From 761f57a1b167abeda40c5cc0fce801a4230f2400 Mon Sep 17 00:00:00 2001 From: Anton Kling Date: Mon, 13 Nov 2023 16:05:31 +0100 Subject: Crypto: Implement fast insecure RNG for overwritting memory areas. This is mainly done to test for uninitlalized memory and find bugs faster. Therefore it does not need to be cryptographically secure or perfectly uniform. Xoshiro256++ seems like a good fit. --- kernel/arch/i386/mmu.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'kernel/arch') diff --git a/kernel/arch/i386/mmu.c b/kernel/arch/i386/mmu.c index 2b6c0b5..4ac17da 100644 --- a/kernel/arch/i386/mmu.c +++ b/kernel/arch/i386/mmu.c @@ -36,7 +36,7 @@ void *ksbrk(size_t s) { // If there is no active pagedirectory we // just assume that the memory is // already mapped. - get_random((void *)rc, data_end - rc); + get_fast_insecure_random((void *)rc, data_end - rc); return (void *)rc; } // Determine whether we are approaching a unallocated table @@ -59,7 +59,7 @@ void *ksbrk(size_t s) { assert(((uintptr_t)rc % PAGE_SIZE) == 0); memset((void *)rc, 0x00, s); - get_random((void *)rc, data_end - rc); + get_fast_insecure_random((void *)rc, data_end - rc); return (void *)rc; } -- cgit v1.2.3