Actions
Bug #3579
closedkclient: Use less secure random number generator so we don't consume entropy
% Done:
0%
Source:
Development
Tags:
Backport:
Regression:
Severity:
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(FS):
Labels (FS):
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
The routines __choose_mds() and ceph_mdsmap_get_random_mds() call the kernel get_random_bytes() which gets random number suitable for key generation. Pseudo random numbers are sufficient for our purposes. Also, both cases could check if there is only 1 possible choice and skip the call to get a random number.
VMs especially can have trouble getting entropy so it is best not to consume that resource.
Actions