lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5187B813.8000907@ahsoftware.de>
Date:	Mon, 06 May 2013 16:02:59 +0200
From:	Alexander Holler <holler@...oftware.de>
To:	linux-kernel@...r.kernel.org
CC:	rtc-linux@...glegroups.com, John Stultz <john.stultz@...aro.org>,
	Thomas Gleixner <tglx@...utronix.de>
Subject: adjusting the monotonic system time (from inside the kernel)

Hello,

I'm looking at how to adjust the (monotonic) system time from inside the 
kernel.

Use case is that I have a hw-clock which (not necessarily) regulary 
sends a timestamp with millisecond precision which I want to use to 
adjust the system time.

It seems the usual solution to do such, is to use NTP which uses it's 
own driver (which usually seems to be based on some serial connection):

hw-clock --serial--> kernel --serial-device--> ntpd -> kernel -> system-time

So one solution would be to emulate such a serial device:

hw-clock --> kernel --emulated-serial-device--> ntpd -> kernel -> 
system-time

Another solution would be to "invent" a ntp-device and write a driver 
for ntpd to use it:

hw-clock --> kernel --ntp-device--> ntpd -> kernel -> system-time

But I would prefer the following:

hw-clock --> kernel -> system-time

Problem is that the hw-clock in question doesn't offer something like a 
tick. It just might send a timestamp with millisecond precision whenever 
it wants.

Because I don't want to reinvent the wheel and because I think there are 
some people which already have spend some thoughts on similiar things, 
I'm asking here before I try to implement something which then never 
might find it's way into the mainline kernel.

Any hints, suggestions, whatever?

Regards,

Alexander Holler
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