aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/time
diff options
context:
space:
mode:
authorJohn Stultz <john.stultz@linaro.org>2012-08-31 13:30:06 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2012-09-01 13:24:48 -0400
commitcee58483cf56e0ba355fdd97ff5e8925329aa936 (patch)
tree8cc2dc979a93a48a07c25d309250a2271e508e21 /kernel/time
parent7a611e69b26069a511d9d5251c6a28af6c521121 (diff)
time: Move ktime_t overflow checking into timespec_valid_strict
Andreas Bombe reported that the added ktime_t overflow checking added to timespec_valid in commit 4e8b14526ca7 ("time: Improve sanity checking of timekeeping inputs") was causing problems with X.org because it caused timeouts larger then KTIME_T to be invalid. Previously, these large timeouts would be clamped to KTIME_MAX and would never expire, which is valid. This patch splits the ktime_t overflow checking into a new timespec_valid_strict function, and converts the timekeeping codes internal checking to use this more strict function. Reported-and-tested-by: Andreas Bombe <aeb@debian.org> Cc: Zhouping Liu <zliu@redhat.com> Cc: Ingo Molnar <mingo@kernel.org> Cc: Prarit Bhargava <prarit@redhat.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: stable@vger.kernel.org Signed-off-by: John Stultz <john.stultz@linaro.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'kernel/time')
-rw-r--r--kernel/time/timekeeping.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/kernel/time/timekeeping.c b/kernel/time/timekeeping.c
index 0c1485e42be6..34e5eac81424 100644
--- a/kernel/time/timekeeping.c
+++ b/kernel/time/timekeeping.c
@@ -428,7 +428,7 @@ int do_settimeofday(const struct timespec *tv)
428 struct timespec ts_delta, xt; 428 struct timespec ts_delta, xt;
429 unsigned long flags; 429 unsigned long flags;
430 430
431 if (!timespec_valid(tv)) 431 if (!timespec_valid_strict(tv))
432 return -EINVAL; 432 return -EINVAL;
433 433
434 write_seqlock_irqsave(&tk->lock, flags); 434 write_seqlock_irqsave(&tk->lock, flags);
@@ -476,7 +476,7 @@ int timekeeping_inject_offset(struct timespec *ts)
476 476
477 /* Make sure the proposed value is valid */ 477 /* Make sure the proposed value is valid */
478 tmp = timespec_add(tk_xtime(tk), *ts); 478 tmp = timespec_add(tk_xtime(tk), *ts);
479 if (!timespec_valid(&tmp)) { 479 if (!timespec_valid_strict(&tmp)) {
480 ret = -EINVAL; 480 ret = -EINVAL;
481 goto error; 481 goto error;
482 } 482 }
@@ -659,7 +659,7 @@ void __init timekeeping_init(void)
659 struct timespec now, boot, tmp; 659 struct timespec now, boot, tmp;
660 660
661 read_persistent_clock(&now); 661 read_persistent_clock(&now);
662 if (!timespec_valid(&now)) { 662 if (!timespec_valid_strict(&now)) {
663 pr_warn("WARNING: Persistent clock returned invalid value!\n" 663 pr_warn("WARNING: Persistent clock returned invalid value!\n"
664 " Check your CMOS/BIOS settings.\n"); 664 " Check your CMOS/BIOS settings.\n");
665 now.tv_sec = 0; 665 now.tv_sec = 0;
@@ -667,7 +667,7 @@ void __init timekeeping_init(void)
667 } 667 }
668 668
669 read_boot_clock(&boot); 669 read_boot_clock(&boot);
670 if (!timespec_valid(&boot)) { 670 if (!timespec_valid_strict(&boot)) {
671 pr_warn("WARNING: Boot clock returned invalid value!\n" 671 pr_warn("WARNING: Boot clock returned invalid value!\n"
672 " Check your CMOS/BIOS settings.\n"); 672 " Check your CMOS/BIOS settings.\n");
673 boot.tv_sec = 0; 673 boot.tv_sec = 0;
@@ -713,7 +713,7 @@ static struct timespec timekeeping_suspend_time;
713static void __timekeeping_inject_sleeptime(struct timekeeper *tk, 713static void __timekeeping_inject_sleeptime(struct timekeeper *tk,
714 struct timespec *delta) 714 struct timespec *delta)
715{ 715{
716 if (!timespec_valid(delta)) { 716 if (!timespec_valid_strict(delta)) {
717 printk(KERN_WARNING "__timekeeping_inject_sleeptime: Invalid " 717 printk(KERN_WARNING "__timekeeping_inject_sleeptime: Invalid "
718 "sleep delta value!\n"); 718 "sleep delta value!\n");
719 return; 719 return;