diff options
author | Michael Scherer <misc@redhat.com> | 2017-02-19 11:06:56 +0100 |
---|---|---|
committer | Shyamsundar Ranganathan <srangana@redhat.com> | 2017-02-24 09:52:45 -0500 |
commit | ff2ba49d02dc99b0c3de5712348ae9d588be7ad7 (patch) | |
tree | 6f38131e3b941ab99d3d8f4417728b65715d888e /xlators/features/locks | |
parent | f08f5bfef923259fe6de6d41a0a2b1b9140fc547 (diff) |
Filter coverty false positives
Since random is not used for anything cryptographically related,
it is fine to use it in those instances.
Change-Id: I720172285f60d6bc477c7169c7286fc018ebdf8f
BUG: 1424764
Signed-off-by: Michael Scherer <misc@redhat.com>
Reviewed-on: https://review.gluster.org/16668
Smoke: Gluster Build System <jenkins@build.gluster.org>
Tested-by: Nigel Babu <nigelb@redhat.com>
NetBSD-regression: NetBSD Build System <jenkins@build.gluster.org>
CentOS-regression: Gluster Build System <jenkins@build.gluster.org>
Reviewed-by: Shyamsundar Ranganathan <srangana@redhat.com>
Diffstat (limited to 'xlators/features/locks')
-rw-r--r-- | xlators/features/locks/src/common.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/xlators/features/locks/src/common.c b/xlators/features/locks/src/common.c index 8cdff0d61ef..68f253d92ad 100644 --- a/xlators/features/locks/src/common.c +++ b/xlators/features/locks/src/common.c @@ -1129,6 +1129,7 @@ pl_does_monkey_want_stuck_lock() long int monkey_unlock_rand = 0; long int monkey_unlock_rand_rem = 0; + /* coverty[DC.WEAK_CRYPTO] */ monkey_unlock_rand = random (); monkey_unlock_rand_rem = monkey_unlock_rand % 100; if (monkey_unlock_rand_rem == 0) |