diff options
author | Jens Axboe <jens.axboe@oracle.com> | 2007-07-26 11:55:10 +0200 |
---|---|---|
committer | Jens Axboe <jens.axboe@oracle.com> | 2007-07-26 11:55:10 +0200 |
commit | 4c5946c6606abc87ba7e2bfc57a5030d19b6d4d5 (patch) | |
tree | 7964b20b7aaaa6bf6aaf210c2f3fbd98e894702b /engines | |
parent | 47f0cc48db34b37d81540b31bf6adf11bb7b578d (diff) | |
download | fio-4c5946c6606abc87ba7e2bfc57a5030d19b6d4d5.tar.gz |
Fix verify random bytes filling
Shawn Lewis <shawnlewis@google.com> reports:
---
verify.c: fill_random_bytes() doesn't work as intended.
drand48 on linux returns a double whose value is evenly distributed between
0.0 and 0.1. This is not the same as having an 8-byte value where each bit
has the same chance of being 0 as it does of being 1.
I'd fix this but it should probably be done in a cross-platformish way and
I'm not quite sure how to do it. Maybe just use smaller randoms? Have an
os_random_uint32?
---
I just got rid of os_random_double() and used os_random_long(),
truncating that to an unsigned integer.
Signed-off-by: Jens Axboe <jens.axboe@oracle.com>
Diffstat (limited to 'engines')
0 files changed, 0 insertions, 0 deletions