On 04/17/2014 12:47 AM, Felix Fietkau wrote:
> On 2014-04-17 02:40, gree...@candelatech.com wrote:
>> From: Ben Greear <gree...@candelatech.com>
>>
>> Make sure we cannot ever assign beacon interval to zero.
>>
>> Signed-off-by: Ben Greear <gree...@candelatech.com>
>> ---
>>  drivers/net/wireless/ath/ath9k/beacon.c | 4 ++++
>>  drivers/net/wireless/ath/ath9k/recv.c   | 3 ++-
>>  2 files changed, 6 insertions(+), 1 deletion(-)
>>
>> diff --git a/drivers/net/wireless/ath/ath9k/beacon.c 
>> b/drivers/net/wireless/ath/ath9k/beacon.c
>> index 2e8bba0..5391f01 100644
>> --- a/drivers/net/wireless/ath/ath9k/beacon.c
>> +++ b/drivers/net/wireless/ath/ath9k/beacon.c
>> @@ -443,6 +443,8 @@ static u32 ath9k_mod_tsf64_tu(u64 tsf, u32 div_tu)
>>  {
>>      u32 tsf_mod, tsf_hi, tsf_lo, mod_hi, mod_lo;
>>  
>> +    if (WARN_ON_ONCE(div_tu == 0))
>> +            div_tu = 100;
>>      tsf_mod = tsf & (BIT(10) - 1);
>>      tsf_hi = tsf >> 32;
>>      tsf_lo = ((u32) tsf) >> 10;
> Why add this warning here if you already have the additions below? We
> don't need multiple layers of defensive checks for the same thing.

I am not sure I can find all cases that can send bad data to this
call, and in other places, it seems having an invalid beacon interval
might mess up other calculations, so better to check and set it to
a better value there as well.

So, I'd prefer to leave all three warnings in, and if we ever see
the one hit down in mod_tsf64_tu, then probably more protection
is needed elsewhere.

Or, just treat this patch as bug report and maybe someone will
fix it better...

Thanks,
Ben

-- 
Ben Greear <gree...@candelatech.com>
Candela Technologies Inc  http://www.candelatech.com

_______________________________________________
ath9k-devel mailing list
ath9k-devel@lists.ath9k.org
https://lists.ath9k.org/mailman/listinfo/ath9k-devel

Reply via email to