Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp775609ybb; Sat, 28 Mar 2020 09:47:03 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtTb6TCN50+TVFJcXk0vY71a2GBPqYe/ZqsrIEQ0d9EbQFDu2o10RKdS4r9tMyrlpDZSrjm X-Received: by 2002:a9d:27c7:: with SMTP id c65mr3414154otb.318.1585414023805; Sat, 28 Mar 2020 09:47:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585414023; cv=none; d=google.com; s=arc-20160816; b=wT/qbGXmBs32l0+/vgTdX9Ja3QTSiSvRz2D+f0ewC9pK8AjJyi3FT5wGl5qPytUz6u gTZy+sCXfOYxE7xbVvZvqJ+xU8r+liG44kdLuLhl+W9FunZYhZbE0QMS2cTf2WzA9FvQ rM0NgCmXHB6lI53NMxtg9lz7u2ZfEFumyohhRhL3yABWejH4w8otoVIDT8lPDZUZ9cfl aYLV0+wPYsA/NURpsrCjE86dcz9sqDa+uLE90lqF1sCv2MNMH8Zacq91R9Ilo6EERUrL /Z6OwRNn4pb+dU2iQbRz3j2p2Nld+b0BuA3+xUsIpEZzttacwyDCGFjoW0YHCs3OX/hJ nREQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:date:from:message-id; bh=vhVJALWbhH7h7y5uQhbPlQ6TsrVAPXpMVAHJyCteJj8=; b=ILvrC3mS6KGZPnEx1TegnBBdp0gtXd9eciLACEI1cjF8f4S77lzLkNitCnOtNIUgUN 9ffWc0KC6mRLeafJYlnXYYhpHwmTOaSzVM3i+iTYLo/UoH7dGu2NUXW0BKLuSK+7Qpy1 FMHirEJ/qVecpX9iEa39KbfS7+T5b1ov1v3UK4SVorE9GK/R7kQCK0jT/iut3re8CH62 /QOJmEZ/S3NtzYmWgg4lnXeDxoKjN702pCOGzaOVY5oc120SSqNdUzcnbiLukKygjqYz BLaEyolIYH/yr/VDyqsPfREBsrnSxii4S72N9RvXh5Lj7cN5rTZQjn7I7Jmh4B+8e1x9 3APw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x63si3764024oia.101.2020.03.28.09.46.50; Sat, 28 Mar 2020 09:47:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728182AbgC1QqO (ORCPT + 99 others); Sat, 28 Mar 2020 12:46:14 -0400 Received: from mx.sdf.org ([205.166.94.20]:50109 "EHLO mx.sdf.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727606AbgC1QnZ (ORCPT ); Sat, 28 Mar 2020 12:43:25 -0400 Received: from sdf.org (IDENT:lkml@sdf.lonestar.org [205.166.94.16]) by mx.sdf.org (8.15.2/8.14.5) with ESMTPS id 02SGhNxj023546 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits) verified NO); Sat, 28 Mar 2020 16:43:23 GMT Received: (from lkml@localhost) by sdf.org (8.15.2/8.12.8/Submit) id 02SGhNSB019516; Sat, 28 Mar 2020 16:43:23 GMT Message-Id: <202003281643.02SGhNSB019516@sdf.org> From: George Spelvin Date: Wed, 21 Aug 2019 21:30:45 -0400 Subject: [RFC PATCH v1 41/50] drivers/block/drbd/drbd_nl.c: Use get_random_u64() To: linux-kernel@vger.kernel.org, lkml@sdf.org Cc: Lars Ellenberg , Philipp Reisner , drbd-dev@tron.linbit.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There's no need to get_random_bytes() into a temporary buffer. This is not a no-brainer change; get_random_u64() has slightly weaker security guarantees, but they're fine for applications like these where the random value is stored in the kernel for as long as it's valuable. Signed-off-by: George Spelvin Cc: Lars Ellenberg Cc: Philipp Reisner Cc: drbd-dev@lists.linbit.com --- drivers/block/drbd/drbd_nl.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/block/drbd/drbd_nl.c b/drivers/block/drbd/drbd_nl.c index de2f94d0103a6..ca8c706d47f3a 100644 --- a/drivers/block/drbd/drbd_nl.c +++ b/drivers/block/drbd/drbd_nl.c @@ -3223,9 +3223,7 @@ int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info) * the refuse to re-connect or re-attach (because no * matching real data uuid exists). */ - u64 val; - get_random_bytes(&val, sizeof(u64)); - drbd_set_ed_uuid(device, val); + drbd_set_ed_uuid(device, get_random_u64()); drbd_warn(device, "Resumed without access to data; please tear down before attempting to re-configure.\n"); } clear_bit(NEW_CUR_UUID, &device->flags); -- 2.26.0