Searched refs:attack (Results 1 - 43 of 43) sorted by relevance

/linux-4.1.27/arch/arm/mm/
H A Dcopypage-v6.c31 * attack the kernel's existing mapping of these pages.
47 * attack the kernel's existing mapping of this page.
/linux-4.1.27/include/uapi/sound/
H A Dasound_fm.h53 unsigned char attack; /* 4 bits: attack rate */ member in struct:snd_dm_fm_voice
H A Dsfnt_info.h91 unsigned short modatkhld; /* modulation attack & hold time (0x7f7f) */
96 unsigned short volatkhld; /* volume attack & hold time (0x7f7f) */
/linux-4.1.27/sound/synth/emux/
H A Demux_effect.c58 {PARM_BYTE_LO, 1, 0x80, parm_offset(modatkhld), 0}, /* env1 attack */
67 {PARM_BYTE_LO, 1, 0x80, parm_offset(volatkhld), 0}, /* env2 attack */
H A Demux_nrpn.c233 /* attack: */ gs_attack()
341 /* attack: */ xg_attack()
H A Dsoundfont.c632 * Env1/2: delay=0, attack=0, hold=0, sustain=0, decay=0, release=0.
870 /* attack & decay/release time table (msec) */
918 /* attack time: search from time table */
1052 int attack, hold, decay, release; load_guspatch() local
1053 attack = calc_gus_envelope_time load_guspatch()
1072 snd_sf_calc_parm_attack(attack); load_guspatch()
/linux-4.1.27/sound/pci/asihpi/
H A Dhpifunc.c1885 u32 attack) hpi_compander_set_attack_time_constant()
1887 return hpi_control_param_set(h_control, HPI_COMPANDER_ATTACK, attack, hpi_compander_set_attack_time_constant()
1892 u32 *attack) hpi_compander_get_attack_time_constant()
1895 index, attack, NULL); hpi_compander_get_attack_time_constant()
2062 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay) hpi_meter_set_rms_ballistics() argument
2065 attack, decay); hpi_meter_set_rms_ballistics()
2070 u32 attack; hpi_meter_get_rms_ballistics() local
2075 &attack, &decay); hpi_meter_get_rms_ballistics()
2078 *pn_attack = (unsigned short)attack; hpi_meter_get_rms_ballistics()
2085 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay) hpi_meter_set_peak_ballistics() argument
2088 attack, decay); hpi_meter_set_peak_ballistics()
2094 u32 attack; hpi_meter_get_peak_ballistics() local
2099 &attack, &decay); hpi_meter_get_peak_ballistics()
2102 *pn_attack = (short)attack; hpi_meter_get_peak_ballistics()
1884 hpi_compander_set_attack_time_constant(u32 h_control, unsigned int index, u32 attack) hpi_compander_set_attack_time_constant() argument
1891 hpi_compander_get_attack_time_constant(u32 h_control, unsigned int index, u32 *attack) hpi_compander_get_attack_time_constant() argument
H A Dhpi.h1406 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay);
1408 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay);
1410 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay);
1412 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay);
1645 u32 attack);
/linux-4.1.27/drivers/staging/wlan-ng/
H A Dp80211conv.c368 /* Is someone trying an oflow attack? */ skb_p80211_to_ether()
397 /* Is someone trying an oflow attack? */ skb_p80211_to_ether()
429 /* Is someone trying an oflow attack? */ skb_p80211_to_ether()
464 /* Is someone trying an oflow attack? */ skb_p80211_to_ether()
/linux-4.1.27/sound/soc/codecs/
H A Dsta32x.h180 /* 0x12 0x13 0x14 0x15 limiter attack/release */
H A Dsta350.h197 /* 0x12 0x13 0x14 0x15 limiter attack/release */
H A Dsta32x.c485 /* depending on mode, the attack/release thresholds have
H A Dsta350.c512 * depending on mode, the attack/release thresholds have
/linux-4.1.27/fs/
H A Dbinfmt_aout.c221 * as part of an exploit attack against /proc-related vulnerabilities. load_aout_binary()
361 * as part of an exploit attack against /proc-related vulnerabilities. load_aout_library()
/linux-4.1.27/sound/drivers/opl3/
H A Dopl3_synth.c507 /* Set attack phase level */ snd_opl3_set_voice()
508 reg_val = (voice->attack << 4) & OPL3_ATTACK_MASK; snd_opl3_set_voice()
/linux-4.1.27/arch/x86/kernel/
H A Dtls.c68 * Non-present segments with DPL 3 present an interesting attack tls_desc_okay()
/linux-4.1.27/include/net/
H A Drequest_sock.h159 * against spoofing attack.
