivers/thermal/ |
H A D | thermal_core.c | 727 * and can cause the system to go into a thermal heart attack passive_store()
|
/linux-4.1.27/fs/proc/ |
H A D | task_mmu.c | 1328 /* do not disclose physical addresses: attack vector */ pagemap_open()
|
/linux-4.1.27/arch/powerpc/mm/ |
H A D | tlb_low_64e.S | 882 * a stray kernel pointer or a userland attack trying to hit those
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
H A D | fw-api.h | 1135 * alg = CCM only. Checks replay attack for 11w frames. Relevant only if
|
/linux-4.1.27/kernel/events/ |
H A D | uprobes.c | 1557 * attack from user-space. prepare_uretprobe()
|
/linux-4.1.27/fs/cifs/ |
H A D | smb2pdu.c | 460 * negotiate info for signed connections helps reduce attack vectors smb3_validate_negotiate()
|
/linux-4.1.27/kernel/printk/ |
H A D | printk.c | 2689 * every 5s to make a denial-of-service attack impossible.
|
/linux-4.1.27/drivers/net/ethernet/broadcom/bnx2x/ |
H A D | bnx2x_cmn.c | 2017 * overrun attack. for_each_queue()
|
/linux-4.1.27/fs/ext3/ |
H A D | inode.c | 1520 * represent an unprivileged user DOS attack --- we'd be ext3_bmap()
|
/linux-4.1.27/mm/ |
H A D | vmscan.c | 2181 * It's just vindictive to attack the larger once the smaller
|
/linux-4.1.27/tools/lguest/ |
H A D | lguest.c | 3405 * you now yearn to attack? That is the real game, and I look forward to you
|
/linux-4.1.27/fs/ext4/ |
H A D | inode.c | 2936 * represent an unprivileged user DOS attack --- we'd be ext4_bmap()
|