From nobody Sun Feb 8 21:27:10 2026 Received: from mail-wr1-f48.google.com (mail-wr1-f48.google.com [209.85.221.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 38F2834CFC7 for ; Fri, 6 Feb 2026 07:55:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.48 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770364532; cv=none; b=rzrwsJ12fMXVBhvyLwF9/q6K4pf60GHGik8SkMW37OFjXBw36S7dzWFgkLvgwqMQtT6b3+pzdiLxhHjzSTvBJ7jSrU07MCu5IuKNPVqLZWKgdumh/u4yXdWAG5AhrfO4VY9Hp8O99zvSGO8CyldK240zEyNHoQ0w4bmYYiRL3ao= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770364532; c=relaxed/simple; bh=vb3ERhsVlDOO376ZUouJnU1OTA3aY+jXb70EUe9A2LU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ogX8yavkpD72IWlS8Ha2RN8w6vBw8LoJ7gXQCwBSH5t/yUgURHTUOvQkxsBCYOq3CsIqrD2bGaZoNliKRxTuxKlnDezhiKJ9wAn8l2lA0hMzjGCUKIDYfNCxWX6fXcDAb+Ul5J7HrNc7tRyxr0alotMHssZC9IYpR4JkgRw87kk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=JAQv1BgU; arc=none smtp.client-ip=209.85.221.48 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="JAQv1BgU" Received: by mail-wr1-f48.google.com with SMTP id ffacd0b85a97d-4362ab556f5so290964f8f.3 for ; Thu, 05 Feb 2026 23:55:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770364531; x=1770969331; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=q4ww1gg8mGycvEbb75ixZXs7LoNirH3xDQvVbOydIxg=; b=JAQv1BgUhXb+ATDJ3KF/4ghDUL9gYiE3rnnr8njGOYvzetB2njlTYUe6fOR8y+xNlJ ns+UCklN8yXXoOwQ5lxQ5GGLCig3GrvIqjZ+Mv25PAq1DYriFwj0+ew1S3hBKmNbI1iV Fs6h8+8qAzRUFDK6EKLQ//XZi4MpWJ6KmjEYTtl7wgUxhIG0PBo8sj0Hw0IhJB3FPEoc ARfKM5oq8xkMWEsZ7WJzi0IzbM/FitLZWa2RMCVQQMW9G8nkpIGyb6T5ZKWTLEVmlqxL g6XZUXVfEG60TPy6+H1PFojec7UwCE+cD9csvqKnIn657rZNUEWIGVPYld1YSVV9FPqm YAYg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770364531; x=1770969331; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=q4ww1gg8mGycvEbb75ixZXs7LoNirH3xDQvVbOydIxg=; b=HRxA8XK6wUArprmi52p9rhldGAKS9Ks1r5VCJ3aMAXIbXzH+1HUNQRkM1nn0HccwOU 3QNXe0S4KlwjY922LdLxD+rsQfMTypYZoosM7YE2WmzxIvc2YzH2WjrZr8OdLbExW4jk mWueN3SIM1fXN+2LFcDIJStU9YrI1KluKpqbRQkGrsbtJZr0T+/71iblgGAwg3bzVlrF eyHEC8FckLvo+9EclBAv9Iufo3Jmlg6hhktbhBG1nzhTgQYlO7ZSoTcsvUfuRB4NyjCO FKIxsnE5sILePkUOcjyoa3TZmDFlVcGHq/4v23rZ49Pby1a7YHHR8wmd4GclzonRQUWS U7Kg== X-Forwarded-Encrypted: i=1; AJvYcCULWkdcjV/7bBQSY9rN89WrAvC+jDmtb5X/M7Fqgwm0jVlVSFlHa5NZmpLY74cWpEgnhBJX6zA5ynvWgCg=@vger.kernel.org X-Gm-Message-State: AOJu0YyZVtKQ5+UNIApXska12TkoXTQ97qBYsJITwy4TFxaTXwErh96e G0hcMcv2Q+strAaZeHowU6iPM66edaexSjrZyu3SehPz1zncAc+i3Cg= X-Gm-Gg: AZuq6aJBz68agejjmiw6Urkj9+8jZ5DGCzrdrLsfvg4o9bm3nNaIeyYuCdR9hrgWDd+ dOpjkbcVlE80rAa6g63+uuOvL9xSQq3k82m4+XRKIm1czO2cvMn9yJ47TPGsLWjb4t78BAX4yZO shdysQUg5yUumBrih2NqGSvzKY9AYbG2TOpb4l0whiBPgVyUZ9cc168KKaJC3zvH9L00vfEHwdM wzaWppEpO7VA3MWfu0WF2+lNTfJJ8Zg4PBS6sUJWStuFp+x9LK1SMb95hjCsuLpxvsE4PqMfU6g QO8oSpdb4VzQ2C3rBp7U2IiZZpcCLrIP9iIMdxGZ7O6uMqVfWJ89oWjftV+nVnNRE3PciEOTxp5 zg0rYAVuj/14TUyDieQLuTVpcvW17ARDTHgd44ABb0OzxEytgavdHhiIIHeC3y4dPHfE6n5gKQl SZ6JCgxJ7toQ61lpbRdcEuUg8sNKTHNqyrH+3Nk5vu6P6Ns/hEwVeVOpjh+YMImPNI4xAiZmBt3 Q== X-Received: by 2002:a5d:588d:0:b0:431:c60:c5ed with SMTP id ffacd0b85a97d-43629651e52mr2429465f8f.13.1770364530501; Thu, 05 Feb 2026 23:55:30 -0800 (PST) Received: from LGPC ([31.223.131.124]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-436296bd3b8sm3836039f8f.11.2026.02.05.23.55.