| /OK3568_Linux_fs/buildroot/dl/sox/git/test/ |
| H A D | wtest.pl | 31 my $attack=400; 51 my $env="$attack:$duration:$attack"; # attack, duration, drop 70 my $l=$attack + $duration + $attack; 75 …qx{$sox -2r2 -n i$s.$t synth ${l}s sin $s vol .5 fade h ${attack}s ${l}s ${attack}s pad ${p}s ${p}…
|
| H A D | ltest.pl | 37 my $attack=4000; 82 my $l=$attack + $duration + $attack; 83 my $env="$attack:$duration:$attack"; # attack, duration, drop 88 …qx{$sox -2r2 -n i$s.$t synth ${l}s sin $s vol .5 fade h ${attack}s ${l}s ${attack}s pad ${p}s ${p}…
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/sound/ |
| H A D | max98504.txt | 20 applied during the "attack hold" and "timed hold" phase, the value must be 22 - maxim,brownout-attack-hold-ms - the brownout attack hold phase time in ms,
|
| H A D | cs35l36.txt | 113 - cirrus,cirrus,vpbr-atk-rate : Attenuation attack step rate. Configures the 132 - cirrus,vpbr-mute-en : During the attack state, if the vpbr-max-attn value
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | spectre.rst | 69 The bounds check bypass attack :ref:`[2] <spec_ref2>` takes advantage 92 The branch target injection attack takes advantage of speculative 116 the attack revealing useful data. 118 One other variant 2 attack vector is for the attacker to poison the 123 return instructions. This attack can be mitigated by flushing the return 134 Yet another variant 2 attack vector is for the attacker to poison the 141 Currently the only known real-world BHB attack vector is via 150 The following list of attack scenarios have been anticipated, but may 151 not cover all possible attack vectors. 162 a pointer for a Spectre variant 1 attack. The index or pointer [all …]
|
| H A D | l1tf.rst | 56 similar to the Meltdown attack. 59 allows to attack any physical memory address in the system and the attack 60 works across all protection domains. It allows an attack of SGX and also 73 application to attack the physical memory to which these PTEs resolve. 78 The Linux kernel contains a mitigation for this attack vector, PTE 92 PTE inversion mitigation for L1TF, to attack physical host memory. 98 only to attack data which is present in L1D, a malicious guest running 99 on one Hyperthread can attack the data which is brought into the L1D by 103 If the processor does not support Extended Page Tables, the attack is 107 While solutions exist to mitigate these attack vectors fully, these [all …]
|
| H A D | mds.rst | 55 allows in turn to infer the value via a cache side channel attack. 74 the TLBleed attack samples can be postprocessed successfully. 220 to use MWAIT in user space (Ring 3) which opens an potential attack vector
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | self-protection.rst | 9 and actively detecting attack attempts. Not all topics are explored in 20 attack surface. (Especially when they have the ability to load arbitrary 115 bug to an attack. 128 unexpectedly extend the available attack surface. (The on-demand loading 147 to gain execution control during an attack, By far the most commonly 150 kind of attack exist, and protections exist to defend against them. 165 A less well understood attack is using a bug that triggers the 167 allocations. With this attack it is possible to write beyond the end of 201 defense, in that an attack must gather enough information about a 225 mounting a successful attack, making the location non-deterministic
|
| /OK3568_Linux_fs/buildroot/package/opentyrian/ |
| H A D | 0001-Move-definitions-that-don-t-need-to-be-exposed-from-opl-h-to-opl-c.patch | 118 + fltype a0, a1, a2, a3; // attack rate function coefficients 120 + Bit32u op_state; // current state of operator (attack/decay/sustain/release/off) 132 + Bits env_step_a,env_step_d,env_step_r; // number of std samples of one step (for attack/decay/rel… 289 - fltype a0, a1, a2, a3; // attack rate function coefficients 291 - Bit32u op_state; // current state of operator (attack/decay/sustain/release/off) 303 - Bits env_step_a,env_step_d,env_step_r; // number of std samples of one step (for attack/decay/rel…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/gnutls/gnutls/ |
| H A D | CVE-2023-0361.patch | 25 - const char attack_error[] = "auth_rsa: Possible PKCS #1 attack\n"; 80 /* This is here to avoid the version check attack
|
| /OK3568_Linux_fs/kernel/Documentation/input/devices/ |
| H A D | iforce-protocol.rst | 126 0a-0b Address of attack and fade parameters, or ffff if none. 147 02-03 Duration of attack (little endian encoding, in ms) 148 04 Level at end of attack. Signed byte. 356 - attack and fade : 0e
|
| /OK3568_Linux_fs/buildroot/package/pixiewps/ |
| H A D | Config.in | 6 called "Pixie Dust" attack.
