Message ID | 1345595449-34965-4-git-send-email-john.stultz@linaro.org |
---|---|
State | Accepted |
Commit | 6ea565a9be32a3c8d1092017686f183b6d8c4514 |
Headers | show |
diff --git a/kernel/time/timekeeping.c b/kernel/time/timekeeping.c index 1dbf80e..a5a9389 100644 --- a/kernel/time/timekeeping.c +++ b/kernel/time/timekeeping.c @@ -1184,9 +1184,9 @@ static void update_wall_time(void) * the vsyscall implementations are converted to use xtime_nsec * (shifted nanoseconds), this can be killed. */ - remainder = tk->xtime_nsec & ((1 << tk->shift) - 1); + remainder = tk->xtime_nsec & ((1ULL << tk->shift) - 1); tk->xtime_nsec -= remainder; - tk->xtime_nsec += 1 << tk->shift; + tk->xtime_nsec += 1ULL << tk->shift; tk->ntp_error += remainder << tk->ntp_error_shift; /*
Andreas Schwab noted that the 1 << tk->shift could overflow if the shift value was greater then 30, since 1 would be a 32bit long on 32bit architectures. This patch uses 1ULL instead to ensure we don't overflow on the shift. This issue was introduced by 1e75fa8be9fb61e1af46b5b3b176347a4c958ca1 Cc: Ingo Molnar <mingo@kernel.org> Cc: Prarit Bhargava <prarit@redhat.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Andreas Schwab <schwab@linux-m68k.org> Reported-by: Andreas Schwab <schwab@linux-m68k.org> Signed-off-by: John Stultz <john.stultz@linaro.org> --- kernel/time/timekeeping.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)