aboutsummaryrefslogtreecommitdiff
path: root/scripts/generate_rust_analyzer.py
diff options
context:
space:
mode:
authorJason A. Donenfeld <[email protected]>2022-10-23 22:14:23 +0200
committerJason A. Donenfeld <[email protected]>2022-11-18 02:18:10 +0100
commit622754e84b106a131fbac3f336bb45abf218849b (patch)
treee5371bb7a3f4aad8f9a4d168d79e73776c24b620 /scripts/generate_rust_analyzer.py
parentb3883a9a1f09e7b41f4dcb1bbd7262216a62d253 (diff)
stackprotector: actually use get_random_canary()
The RNG always mixes in the Linux version extremely early in boot. It also always includes a cycle counter, not only during early boot, but each and every time it is invoked prior to being fully initialized. Together, this means that the use of additional xors inside of the various stackprotector.h files is superfluous and over-complicated. Instead, we can get exactly the same thing, but better, by just calling `get_random_canary()`. Acked-by: Guo Ren <[email protected]> # for csky Acked-by: Catalin Marinas <[email protected]> # for arm64 Acked-by: Greg Kroah-Hartman <[email protected]> Signed-off-by: Jason A. Donenfeld <[email protected]>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions