On 04/17/2014 12:47 AM, Felix Fietkau wrote: > On 2014-04-17 02:40, greearb@xxxxxxxxxxxxxxx wrote: >> From: Ben Greear <greearb@xxxxxxxxxxxxxxx> >> >> Make sure we cannot ever assign beacon interval to zero. >> >> Signed-off-by: Ben Greear <greearb@xxxxxxxxxxxxxxx> >> --- >> drivers/net/wireless/ath/ath9k/beacon.c | 4 ++++ >> drivers/net/wireless/ath/ath9k/recv.c | 3 ++- >> 2 files changed, 6 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/net/wireless/ath/ath9k/beacon.c b/drivers/net/wireless/ath/ath9k/beacon.c >> index 2e8bba0..5391f01 100644 >> --- a/drivers/net/wireless/ath/ath9k/beacon.c >> +++ b/drivers/net/wireless/ath/ath9k/beacon.c >> @@ -443,6 +443,8 @@ static u32 ath9k_mod_tsf64_tu(u64 tsf, u32 div_tu) >> { >> u32 tsf_mod, tsf_hi, tsf_lo, mod_hi, mod_lo; >> >> + if (WARN_ON_ONCE(div_tu == 0)) >> + div_tu = 100; >> tsf_mod = tsf & (BIT(10) - 1); >> tsf_hi = tsf >> 32; >> tsf_lo = ((u32) tsf) >> 10; > Why add this warning here if you already have the additions below? We > don't need multiple layers of defensive checks for the same thing. I am not sure I can find all cases that can send bad data to this call, and in other places, it seems having an invalid beacon interval might mess up other calculations, so better to check and set it to a better value there as well. So, I'd prefer to leave all three warnings in, and if we ever see the one hit down in mod_tsf64_tu, then probably more protection is needed elsewhere. Or, just treat this patch as bug report and maybe someone will fix it better... Thanks, Ben -- Ben Greear <greearb@xxxxxxxxxxxxxxx> Candela Technologies Inc http://www.candelatech.com -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html