diff options
author | Eric Dumazet <dada1@cosmosbay.com> | 2007-11-21 20:32:55 +0800 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2007-12-14 09:50:50 -0800 |
commit | 671369b670d81bbf26766e0fd723821616f76b1a (patch) | |
tree | d0e94584a3d6f1f13f71c4af979e0396a099d9ad /drivers/char/sysrq.c | |
parent | 857c440ad2a392ec43d35727b5ac5144d0dc6dfa (diff) |
NET: random : secure_tcp_sequence_number should not assume CONFIG_KTIME_SCALAR
[NET] random : secure_tcp_sequence_number should not assume CONFIG_KTIME_SCALAR
[ Upstream commit: 6dd10a62353a50b30b30e0c18653650975b29c71 ]
All 32 bits machines but i386 dont have CONFIG_KTIME_SCALAR. On these
machines, ktime.tv64 is more than 4 times the (correct) result given
by ktime_to_ns()
Again on these machines, using ktime_get_real().tv64 >> 6 give a
32bits rollover every 64 seconds, which is not wanted (less than the
120 s MSL)
Using ktime_to_ns() is the portable way to get nsecs from a ktime, and
have correct code.
Signed-off-by: Eric Dumazet <dada1@cosmosbay.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'drivers/char/sysrq.c')
0 files changed, 0 insertions, 0 deletions