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Feb 2026 23:55:29 -0800 (PST) From: lukagejak5@gmail.com X-Google-Original-From: luka.gejak@linux.dev To: Greg Kroah-Hartman Cc: Dan Carpenter , linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org, Luka Gejak Subject: [PATCH v2 24/26] staging: rtl8723bs: core: fix line lengths in rtw_mlme.c Date: Fri, 6 Feb 2026 08:54:37 +0100 Message-ID: <20260206075439.103287-25-luka.gejak@linux.dev> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260206075439.103287-1-luka.gejak@linux.dev> References: <20260206075439.103287-1-luka.gejak@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Luka Gejak Break long lines exceeding 100 characters to comply with kernel coding style. Signed-off-by: Luka Gejak --- drivers/staging/rtl8723bs/core/rtw_mlme.c | 101 ++++++++++++++-------- 1 file changed, 66 insertions(+), 35 deletions(-) diff --git a/drivers/staging/rtl8723bs/core/rtw_mlme.c b/drivers/staging/rt= l8723bs/core/rtw_mlme.c index d46f5025a0a5..503b3c239163 100644 --- a/drivers/staging/rtl8723bs/core/rtw_mlme.c +++ b/drivers/staging/rtl8723bs/core/rtw_mlme.c @@ -52,7 +52,8 @@ int rtw_init_mlme_priv(struct adapter *padapter) pmlmepriv->pscanned =3D NULL; pmlmepriv->fw_state =3D WIFI_STATION_STATE; /* Must sync with rtw_wdev_a= lloc() */ pmlmepriv->cur_network.network.infrastructure_mode =3D Ndis802_11AutoUnkn= own; - pmlmepriv->scan_mode =3D SCAN_ACTIVE;/* 1: active, 0: passive. Maybe som= eday we should rename this varable to "active_mode" (Jeff) */ + /* 1: active, 0: passive. Maybe someday rename to "active_mode" */ + pmlmepriv->scan_mode =3D SCAN_ACTIVE; =20 spin_lock_init(&pmlmepriv->lock); INIT_LIST_HEAD(&pmlmepriv->free_bss_pool.queue); @@ -376,7 +377,8 @@ int is_same_network(struct wlan_bssid_ex *src, struct w= lan_bssid_ex *dst, u8 fea (d_cap & WLAN_CAPABILITY_ESS)); } =20 -struct wlan_network *_rtw_find_same_network(struct __queue *scanned_queue,= struct wlan_network *network) +struct wlan_network *_rtw_find_same_network(struct __queue *scanned_queue, + struct wlan_network *network) { struct list_head *phead, *plist; struct wlan_network *found =3D NULL; @@ -427,7 +429,8 @@ void update_network(struct wlan_bssid_ex *dst, struct w= lan_bssid_ex *src, long rssi_final; =20 /* The rule below is 1/5 for sample value, 4/5 for history value */ - if (check_fwstate(&padapter->mlmepriv, _FW_LINKED) && is_same_network(&pa= dapter->mlmepriv.cur_network.network, src, 0)) { + if (check_fwstate(&padapter->mlmepriv, _FW_LINKED) && + is_same_network(&padapter->mlmepriv.cur_network.network, src, 