aboutsummaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorJann Horn <jann@thejh.net>2016-10-31 15:04:01 +0100
committerMister Oyster <oysterized@gmail.com>2017-10-14 16:01:53 +0200
commit25e99df04b1d41338a2a2ada3941d3ee1dbb4673 (patch)
tree3b2fcc3081f380bc815ea04a275049eef82613e7 /net
parentbed4c9124a4a0d9a1ec167d2f959289f74e1987d (diff)
fork: make whole stack_canary random
On machines with sizeof(unsigned long)==8, this ensures that the more significant 32 bits of stack_canary are random, too. stack_canary is defined as unsigned long, all the architectures with stack protector support already pick the stack_canary of init as a random unsigned long, and get_random_long() should be as fast as get_random_int(), so there seems to be no good reason against this. This should help if someone tries to guess a stack canary with brute force. (This change has been made in PaX already, with a different RNG.) Signed-off-by: Jann Horn <jann@thejh.net> Acked-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions