/linux-4.4.14/include/uapi/sound/ |
D | asound_fm.h | 53 unsigned char attack; /* 4 bits: attack rate */ member
|
/linux-4.4.14/Documentation/input/ |
D | iforce-protocol.txt | 87 0a-0b Address of attack and fade parameters, or ffff if none. 101 02-03 Duration of attack (little endian encoding, in ms) 102 04 Level at end of attack. Signed byte. 232 - attack and fade : 0e
|
/linux-4.4.14/sound/pci/asihpi/ |
D | hpi.h | 1406 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay); 1408 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay); 1410 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay); 1412 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay); 1645 u32 attack);
|
D | hpifunc.c | 1885 u32 attack) in hpi_compander_set_attack_time_constant() argument 1887 return hpi_control_param_set(h_control, HPI_COMPANDER_ATTACK, attack, in hpi_compander_set_attack_time_constant() 1892 u32 *attack) in hpi_compander_get_attack_time_constant() argument 1895 index, attack, NULL); in hpi_compander_get_attack_time_constant() 2062 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_rms_ballistics() argument 2065 attack, decay); in hpi_meter_set_rms_ballistics() 2070 u32 attack; in hpi_meter_get_rms_ballistics() local 2075 &attack, &decay); in hpi_meter_get_rms_ballistics() 2078 *pn_attack = (unsigned short)attack; in hpi_meter_get_rms_ballistics() 2085 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_peak_ballistics() argument [all …]
|
/linux-4.4.14/net/ipv4/ |
D | Kconfig | 100 attack or a misconfigured system somewhere. The information is 265 Normal TCP/IP networking is open to an attack known as "SYN 266 flooding". This denial-of-service attack prevents legitimate remote 268 attack and requires very little work from the attacker, who can 271 SYN cookies provide protection against this type of attack. If you 274 continue to connect, even when your machine is under attack. There
|
/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 46 - By itself, no_new_privs can be used to reduce the attack surface
|
D | seccomp_filter.txt | 77 time, but allow for further decreasing the attack surface during
|
/linux-4.4.14/security/integrity/ima/ |
D | Kconfig | 118 the security extended attributes from offline attack, enable
|
/linux-4.4.14/Documentation/security/ |
D | Yama.txt | 19 of their attack without resorting to user-assisted phishing.
|
/linux-4.4.14/sound/synth/emux/ |
D | soundfont.c | 1052 int attack, hold, decay, release; in load_guspatch() local 1053 attack = calc_gus_envelope_time in load_guspatch() 1072 snd_sf_calc_parm_attack(attack); in load_guspatch()
|
/linux-4.4.14/sound/drivers/opl3/ |
D | opl3_synth.c | 508 reg_val = (voice->attack << 4) & OPL3_ATTACK_MASK; in snd_opl3_set_voice()
|
/linux-4.4.14/Documentation/video4linux/ |
D | si4713.txt | 102 acomp_attack_time - Sets the attack time for audio dynamic range control.
|
/linux-4.4.14/fs/cifs/ |
D | Kconfig | 82 attack.
|
/linux-4.4.14/Documentation/networking/ |
D | ipvs-sysctl.txt | 103 syn-flooding attack.
|
D | README.sb1000 | 173 messages to figure out what the attack is and where it's coming from. Next,
|
D | scaling.txt | 174 source Denial of Service attack.
|
D | ip-sysctl.txt | 537 overflows. This is to prevent against the common 'SYN flood attack'
|
/linux-4.4.14/Documentation/sysctl/ |
D | net.txt | 125 denial-of-service attack impossible. A higher message_cost factor, results in
|
/linux-4.4.14/arch/ |
D | Kconfig | 382 overwrite the canary, which gets detected and the attack is then
|
/linux-4.4.14/arch/x86/ |
D | Kconfig | 2134 context switches and increases the low-level kernel attack
|
/linux-4.4.14/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 1436 which is a DOS attack. A somewhat more secure alternative would to be
|