0)) { /* Take the recvpriv's value for the connected AP*/ ss_final =3D padapter->recvpriv.signal_strength; sq_final =3D padapter->recvpriv.signal_qual; @@ -469,10 +472,13 @@ static void update_current_network(struct adapter *ad= apter, struct wlan_bssid_ex &pmlmepriv->cur_network.network, &pmlmepriv->cur_network.network); =20 - if (check_fwstate(pmlmepriv, _FW_LINKED) && (is_same_network(&pmlmepriv->= cur_network.network, pnetwork, 0))) { + if (check_fwstate(pmlmepriv, _FW_LINKED) && + is_same_network(&pmlmepriv->cur_network.network, pnetwork, 0)) { update_network(&pmlmepriv->cur_network.network, pnetwork, adapter, true); - rtw_update_protection(adapter, (pmlmepriv->cur_network.network.ies) + si= zeof(struct ndis_802_11_fix_ie), - pmlmepriv->cur_network.network.ie_length); + rtw_update_protection(adapter, + pmlmepriv->cur_network.network.ies + + sizeof(struct ndis_802_11_fix_ie), + pmlmepriv->cur_network.network.ie_length); } } =20 @@ -609,7 +615,10 @@ int rtw_is_desired_network(struct adapter *adapter, st= ruct wlan_network *pnetwor privacy =3D pnetwork->network.privacy; =20 if (check_fwstate(pmlmepriv, WIFI_UNDER_WPS)) { - if (rtw_get_wps_ie(pnetwork->network.ies + _FIXED_IE_LENGTH_, pnetwork->= network.ie_length - _FIXED_IE_LENGTH_, NULL, &wps_ielen)) + u8 *ies =3D pnetwork->network.ies + _FIXED_IE_LENGTH_; + uint ie_len =3D pnetwork->network.ie_length - _FIXED_IE_LENGTH_; + + if (rtw_get_wps_ie(ies, ie_len, NULL, &wps_ielen)) return true; else return false; @@ -617,12 +626,14 @@ int rtw_is_desired_network(struct adapter *adapter, s= truct wlan_network *pnetwor if (adapter->registrypriv.wifi_spec =3D=3D 1) { /* for correct flow of 8= 021X to do.... */ u8 *p =3D NULL; uint ie_len =3D 0; + u8 *ies =3D pnetwork->network.ies + _BEACON_IE_OFFSET_; + uint ies_len =3D pnetwork->network.ie_length - _BEACON_IE_OFFSET_; =20 if ((desired_encmode =3D=3D Ndis802_11EncryptionDisabled) && (privacy != =3D 0)) bselected =3D false; =20 if (psecuritypriv->ndisauthtype =3D=3D Ndis802_11AuthModeWPA2PSK) { - p =3D rtw_get_ie(pnetwork->network.ies + _BEACON_IE_OFFSET_, WLAN_EID_R= SN, &ie_len, (pnetwork->network.ie_length - _BEACON_IE_OFFSET_)); + p =3D rtw_get_ie(ies, WLAN_EID_RSN, &ie_len, ies_len); if (p && ie_len > 0) bselected =3D true; else @@ -968,7 +979,8 @@ void rtw_scan_abort(struct adapter *adapter) pmlmeext->scan_abort =3D false; } =20 -static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapte= r, struct wlan_network *pnetwork) +static struct sta_info *rtw_joinbss_update_stainfo(struct adapter *padapte= r, + struct wlan_network *pnetwork) { int i; struct sta_info *bmc_sta, *psta =3D NULL; @@ -1052,7 +1064,9 @@ static struct sta_info *rtw_joinbss_update_stainfo(st= ruct adapter *padapter, str =20 /* pnetwork : returns from rtw_joinbss_event_callback */ /* ptarget_wlan: found from scanned_queue */ -static void