Home
last modified time | relevance | path

Searched refs:attack (Results 1 – 25 of 49) sorted by relevance

12

/linux-6.3-rc2/Documentation/devicetree/bindings/sound/
A Dmaxim,max98504.yaml44 Brownout attenuation to the speaker gain applied during the "attack hold"
47 maxim,brownout-attack-hold-ms:
51 Brownout attack hold phase time in ms, VBATBROWN_ATTK_HOLD, register 0x0018.
A Dcs35l36.txt113 - cirrus,cirrus,vpbr-atk-rate : Attenuation attack step rate. Configures the
132 - cirrus,vpbr-mute-en : During the attack state, if the vpbr-max-attn value
/linux-6.3-rc2/Documentation/admin-guide/hw-vuln/
A Dspectre.rst92 The branch target injection attack takes advantage of speculative
116 the attack revealing useful data.
141 Currently the only known real-world BHB attack vector is via
151 not cover all possible attack vectors.
162 a pointer for a Spectre variant 1 attack. The index or pointer
195 become visible via an L1 side channel attack.
275 The attack mechanism is similar to how user processes attack the
362 attack between user processes:
450 not cover all attack vectors for Spectre variant 1.
526 also prevent the program from launching a variant 2 attack
[all …]
A Dl1tf.rst56 similar to the Meltdown attack.
59 allows to attack any physical memory address in the system and the attack
60 works across all protection domains. It allows an attack of SGX and also
73 application to attack the physical memory to which these PTEs resolve.
78 The Linux kernel contains a mitigation for this attack vector, PTE
92 PTE inversion mitigation for L1TF, to attack physical host memory.
98 only to attack data which is present in L1D, a malicious guest running
103 If the processor does not support Extended Page Tables, the attack is
107 While solutions exist to mitigate these attack vectors fully, these
258 which run untrusted guests, reduces the attack vector space.
[all …]
A Dmds.rst55 allows in turn to infer the value via a cache side channel attack.
74 the TLBleed attack samples can be postprocessed successfully.
220 to use MWAIT in user space (Ring 3) which opens an potential attack vector
A Dcross-thread-rsb.rst61 An attack can be mounted on affected processors by performing a series of CALL
A Dcore-scheduling.rst16 A cross-HT attack involves the attacker and victim running on different Hyper
135 HT1 (attack) HT2 (victim)
A Dmultihit.rst9 exploit this erratum to perform a denial of service attack.
/linux-6.3-rc2/Documentation/security/
A Dself-protection.rst9 and actively detecting attack attempts. Not all topics are explored in
20 attack surface. (Especially when they have the ability to load arbitrary
114 bug to an attack.
127 unexpectedly extend the available attack surface. (The on-demand loading
146 to gain execution control during an attack, By far the most commonly
149 kind of attack exist, and protections exist to defend against them.
164 A less well understood attack is using a bug that triggers the
166 allocations. With this attack it is possible to write beyond the end of
200 defense, in that an attack must gather enough information about a
224 mounting a successful attack, making the location non-deterministic
A Dlandlock.rst17 expose a minimal attack surface.
86 deputy attack).
/linux-6.3-rc2/include/uapi/sound/
A Dasound_fm.h39 unsigned char attack; /* 4 bits: attack rate */ member
/linux-6.3-rc2/Documentation/input/devices/
A Diforce-protocol.rst126 0a-0b Address of attack and fade parameters, or ffff if none.
147 02-03 Duration of attack (little endian encoding, in ms)
148 04 Level at end of attack. Signed byte.
356 - attack and fade : 0e
/linux-6.3-rc2/sound/pci/asihpi/
A Dhpi.h1395 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay);
1397 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay);
1399 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay);
1401 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay);
1634 u32 attack);
A Dhpifunc.c1886 u32 attack) in hpi_compander_set_attack_time_constant() argument
1893 u32 *attack) in hpi_compander_get_attack_time_constant() argument
1896 index, attack, NULL); in hpi_compander_get_attack_time_constant()
2065 attack, decay); in hpi_meter_set_rms_ballistics()
2070 u32 attack; in hpi_meter_get_rms_ballistics() local
2075 &attack, &decay); in hpi_meter_get_rms_ballistics()
2078 *pn_attack = (unsigned short)attack; in hpi_meter_get_rms_ballistics()
2088 attack, decay); in hpi_meter_set_peak_ballistics()
2094 u32 attack; in hpi_meter_get_peak_ballistics() local
2099 &attack, &decay); in hpi_meter_get_peak_ballistics()
[all …]
/linux-6.3-rc2/Documentation/userspace-api/
A Dno_new_privs.rst52 - By itself, ``no_new_privs`` can be used to reduce the attack surface
/linux-6.3-rc2/net/ipv4/
A DKconfig99 attack or a misconfigured system somewhere. The information is
271 Normal TCP/IP networking is open to an attack known as "SYN
272 flooding". This denial-of-service attack prevents legitimate remote
274 attack and requires very little work from the attacker, who can
277 SYN cookies provide protection against this type of attack. If you
280 continue to connect, even when your machine is under attack. There
/linux-6.3-rc2/Documentation/admin-guide/gpio/
A Dgpio-aggregator.rst23 grab and which not, reducing the attack surface.
/linux-6.3-rc2/Documentation/admin-guide/LSM/
A DYama.rst20 of their attack without resorting to user-assisted phishing.
/linux-6.3-rc2/sound/synth/emux/
A Dsoundfont.c1049 int attack, hold, decay, release; in load_guspatch() local
1050 attack = calc_gus_envelope_time in load_guspatch()
1069 snd_sf_calc_parm_attack(attack); in load_guspatch()
/linux-6.3-rc2/Documentation/x86/
A Dbuslock.rst120 tolerated, but an eventual Denial of Service attack has to be prevented. It
A Dtsx_async_abort.rst11 TSX Async Abort (TAA) is a side channel attack on internal buffers in some
/linux-6.3-rc2/drivers/firmware/efi/
A DKconfig177 bool "Reset memory attack mitigation"
209 PCI devices from being able to attack the OS via DMA. However, since
/linux-6.3-rc2/sound/drivers/opl3/
A Dopl3_synth.c500 reg_val = (voice->attack << 4) & OPL3_ATTACK_MASK; in snd_opl3_set_voice()
/linux-6.3-rc2/Documentation/admin-guide/media/
A Dsi4713.rst113 - acomp_attack_time - Sets the attack time for audio dynamic range control.
/linux-6.3-rc2/Documentation/arm64/
A Dpointer-authentication.rst17 used to mitigate certain classes of attack where an attacker can corrupt

Completed in 54 milliseconds

12