Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

treewide: use get_random_bytes() when possible

The prandom_bytes() function has been a deprecated inline wrapper around
get_random_bytes() for several releases now, and compiles down to the
exact same code. Replace the deprecated wrapper with a direct call to
the real function. This was done as a basic find and replace.

Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Yury Norov <yury.norov@gmail.com>
Reviewed-by: Christophe Leroy <christophe.leroy@csgroup.eu> # powerpc
Acked-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>

+24 -24
+1 -1
arch/powerpc/crypto/crc-vpmsum_test.c
··· 82 82 83 83 if (len <= offset) 84 84 continue; 85 - prandom_bytes(data, len); 85 + get_random_bytes(data, len); 86 86 len -= offset; 87 87 88 88 crypto_shash_update(crct10dif_shash, data+offset, len);
+1 -1
block/blk-crypto-fallback.c
··· 539 539 if (blk_crypto_fallback_inited) 540 540 return 0; 541 541 542 - prandom_bytes(blank_key, BLK_CRYPTO_MAX_KEY_SIZE); 542 + get_random_bytes(blank_key, BLK_CRYPTO_MAX_KEY_SIZE); 543 543 544 544 err = bioset_init(&crypto_bio_split, 64, 0, 0); 545 545 if (err)
+1 -1
crypto/async_tx/raid6test.c
··· 37 37 int i; 38 38 39 39 for (i = 0; i < disks; i++) { 40 - prandom_bytes(page_address(data[i]), PAGE_SIZE); 40 + get_random_bytes(page_address(data[i]), PAGE_SIZE); 41 41 dataptrs[i] = data[i]; 42 42 dataoffs[i] = 0; 43 43 }
+1 -1
drivers/dma/dmatest.c
··· 312 312 { 313 313 unsigned long buf; 314 314 315 - prandom_bytes(&buf, sizeof(buf)); 315 + get_random_bytes(&buf, sizeof(buf)); 316 316 return buf; 317 317 } 318 318
+1 -1
drivers/mtd/nand/raw/nandsim.c
··· 1393 1393 unsigned int page_no = ns->regs.row; 1394 1394 1395 1395 if (ns_read_error(page_no)) { 1396 - prandom_bytes(ns->buf.byte, num); 1396 + get_random_bytes(ns->buf.byte, num); 1397 1397 NS_WARN("simulating read error in page %u\n", page_no); 1398 1398 return 1; 1399 1399 }
+1 -1
drivers/mtd/tests/mtd_nandecctest.c
··· 266 266 goto error; 267 267 } 268 268 269 - prandom_bytes(correct_data, size); 269 + get_random_bytes(correct_data, size); 270 270 ecc_sw_hamming_calculate(correct_data, size, correct_ecc, sm_order); 271 271 for (i = 0; i < ARRAY_SIZE(nand_ecc_test); i++) { 272 272 nand_ecc_test[i].prepare(error_data, error_ecc,
+1 -1
drivers/mtd/tests/speedtest.c
··· 223 223 if (!iobuf) 224 224 goto out; 225 225 226 - prandom_bytes(iobuf, mtd->erasesize); 226 + get_random_bytes(iobuf, mtd->erasesize); 227 227 228 228 bbt = kzalloc(ebcnt, GFP_KERNEL); 229 229 if (!bbt)
+1 -1
drivers/mtd/tests/stresstest.c
··· 183 183 goto out; 184 184 for (i = 0; i < ebcnt; i++) 185 185 offsets[i] = mtd->erasesize; 186 - prandom_bytes(writebuf, bufsize); 186 + get_random_bytes(writebuf, bufsize); 187 187 188 188 bbt = kzalloc(ebcnt, GFP_KERNEL); 189 189 if (!bbt)
+1 -1
drivers/net/ethernet/broadcom/bnxt/bnxt.c
··· 3874 3874 3875 3875 if (bp->vnic_info[i].rss_hash_key) { 3876 3876 if (i == 0) 3877 - prandom_bytes(vnic->rss_hash_key, 3877 + get_random_bytes(vnic->rss_hash_key, 3878 3878 HW_HASH_KEY_SIZE); 3879 3879 else 3880 3880 memcpy(vnic->rss_hash_key,
+1 -1
drivers/net/ethernet/rocker/rocker_main.c
··· 224 224 if (err) 225 225 goto unmap; 226 226 227 - prandom_bytes(buf, ROCKER_TEST_DMA_BUF_SIZE); 227 + get_random_bytes(buf, ROCKER_TEST_DMA_BUF_SIZE); 228 228 for (i = 0; i < ROCKER_TEST_DMA_BUF_SIZE; i++) 229 229 expect[i] = ~buf[i]; 230 230 err = rocker_dma_test_one(rocker, wait, ROCKER_TEST_DMA_CTRL_INVERT,
+6 -6
drivers/net/wireguard/selftest/allowedips.c