|
| /OK3568_Linux_fs/kernel/include/uapi/sound/ |
| H A D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/sound/ |
| H A D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/sound/ |
| H A D | asound_fm.h | 54 unsigned char attack; /* 4 bits: attack rate */ member
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/python/ |
| H A D | python3-wheel_0.37.1.bb | 12 file://0001-Fixed-potential-DoS-attack-via-WHEEL_INFO_RE.patch \
|
| /OK3568_Linux_fs/kernel/sound/pci/asihpi/ |
| H A D | hpi.h | 1395 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay); 1397 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay); 1399 u16 hpi_meter_get_peak_ballistics(u32 h_control, u16 *attack, u16 *decay); 1401 u16 hpi_meter_get_rms_ballistics(u32 h_control, u16 *attack, u16 *decay); 1634 u32 attack);
|
| H A D | hpifunc.c | 1886 u32 attack) in hpi_compander_set_attack_time_constant() argument 1888 return hpi_control_param_set(h_control, HPI_COMPANDER_ATTACK, attack, in hpi_compander_set_attack_time_constant() 1893 u32 *attack) in hpi_compander_get_attack_time_constant() argument 1896 index, attack, NULL); in hpi_compander_get_attack_time_constant() 2063 u16 hpi_meter_set_rms_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_rms_ballistics() argument 2066 attack, decay); in hpi_meter_set_rms_ballistics() 2071 u32 attack; in hpi_meter_get_rms_ballistics() local 2076 &attack, &decay); in hpi_meter_get_rms_ballistics() 2079 *pn_attack = (unsigned short)attack; in hpi_meter_get_rms_ballistics() 2086 u16 hpi_meter_set_peak_ballistics(u32 h_control, u16 attack, u16 decay) in hpi_meter_set_peak_ballistics() argument [all …]
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0148-templates-Disable-the-os-prober-by-default.patch | 7 dangerous use cases and borderline opening attack vectors. This 42 +creating boot entries based on that data, is a potential attack vector. Set
|
| /OK3568_Linux_fs/buildroot/package/mbedtls/ |
| H A D | Config.in | 28 CRIME attack. You should not enable it unless you know for
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/python/python3-wheel/ |
| H A D | 0001-Fixed-potential-DoS-attack-via-WHEEL_INFO_RE.patch | 4 Subject: [PATCH] Fixed potential DoS attack via WHEEL_INFO_RE
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/busybox/busybox/ |
| H A D | 0001-testsuite-check-uudecode-before-using-it.patch | 27 testing "tar Symlink attack: create symlink and then write through it" '\
|
| /OK3568_Linux_fs/kernel/net/ipv4/ |
| H A D | Kconfig | 99 attack or a misconfigured system somewhere. The information is 271 Normal TCP/IP networking is open to an attack known as "SYN 272 flooding". This denial-of-service attack prevents legitimate remote 274 attack and requires very little work from the attacker, who can 277 SYN cookies provide protection against this type of attack. If you 280 continue to connect, even when your machine is under attack. There
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 52 - By itself, ``no_new_privs`` can be used to reduce the attack surface
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/gpio/ |
| H A D | gpio-aggregator.rst | 23 grab and which not, reducing the attack surface.
|