/linux-4.1.27/net/core/
H A Drequest_sock.c195 * This is a simple defense against TFO spoofing attack - by reqsk_fastopen_remove()
/linux-4.1.27/include/sound/
H A Demu10k1.h481 #define ATKHLDV 0x11 /* Volume envelope hold and attack register */
482 #define ATKHLDV_PHASE0 0x00008000 /* 0 = Begin attack phase */
484 #define ATKHLDV_ATTACKTIME_MASK 0x0000007f /* Envelope attack time, log encoded */
488 #define DCYSUSV_PHASE1_MASK 0x00008000 /* 0 = Begin attack phase, 1 = begin release phase */
504 #define ATKHLDM 0x15 /* Modulation envelope hold and attack register */
505 #define ATKHLDM_PHASE0 0x00008000 /* 0 = Begin attack phase */
507 #define ATKHLDM_ATTACKTIME 0x0000007f /* Envelope attack time, log encoded */
511 #define DCYSUSM_PHASE1_MASK 0x00008000 /* 0 = Begin attack phase, 1 = begin release phase */
/linux-4.1.27/include/uapi/linux/
H A Dinput.h1023 * @attack_length: duration of the attack (ms)
1024 * @attack_level: level at the beginning of the attack
1031 * Valid range for the attack and fade levels is 0x0000 - 0x7fff
/linux-4.1.27/drivers/mtd/nand/
H A Dtmio_nand.c479 /* FIXME - is this required or merely another attack of the broken tmio_resume()
/linux-4.1.27/net/sctp/
H A Dsm_statetable.c70 pr_warn("table %p possible attack: event %d exceeds max %d\n", \
H A Dtransport.c420 * against the ACK-Splitting attack outlined in [SAVAGE99]. sctp_transport_raise_cwnd()
H A Dsm_statefuns.c1228 /* Association is NULL since this may be a restart attack and we sctp_sf_send_restart_abort()
1262 * are being added as we may be under a takeover attack.
1721 * restart. Though this is a pretty complicated attack sctp_sf_do_dupcook_a()
2289 * lifetimes making the endpoint more subject to a replay attack.
2331 * a replay attack. sctp_sf_do_5_2_6_stale()
/linux-4.1.27/lib/
H A Drhashtable.c758 * chain length to exceed it unless we are under attack rhashtable_init()
/linux-4.1.27/net/sched/
H A Dsch_fq.c229 * 2) We do not want to rate limit them (eg SYNFLOOD attack), fq_classify()
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/
H A Dlib-ptl.c855 * There's also a DOS attack risk. If users don't post match-all MDs on a
/linux-4.1.27/drivers/hid/usbhid/
H A Dhid-pidff.c262 hid_dbg(pidff->hid, "attack %u => %d\n", pidff_set_envelope_report()
/linux-4.1.27/include/linux/
H A Dvmw_vmci_defs.h522 * limit on event datagrams from the hypervisor to guard against DoS attack
/linux-4.1.27/net/ipv4/
H A Dtcp_minisocks.c777 * avoid becoming vulnerable to outside attack aiming at tcp_check_req()
H A Dtcp_input.c5738 * service attack, and SYN cookies can't defend tcp_rcv_state_process()
/linux-4.1.27/drivers/thermal/
H A Dthermal_core.c727 * and can cause the system to go into a thermal heart attack passive_store()
/linux-4.1.27/fs/proc/
H A Dtask_mmu.c1328 /* do not disclose physical addresses: attack vector */ pagemap_open()
/linux-4.1.27/arch/powerpc/mm/
H A Dtlb_low_64e.S882 * a stray kernel pointer or a userland attack trying to hit those
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/
H A Dfw-api.h1135 * alg = CCM only. Checks replay attack for 11w frames. Relevant only if
/linux-4.1.27/kernel/events/
H A Duprobes.c1557 * attack from user-space. prepare_uretprobe()
/linux-4.1.27/fs/cifs/
H A Dsmb2pdu.c460 * negotiate info for signed connections helps reduce attack vectors smb3_validate_negotiate()
/linux-4.1.27/kernel/printk/
H A Dprintk.c2689 * every 5s to make a denial-of-service attack impossible.
/linux-4.1.27/drivers/net/ethernet/broadcom/bnx2x/
H A Dbnx2x_cmn.c2017 * overrun attack. for_each_queue()
/linux-4.1.27/fs/ext3/
H A Dinode.c1520 * represent an unprivileged user DOS attack --- we'd be ext3_bmap()
/linux-4.1.27/mm/
H A Dvmscan.c2181 * It's just vindictive to attack the larger once the smaller
/linux-4.1.27/tools/lguest/
H A Dlguest.c3405 * you now yearn to attack? That is the real game, and I look forward to you
/linux-4.1.27/fs/ext4/
H A Dinode.c2936 * represent an unprivileged user DOS attack --- we'd be ext4_bmap()

Completed in 1608 milliseconds