aboutsummaryrefslogtreecommitdiffstats
path: root/arch/s390/include/asm/archrandom.h
diff options
context:
space:
mode:
authorRichard Henderson <richard.henderson@linaro.org>2020-01-10 14:54:22 +0000
committerTheodore Ts'o <tytso@mit.edu>2020-01-25 12:18:51 -0500
commit4cb760b02419061209b9b4cc2557986a6bf93e73 (patch)
treec08bb48e7994e4cced7e30c5e115d065f79e7fde /arch/s390/include/asm/archrandom.h
parentpowerpc: Mark archrandom.h functions __must_check (diff)
downloadlinux-dev-4cb760b02419061209b9b4cc2557986a6bf93e73.tar.xz
linux-dev-4cb760b02419061209b9b4cc2557986a6bf93e73.zip
s390x: Mark archrandom.h functions __must_check
We must not use the pointer output without validating the success of the random read. Reviewed-by: Harald Freudenberger <freude@linux.ibm.com> Reviewed-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Richard Henderson <rth@twiddle.net> Signed-off-by: Mark Brown <broonie@kernel.org> Link: https://lore.kernel.org/r/20200110145422.49141-11-broonie@kernel.org Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to '')
-rw-r--r--arch/s390/include/asm/archrandom.h8
1 files changed, 4 insertions, 4 deletions
diff --git a/arch/s390/include/asm/archrandom.h b/arch/s390/include/asm/archrandom.h
index 9a6835137a16..de61ce562052 100644
--- a/arch/s390/include/asm/archrandom.h
+++ b/arch/s390/include/asm/archrandom.h
@@ -21,17 +21,17 @@ extern atomic64_t s390_arch_random_counter;
bool s390_arch_random_generate(u8 *buf, unsigned int nbytes);
-static inline bool arch_get_random_long(unsigned long *v)
+static inline bool __must_check arch_get_random_long(unsigned long *v)
{
return false;
}
-static inline bool arch_get_random_int(unsigned int *v)
+static inline bool __must_check arch_get_random_int(unsigned int *v)
{
return false;
}
-static inline bool arch_get_random_seed_long(unsigned long *v)
+static inline bool __must_check arch_get_random_seed_long(unsigned long *v)
{
if (static_branch_likely(&s390_arch_random_available)) {
return s390_arch_random_generate((u8 *)v, sizeof(*v));
@@ -39,7 +39,7 @@ static inline bool arch_get_random_seed_long(unsigned long *v)
return false;
}
-static inline bool arch_get_random_seed_int(unsigned int *v)
+static inline bool __must_check arch_get_random_seed_int(unsigned int *v)
{
if (static_branch_likely(&s390_arch_random_available)) {
return s390_arch_random_generate((u8 *)v, sizeof(*v));