diff options
author | Theodore Ts'o <tytso@mit.edu> | 2013-11-08 06:14:53 +0100 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2013-11-08 06:14:53 +0100 |
commit | dd1f723bf56bd96efc9d90e9e60dc511c79de48f (patch) | |
tree | 3860500165c69c225ccd5121f2ffde93dfbf4f02 /fs/ext4/mmp.c | |
parent | ext4: remove unreachable code after ext4_can_extents_be_merged() (diff) | |
download | linux-dd1f723bf56bd96efc9d90e9e60dc511c79de48f.tar.xz linux-dd1f723bf56bd96efc9d90e9e60dc511c79de48f.zip |
ext4: use prandom_u32() instead of get_random_bytes()
Many of the uses of get_random_bytes() do not actually need
cryptographically secure random numbers. Replace those uses with a
call to prandom_u32(), which is faster and which doesn't consume
entropy from the /dev/random driver.
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Diffstat (limited to 'fs/ext4/mmp.c')
-rw-r--r-- | fs/ext4/mmp.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/ext4/mmp.c b/fs/ext4/mmp.c index 214461e42a05..04434ad3e8e0 100644 --- a/fs/ext4/mmp.c +++ b/fs/ext4/mmp.c @@ -259,7 +259,7 @@ static unsigned int mmp_new_seq(void) u32 new_seq; do { - get_random_bytes(&new_seq, sizeof(u32)); + new_seq = prandom_u32(); } while (new_seq > EXT4_MMP_SEQ_MAX); return new_seq; |