From patchwork Mon Aug 21 22:28:05 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hauke Mehrtens X-Patchwork-Id: 9913897 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 05B0E603FF for ; Mon, 21 Aug 2017 22:28:48 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id DADE1286AA for ; Mon, 21 Aug 2017 22:28:47 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id CFF19286C5; Mon, 21 Aug 2017 22:28:47 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 92D45286AB for ; Mon, 21 Aug 2017 22:28:47 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754393AbdHUW2r (ORCPT ); Mon, 21 Aug 2017 18:28:47 -0400 Received: from mx2.mailbox.org ([80.241.60.215]:42934 "EHLO mx2.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754294AbdHUW2p (ORCPT ); Mon, 21 Aug 2017 18:28:45 -0400 Received: from smtp1.mailbox.org (smtp1.mailbox.org [80.241.60.240]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx2.mailbox.org (Postfix) with ESMTPS id 3C8CC463CD; Tue, 22 Aug 2017 00:28:44 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter02.heinlein-hosting.de (spamfilter02.heinlein-hosting.de [80.241.56.116]) (amavisd-new, port 10030) with ESMTP id uryfIf8DKT_L; Tue, 22 Aug 2017 00:28:42 +0200 (CEST) From: Hauke Mehrtens To: johannes@sipsolutions.net Cc: backports@vger.kernel.org, Hauke Mehrtens Subject: [PATCH 09/21] header: add get_random_u32() Date: Tue, 22 Aug 2017 00:28:05 +0200 Message-Id: <20170821222817.17376-10-hauke@hauke-m.de> In-Reply-To: <20170821222817.17376-1-hauke@hauke-m.de> References: <20170821222817.17376-1-hauke@hauke-m.de> Sender: backports-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: backports@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This was renamed in upstream kernel and changed from unsigned int to u32. Signed-off-by: Hauke Mehrtens --- backport/backport-include/linux/random.h | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/backport/backport-include/linux/random.h b/backport/backport-include/linux/random.h index a9dda73b..7d817d8b 100644 --- a/backport/backport-include/linux/random.h +++ b/backport/backport-include/linux/random.h @@ -42,4 +42,11 @@ static inline u32 prandom_u32_max(u32 ep_ro) } #endif /* LINUX_VERSION_IS_LESS(3,14,0) */ +#if LINUX_VERSION_IS_LESS(4,11,0) +static inline u32 get_random_u32(void) +{ + return get_random_int(); +} +#endif + #endif /* __BACKPORT_RANDOM_H */