Home
last modified time | relevance | path

Searched refs:randomized (Results 1 – 16 of 16) sorted by relevance

/linux/Documentation/arch/powerpc/
H A Dkaslr-booke32.rst16 entries are not suitable to map the kernel directly in a randomized
/linux/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c452 static void init_key_in_collection(unsigned int index, bool randomized) in init_key_in_collection() argument
468 if (randomized) { in init_key_in_collection()
483 static int init_default_key_collection(unsigned int nr_keys, bool randomized) in init_default_key_collection() argument
508 init_key_in_collection(nr_keys, randomized); in init_default_key_collection()
/linux/lib/
H A DKconfig.kcsan120 If delays should be randomized, where the maximum is KCSAN_UDELAY_*.
138 If instruction skip count should be randomized, where the maximum is
H A DKconfig.debug2214 for coverage-guided fuzzing (randomized testing).
/linux/security/
H A DKconfig.hardening294 marked with __randomize_layout, will be randomized at compile-time.
329 ordering randomized.
/linux/tools/perf/Documentation/
H A Dperf-bench.txt260 Specify seed to randomize page access offset (default: 0, or not randomized).
/linux/Documentation/arch/x86/x86_64/
H A Dmm.rst172 physical memory, vmalloc/ioremap space and virtual memory map are randomized.
/linux/arch/x86/kvm/
H A DKconfig72 # randomized configs from selecting KVM_WERROR=y, which doesn't play
/linux/drivers/mtd/nand/raw/
H A Dsunxi_nand.c1069 bool randomized = nand->options & NAND_NEED_SCRAMBLING; in sunxi_nfc_hw_ecc_read_chunks_dma() local
1129 ret = sunxi_nfc_hw_ecc_correct(nand, randomized ? data : NULL, in sunxi_nfc_hw_ecc_read_chunks_dma()
1169 if (randomized) in sunxi_nfc_hw_ecc_read_chunks_dma()
/linux/Documentation/security/tpm/
H A Dtpm-security.rst205 as the sign handle and providing randomized qualifying data. The
/linux/Documentation/dev-tools/
H A Dkcsan.rst269 stall for a small randomized delay.
/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst1219 1 Make the addresses of mmap base, stack and VDSO page randomized.
1222 location of code start is randomized. This is the default if the
1231 start of the brk area is randomized. There are however no known
/linux/arch/x86/
H A DKconfig2106 randomized separately. The physical address will be anywhere
2108 virtual address will be randomized from 16MB up to 1GB (9 bits
2113 randomized together. They will be randomized from 16MB up to
2241 kernel space. Since this location is not randomized with ASLR,
/linux/arch/
H A DKconfig1180 An architecture supports choosing randomized locations for
1535 The kernel stack offset can be randomized (after pt_regs) by
/linux/Documentation/networking/
H A Dip-sysctl.rst1748 of messages per second is randomized.
1755 For security reasons, the precise burst size is randomized.
/linux/arch/arm64/
H A DKconfig2328 When this option is not set, the module region will be randomized over