Home
last modified time | relevance | path

Searched refs:randomized (Results 1 – 15 of 15) sorted by relevance

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/stressapptest/
H A Dstressapptest_1.0.11.bb3 is a memory interface test. It tries to maximize randomized traffic to memory \
/openbmc/linux/Documentation/powerpc/
H A Dkaslr-booke32.rst16 entries are not suitable to map the kernel directly in a randomized
/openbmc/u-boot/board/sunxi/
H A DREADME.nand22 randomized, and with the necessary bits needed to reduce the number of
/openbmc/linux/lib/
H A DKconfig.kcsan120 If delays should be randomized, where the maximum is KCSAN_UDELAY_*.
138 If instruction skip count should be randomized, where the maximum is
H A DKconfig.debug2081 for coverage-guided fuzzing (randomized testing).
/openbmc/linux/Documentation/arch/x86/x86_64/
H A Dmm.rst149 physical memory, vmalloc/ioremap space and virtual memory map are randomized.
/openbmc/linux/security/
H A DKconfig.hardening319 marked with __randomize_layout, will be randomized at compile-time.
354 ordering randomized.
/openbmc/linux/drivers/mtd/nand/raw/
H A Dsunxi_nand.c906 bool randomized = nand->options & NAND_NEED_SCRAMBLING; in sunxi_nfc_hw_ecc_read_chunks_dma() local
962 ret = sunxi_nfc_hw_ecc_correct(nand, randomized ? data : NULL, in sunxi_nfc_hw_ecc_read_chunks_dma()
1001 if (randomized) in sunxi_nfc_hw_ecc_read_chunks_dma()
/openbmc/linux/Documentation/dev-tools/
H A Dkcsan.rst259 stall for a small randomized delay.
/openbmc/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst1141 1 Make the addresses of mmap base, stack and VDSO page randomized.
1144 location of code start is randomized. This is the default if the
1153 start of the brk area is randomized. There are however no known
/openbmc/linux/arch/x86/
H A DKconfig2124 randomized separately. The physical address will be anywhere
2126 virtual address will be randomized from 16MB up to 1GB (9 bits
2131 randomized together. They will be randomized from 16MB up to
2264 kernel space. Since this location is not randomized with ASLR,
/openbmc/linux/arch/
H A DKconfig1012 An architecture supports choosing randomized locations for
1279 The kernel stack offset can be randomized (after pt_regs) by
/openbmc/linux/crypto/
H A DKconfig181 including randomized fuzz tests.
/openbmc/linux/Documentation/networking/
H A Dip-sysctl.rst1428 of messages per second is randomized.
1435 For security reasons, the precise burst size is randomized.
/openbmc/linux/arch/arm64/
H A DKconfig2243 When this option is not set, the module region will be randomized over