Home
last modified time | relevance | path

Searched refs:randomized (Results 1 – 10 of 10) sorted by relevance

/Linux-v4.19/arch/arm64/
DKconfig.debug31 of the kernel to be randomized at build-time. When selected,
32 this option will cause TEXT_OFFSET to be randomized upon any
DKconfig1217 When this option is not set, the module region will be randomized over
/Linux-v4.19/Documentation/x86/x86_64/
Dmm.txt74 physical memory, vmalloc/ioremap space and virtual memory map are randomized.
/Linux-v4.19/scripts/gcc-plugins/
DKconfig109 marked with __randomize_layout, will be randomized at compile-time.
/Linux-v4.19/Documentation/dev-tools/
Dkcov.rst5 guided fuzzing (randomized testing). Coverage data of a running kernel is
/Linux-v4.19/drivers/mtd/nand/raw/
Dsunxi_nand.c1012 bool randomized = nand->options & NAND_NEED_SCRAMBLING; in sunxi_nfc_hw_ecc_read_chunks_dma() local
1062 ret = sunxi_nfc_hw_ecc_correct(mtd, randomized ? data : NULL, in sunxi_nfc_hw_ecc_read_chunks_dma()
1101 if (randomized) in sunxi_nfc_hw_ecc_read_chunks_dma()
/Linux-v4.19/Documentation/sysctl/
Dkernel.txt835 1 - Make the addresses of mmap base, stack and VDSO page randomized.
838 location of code start is randomized. This is the default if the
847 start of the brk area is randomized. There are however no known
/Linux-v4.19/arch/x86/
DKconfig2118 randomized separately. The physical address will be anywhere
2120 virtual address will be randomized from 16MB up to 1GB (9 bits
2125 randomized together. They will be randomized from 16MB up to
2297 kernel space. Since this location is not randomized with ASLR,
/Linux-v4.19/arch/
DKconfig569 An architecture supports choosing randomized locations for
/Linux-v4.19/lib/
DKconfig.debug755 for coverage-guided fuzzing (randomized testing).