mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-28 08:42:10 +00:00
fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix
tweak and reflow comment Cc: Akinobu Mita <akinobu.mita@gmail.com> Cc: Masami Hiramatsu <mhiramat@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
This commit is contained in:
parent
63f3a043de
commit
14fcdda387
@ -13,8 +13,8 @@
|
||||
#include <linux/fault-inject.h>
|
||||
|
||||
/*
|
||||
* The should_fail() use prandom instead of the normal Linux RNG since they don't
|
||||
* need cryptographically secure random numbers.
|
||||
* The should_fail() functions use prandom instead of the normal Linux RNG
|
||||
* since they don't need cryptographically secure random numbers.
|
||||
*/
|
||||
static DEFINE_PER_CPU(struct rnd_state, fault_rnd_state);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user