lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <87a5b0800811200647t4de76a2ah683ac6083014d061@mail.gmail.com>
Date:	Thu, 20 Nov 2008 14:47:50 +0000
From:	"Will Newton" <will.newton@...il.com>
To:	linux-kernel <linux-kernel@...r.kernel.org>
Cc:	"Tim Bird" <tim.bird@...sony.com>,
	"Andrew Morton" <akpm@...ux-foundation.org>
Subject: [PATCH] init/main.c: Use ktime accessor function in initcall_debug code.

The initcall_debug code access the tv64 member of ktime. This won't work
correctly for large deltas on platforms that don't use the scalar ktime
implementation.

Signed-off-by: Will Newton <will.newton@...il.com>
---
 init/main.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/init/main.c b/init/main.c
index 7e117a2..0eff42a 100644
--- a/init/main.c
+++ b/init/main.c
@@ -718,7 +718,7 @@ int do_one_initcall(initcall_t fn)
 	if (initcall_debug) {
 		it.rettime = ktime_get();
 		delta = ktime_sub(it.rettime, it.calltime);
-		it.duration = (unsigned long long) delta.tv64 >> 10;
+		it.duration = (unsigned long long) ktime_to_ns(delta) >> 10;
 		printk("initcall %pF returned %d after %Ld usecs\n", fn,
 			it.result, it.duration);
 		trace_boot(&it, fn);
-- 
1.5.5.2

View attachment "0001-init-main.c-Use-ktime-accessor-function-in-initcall.patch" of type "text/x-patch" (1014 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