Searched refs:randomized (Results 1 – 15 of 15) sorted by relevance
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/stressapptest/ |
H A D | stressapptest_1.0.11.bb | 3 is a memory interface test. It tries to maximize randomized traffic to memory \
|
/openbmc/linux/Documentation/powerpc/ |
H A D | kaslr-booke32.rst | 16 entries are not suitable to map the kernel directly in a randomized
|
/openbmc/u-boot/board/sunxi/ |
H A D | README.nand | 22 randomized, and with the necessary bits needed to reduce the number of
|
/openbmc/linux/lib/ |
H A D | Kconfig.kcsan | 120 If delays should be randomized, where the maximum is KCSAN_UDELAY_*. 138 If instruction skip count should be randomized, where the maximum is
|
H A D | Kconfig.debug | 2081 for coverage-guided fuzzing (randomized testing).
|
/openbmc/linux/security/ |
H A D | Kconfig.hardening | 319 marked with __randomize_layout, will be randomized at compile-time. 354 ordering randomized.
|
/openbmc/linux/Documentation/arch/x86/x86_64/ |
H A D | mm.rst | 149 physical memory, vmalloc/ioremap space and virtual memory map are randomized.
|
/openbmc/linux/drivers/mtd/nand/raw/ |
H A D | sunxi_nand.c | 906 bool randomized = nand->options & NAND_NEED_SCRAMBLING; in sunxi_nfc_hw_ecc_read_chunks_dma() local 962 ret = sunxi_nfc_hw_ecc_correct(nand, randomized ? data : NULL, in sunxi_nfc_hw_ecc_read_chunks_dma() 1001 if (randomized) in sunxi_nfc_hw_ecc_read_chunks_dma()
|
/openbmc/linux/Documentation/dev-tools/ |
H A D | kcsan.rst | 259 stall for a small randomized delay.
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | kernel.rst | 1141 1 Make the addresses of mmap base, stack and VDSO page randomized. 1144 location of code start is randomized. This is the default if the 1153 start of the brk area is randomized. There are however no known
|
/openbmc/linux/arch/x86/ |
H A D | Kconfig | 2150 randomized separately. The physical address will be anywhere 2152 virtual address will be randomized from 16MB up to 1GB (9 bits 2157 randomized together. They will be randomized from 16MB up to 2291 kernel space. Since this location is not randomized with ASLR,
|
/openbmc/linux/arch/ |
H A D | Kconfig | 1012 An architecture supports choosing randomized locations for 1279 The kernel stack offset can be randomized (after pt_regs) by
|
/openbmc/linux/crypto/ |
H A D | Kconfig | 181 including randomized fuzz tests.
|
/openbmc/linux/Documentation/networking/ |
H A D | ip-sysctl.rst | 1428 of messages per second is randomized. 1435 For security reasons, the precise burst size is randomized.
|
/openbmc/linux/arch/arm64/ |
H A D | Kconfig | 2245 When this option is not set, the module region will be randomized over
|