diff options
author | Shanyu Zhao <shanyu.zhao@intel.com> | 2010-04-27 11:15:12 -0700 |
---|---|---|
committer | John W. Linville <linville@tuxdriver.com> | 2010-04-27 16:09:23 -0400 |
commit | a2c40249a36d0b4d76d1caf6bf806e4ae5b06e8a (patch) | |
tree | 5184590de0d70625572e8a7385e30fe26e4d42e4 /kernel/time/ntp.c | |
parent | a060bbfe4ee95d115e8f9705a66894ac34e2c475 (diff) |
mac80211: fix rts threshold checkmaster-2010-04-27
Currently whenever rts thresold is set, every packet will use RTS
protection no matter its size exceeds the threshold or not. This is
due to a bug in the rts threshold check.
if (len > tx->local->hw.wiphy->rts_threshold) {
txrc.rts = rts = true;
}
Basically it is comparing an int (len) and a u32 (rts_threshold),
and the variable len is assigned as:
len = min_t(int, tx->skb->len + FCS_LEN,
tx->local->hw.wiphy->frag_threshold);
However, when frag_threshold is "-1", len is always "-1", which is
0xffffffff therefore rts is always set to true.
CC: stable@kernel.org
Signed-off-by: Shanyu Zhao <shanyu.zhao@intel.com>
Reviewed-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'kernel/time/ntp.c')
0 files changed, 0 insertions, 0 deletions