··· 284 284 mutex_lock(&mutex); 285 285 286 286 for (i = 0; i < NUM_RAND_ROUTES; ++i) { 287 - prandom_bytes(ip, 4); 287 + get_random_bytes(ip, 4); 288 288 cidr = prandom_u32_max(32) + 1; 289 289 peer = peers[prandom_u32_max(NUM_PEERS)]; 290 290 if (wg_allowedips_insert_v4(&t, (struct in_addr *)ip, cidr, ··· 299 299 } 300 300 for (j = 0; j < NUM_MUTATED_ROUTES; ++j) { 301 301 memcpy(mutated, ip, 4); 302 - prandom_bytes(mutate_mask, 4); 302 + get_random_bytes(mutate_mask, 4); 303 303 mutate_amount = prandom_u32_max(32); 304 304 for (k = 0; k < mutate_amount / 8; ++k) 305 305 mutate_mask[k] = 0xff; ··· 328 328 } 329 329 330 330 for (i = 0; i < NUM_RAND_ROUTES; ++i) { 331 - prandom_bytes(ip, 16); 331 + get_random_bytes(ip, 16); 332 332 cidr = prandom_u32_max(128) + 1; 333 333 peer = peers[prandom_u32_max(NUM_PEERS)]; 334 334 if (wg_allowedips_insert_v6(&t, (struct in6_addr *)ip, cidr, ··· 343 343 } 344 344 for (j = 0; j < NUM_MUTATED_ROUTES; ++j) { 345 345 memcpy(mutated, ip, 16); 346 - prandom_bytes(mutate_mask, 16); 346 + get_random_bytes(mutate_mask, 16); 347 347 mutate_amount = prandom_u32_max(128); 348 348 for (k = 0; k < mutate_amount / 8; ++k) 349 349 mutate_mask[k] = 0xff; ··· 381 381 382 382 for (j = 0;; ++j) { 383 383 for (i = 0; i < NUM_QUERIES; ++i) { 384 - prandom_bytes(ip, 4); 384 + get_random_bytes(ip, 4); 385 385 if (lookup(t.root4, 32, ip) != horrible_allowedips_lookup_v4(&h, (struct in_addr *)ip)) { 386 386 horrible_allowedips_lookup_v4(&h, (struct in_addr *)ip); 387 387 pr_err("allowedips random v4 self-test: FAIL\n"); 388 388 goto free; 389 389 } 390 - prandom_bytes(ip, 16); 390 + get_random_bytes(ip, 16); 391 391 if (lookup(t.root6, 128, ip) != horrible_allowedips_lookup_v6(&h, (struct in6_addr *)ip)) { 392 392 pr_err("allowedips random v6 self-test: FAIL\n"); 393 393 goto free;
+1 -1
fs/ubifs/debug.c
··· 2581 2581 if (ffs) 2582 2582 memset(p + from, 0xFF, to - from); 2583 2583 else 2584 - prandom_bytes(p + from, to - from); 2584 + get_random_bytes(p + from, to - from); 2585 2585 2586 2586 return to; 2587 2587 }
+1 -1
kernel/kcsan/selftest.c
··· 46 46 unsigned long addr; 47 47 size_t verif_size; 48 48 49 - prandom_bytes(&addr, sizeof(addr)); 49 + get_random_bytes(&addr, sizeof(addr)); 50 50 if (addr < PAGE_SIZE) 51 51 addr = PAGE_SIZE; 52 52
+1 -1
lib/random32.c
··· 69 69 * @bytes: the requested number of bytes 70 70 * 71 71 * This is used for pseudo-randomness with no outside seeding. 72 - * For more random results, use prandom_bytes(). 72 + * For more random results, use get_random_bytes(). 73 73 */ 74 74 void prandom_bytes_state(struct rnd_state *state, void *buf, size_t bytes) 75 75 {
+1 -1
lib/test_objagg.c
··· 157 157 int err; 158 158 159 159 if (should_create_root) 160 - prandom_bytes(world->next_root_buf, 160 + get_random_bytes(world->next_root_buf, 161 161 sizeof(world->next_root_buf)); 162 162 163 163 objagg_obj = world_obj_get(world, objagg, key_id);
+1 -1
lib/uuid.c
··· 52 52 53 53 static void __uuid_gen_common(__u8 b[16]) 54 54 { 55 - prandom_bytes(b, 16); 55 + get_random_bytes(b, 16); 56 56 /* reversion 0b10 */ 57 57 b[8] = (b[8] & 0x3F) | 0x80; 58 58 }
+1 -1
net/ipv4/route.c
··· 3719 3719 3720 3720 ip_idents = idents_hash; 3721 3721 3722 - prandom_bytes(ip_idents, (ip_idents_mask + 1) * sizeof(*ip_idents)); 3722 + get_random_bytes(ip_idents, (ip_idents_mask + 1) * sizeof(*ip_idents)); 3723 3723 3724 3724 ip_tstamps = idents_hash + (ip_idents_mask + 1) * sizeof(*ip_idents); 3725 3725
+1 -1
net/mac80211/rc80211_minstrel_ht.c
··· 2036 2036 2037 2037 memset(sample_table, 0xff, sizeof(sample_table)); 2038 2038 for (col = 0; col < SAMPLE_COLUMNS; col++) { 2039 - prandom_bytes(rnd, sizeof(rnd)); 2039 + get_random_bytes(rnd, sizeof(rnd)); 2040 2040 for (i = 0; i < MCS_GROUP_RATES; i++) { 2041 2041 new_idx = (i + rnd[i]) % MCS_GROUP_RATES; 2042 2042 while (sample_table[col][new_idx] != 0xff)
+1 -1
net/sched/sch_pie.c
··· 72 72 if (vars->accu_prob >= (MAX_PROB / 2) * 17) 73 73 return true; 74 74 75 - prandom_bytes(&rnd, 8); 75 + get_random_bytes(&rnd, 8); 76 76 if ((rnd >> BITS_PER_BYTE) < local_prob) { 77 77 vars->accu_prob = 0; 78 78 return true;