From 761f57a1b167abeda40c5cc0fce801a4230f2400 Mon Sep 17 00:00:00 2001 From: Anton Kling Date: Mon, 13 Nov 2023 16:05:31 +0100 Subject: Crypto: Implement fast insecure RNG for overwritting memory areas. This is mainly done to test for uninitlalized memory and find bugs faster. Therefore it does not need to be cryptographically secure or perfectly uniform. Xoshiro256++ seems like a good fit. --- kernel/kmalloc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'kernel/kmalloc.c') diff --git a/kernel/kmalloc.c b/kernel/kmalloc.c index 2fb4f03..8a674f5 100644 --- a/kernel/kmalloc.c +++ b/kernel/kmalloc.c @@ -143,7 +143,7 @@ void *kmalloc(size_t s) { free_entry->flags = 0; free_entry->n = new_entry; free_entry->magic = 0xdde51ab9410268b1; - get_random((void *)rc, s); + get_fast_insecure_random((void *)rc, s); return rc; } -- cgit v1.2.3