lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3404495.679z0IaaBp@wuerfel>
Date:	Mon, 01 Jun 2015 21:43:22 +0200
From:	Arnd Bergmann <arnd@...db.de>
To:	pang.xunlei@....com.cn
Cc:	Alexandre Belloni <alexandre.belloni@...e-electrons.com>,
	Alessandro Zummo <a.zummo@...ertech.it>,
	Andrew Christian <andrew.christian@...com>,
	CIH <cih@...entive.com>, John Stultz <john.stultz@...aro.org>,
	linux-kernel@...r.kernel.org, Nicolas Pitre <nico@...xnic.net>,
	Xunlei Pang <pang.xunlei@...aro.org>,
	Richard Purdie <rpurdie@...ys.net>, rtc-linux@...glegroups.com,
	Xunlei Pang <xlpang@....com>
Subject: Re: [5/5] drivers/rtc/sa1100: Replace deprecated rtc_tm_to_time() and rtc_time_to_tm()

On Saturday 30 May 2015 18:05:10 pang.xunlei@....com.cn wrote:
> PangXunLei10110855/user/zte_ltd wrote 2015-05-29 PM 10:32:15:
> > Alexandre Belloni <alexandre.belloni@...e-electrons.com> wrote 
> > 2015-04-30 AM 07:28:24:
> > > Re: [5/5] drivers/rtc/sa1100: Replace deprecated rtc_tm_to_time() 
> > > and rtc_time_to_tm()
> > > 
> > > For the same reason that Russell pointed in patch 4/5, this hides that
> > > it doesn't work after 2106-02-07 06:28:16 as the register is still 32
> > > bits.
> > > I would prefer that you return an error in that case.
> > 
> > Thanks for the review, I want to leave the ones like this untouched.
> > 
> 
> To further explain, for the rtc hardware with 32-bit counters, we actually 
> 
> had a solution before: https://lkml.org/lkml/2014/11/27/341
> 
> But seems some guys don't like the solution, so rtc drivers like this one 
> can't be simply changed to use the new-added y2038-safe interfaces.
> 
> Maybe those drivers will still retain the deprecated interfaces until a 
> better solution is proposed.

Note that Alexandre has stepped up as a new maintainer for RTC now,
so whatever he wants is probably the way it should be done.

I think the way that your first approach came out was a bit unfortunate,
because we didn't have agreement on how it should really be done.

IMHO the rtc_time64_to_hw32 and rtc_hw32_to_time64 interfaces were a
good concept, most importantly so we can easily find where the potential
problems are, but the implementation was a bit too ambitious in trying
to fix the underlying issue.

If we want to start this over again, I think a better approach would be
to introduce trivial functions at first, like

time64_t rtc_hw32_to_time64(u32 hwtime)
{
	/* 
	 * this is safe until about 2106, when unsigned u32 seconds from the
	 * 1970 epoch will overflow
	 */
	return (u64)hwtime;
}
EXPORT_SYMBOL_GPL(rtc_hw32_to_time64);

This way, we can fix all the drivers without introducing any possible
ambiguity and later decide how that function should in fact handle the
2106 overflow. Our grandchildren can take care of that if necessary ;-)

	Arnd
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