lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPDyKFpsPk5uhva2F+=b0r7FeO-8n9+tMAA9iaxGmZZgrtoZUw@mail.gmail.com>
Date:   Tue, 8 Nov 2022 11:18:27 +0100
From:   Ulf Hansson <ulf.hansson@...aro.org>
To:     Bjorn Andersson <andersson@...nel.org>
Cc:     kernel test robot <lkp@...el.com>, Andy Gross <agross@...nel.org>,
        Konrad Dybcio <konrad.dybcio@...ainline.org>,
        kbuild-all@...ts.01.org,
        Dmitry Baryshkov <dmitry.baryshkov@...aro.org>,
        Maulik Shah <quic_mkshah@...cinc.com>,
        Rajendra Nayak <quic_rjendra@...cinc.com>,
        Sudeep Holla <sudeep.holla@....com>,
        Amit Pundir <amit.pundir@...aro.org>,
        linux-arm-msm@...r.kernel.org,
        linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v3 6/6] soc: qcom: rpmh-rsc: Write CONTROL_TCS with next
 timer wakeup

On Mon, 7 Nov 2022 at 18:01, Bjorn Andersson <andersson@...nel.org> wrote:
>
> On Wed, Oct 19, 2022 at 01:47:17AM +0800, kernel test robot wrote:
> [..]
> >    155        #define USECS_TO_CYCLES(time_usecs)                     \
> >    156                xloops_to_cycles((time_usecs) * 0x10C7UL)
> >    157
> >    158        static inline unsigned long xloops_to_cycles(unsigned long xloops)
>
> Any objections to me changing the type to u64 while applying the
> patches?

No objections. Thanks for making the improvement!

>
> Regards,
> Bjorn
>
> >    159        {
> >  > 160                return (xloops * loops_per_jiffy * HZ) >> 32;
> >    161        }
> >    162

Kind regards
Uffe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