rtw_joinbss_update_network(struct adapter *padapter, struct wl= an_network *ptarget_wlan, struct wlan_network *pnetwork) +static void rtw_joinbss_update_network(struct adapter *padapter, + struct wlan_network *ptarget_wlan, + struct wlan_network *pnetwork) { struct mlme_priv *pmlmepriv =3D &padapter->mlmepriv; struct wlan_network *cur_network =3D &pmlmepriv->cur_network; @@ -1070,7 +1084,8 @@ static void rtw_joinbss_update_network(struct adapter= *padapter, struct wlan_net padapter->recvpriv.signal_strength =3D ptarget_wlan->network.phy_info.sig= nal_strength; padapter->recvpriv.signal_qual =3D ptarget_wlan->network.phy_info.signal_= quality; /* the ptarget_wlan->network.rssi is raw data, we use ptarget_wlan->netwo= rk.phy_info.signal_strength instead (has scaled) */ - padapter->recvpriv.rssi =3D translate_percentage_to_dbm(ptarget_wlan->net= work.phy_info.signal_strength); + padapter->recvpriv.rssi =3D + translate_percentage_to_dbm(ptarget_wlan->network.phy_info.signal_streng= th); =20 rtw_set_signal_stat_timer(&padapter->recvpriv); =20 @@ -1095,7 +1110,9 @@ static void rtw_joinbss_update_network(struct adapter= *padapter, struct wlan_net rtw_update_protection(padapter, (cur_network->network.ies) + sizeof(struc= t ndis_802_11_fix_ie), (cur_network->network.ie_length)); =20 - rtw_update_ht_cap(padapter, cur_network->network.ies, cur_network->networ= k.ie_length, (u8) cur_network->network.configuration.ds_config); + rtw_update_ht_cap(padapter, cur_network->network.ies, + cur_network->network.ie_length, + (u8)cur_network->network.configuration.ds_config); } =20 static struct rt_pmkid_list backupPMKIDList[NUM_PMKID_CACHE]; @@ -1117,7 +1134,8 @@ void rtw_reset_securitypriv(struct adapter *adapter) /* Backup the btkip_countermeasure information. */ /* When the countermeasure is trigger, the driver have to disconnect wi= th AP for 60 seconds. */ =20 - memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], sizeof(= struct rt_pmkid_list) * NUM_PMKID_CACHE); + memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], + sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); backupPMKIDIndex =3D adapter->securitypriv.PMKIDIndex; backupTKIPCountermeasure =3D adapter->securitypriv.btkip_countermeasure; backupTKIPcountermeasure_time =3D adapter->securitypriv.btkip_countermea= sure_time; @@ -1129,7 +1147,8 @@ void rtw_reset_securitypriv(struct adapter *adapter) =20 /* Added by Albert 2009/02/18 */ /* Restore the PMK information to securitypriv structure for the follow= ing connection. */ - memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], sizeof(= struct rt_pmkid_list) * NUM_PMKID_CACHE); + memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], + sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); adapter->securitypriv.PMKIDIndex =3D backupPMKIDIndex; adapter->securitypriv.btkip_countermeasure =3D backupTKIPCountermeasure; adapter->securitypriv.btkip_countermeasure_time =3D backupTKIPcountermea= sure_time; @@ -1177,7 +1196,8 @@ void rtw_joinbss_event_prehandle(struct adapter *adap= ter, u8 *pbuf) struct wlan_network *pcur_wlan =3D NULL, *ptarget_wlan =3D NULL; unsigned int the_same_macaddr =3D false; =20 - the_same_macaddr =3D !memcmp(pnetwork->network.mac_address, cur_network->= network.mac_address, ETH_ALEN); + the_same_macaddr =3D !memcmp(pnetwork->network.mac_address, + cur_network->network.mac_address, ETH_ALEN); =20 pnetwork->network.length =3D get_wlan_bssid_ex_sz(&pnetwork->network); if (pnetwork->network.length > sizeof(struct wlan_bssid_ex)) @@ -1361,9 +1381,9 @@ void rtw_stassoc_event_callback(struct adapter *adapt= er, u8 *pbuf) /* for AD-HOC mode */ psta =3D rtw_get_stainfo(&adapter->stapriv, pstassoc->macaddr); if (psta) { - /* the sta have been in sta_info_queue =3D> do nothing */ - - return; /* between drv has received this event before and fw have not y= et to set key to CAM_ENTRY) */ + /* sta already in sta_info_queue, do nothing */ + /* drv received this event but fw hasn't set key to CAM_ENTRY yet */ + return; } =20 psta =3D rtw_alloc_stainfo(&adapter->stapriv, pstassoc->macaddr); @@ -1447,7 +1467,8 @@ void rtw_stadel_event_callback(struct adapter *adapte= r, u8 *pbuf) =20 if (adapter->registrypriv.wifi_spec =3D=3D 1) { roam =3D false; - } else if (reason =3D=3D WLAN_REASON_EXPIRATION_CHK && rtw_chk_roam_flag= s(adapter, RTW_ROAM_ON_EXPIRED)) { + } else if (reason =3D=3D WLAN_REASON_EXPIRATION_CHK && + rtw_chk_roam_flags(adapter, RTW_ROAM_ON_EXPIRED)) { roam =3D true; } else if (reason =3D=3D WLAN_REASON_ACTIVE_ROAM && rtw_chk_roam_flags(a= dapter, RTW_ROAM_ACTIVE)) { roam =3D true; @@ -1916,7 +1937,8 @@ signed int rtw_set_auth(struct adapter *adapter, stru= ct security_priv *psecurity return res; } =20 -signed int rtw_set_key(struct adapter *adapter, struct security_priv *psec= uritypriv, signed int keyid, u8 set_tx, bool enqueue) +signed int rtw_set_key(struct adapter *adapter, struct security_priv *psec= uritypriv, + signed int keyid, u8 set_tx, bool enqueue) { u8 keylen; struct cmd_obj *pcmd; @@ -1991,7 +2013,8 @@ signed int rtw_set_key(struct adapter *adapter, struc= t security_priv *psecurityp } =20 /* adjust ies for rtw_joinbss_cmd in WMM */ -int rtw_restruct_wmm_ie(struct adapter *adapter, u8 *in_ie, u8 *out_ie, ui= nt in_len, uint initial_out_len) +int rtw_restruct_wmm_ie(struct adapter *adapter, u8 *in_ie, u8 *out_ie, + uint in_len, uint initial_out_len) { unsigned int ielength =3D 0; unsigned int i, j; @@ -2302,7 +2325,9 @@ void rtw_build_wmm_ie_ht(struct adapter *padapter, u8= *out_ie, uint *pout_len) } =20 /* the function is >=3D passive_level */ -unsigned int rtw_restructure_ht_ie(struct adapter *padapter, u8 *in_ie, u8= *out_ie, uint in_len, uint *pout_len, u8 channel) +unsigned int rtw_restructure_ht_ie(struct adapter *padapter, u8 *in_ie, + u8 *out_ie, uint in_len, + uint *pout_len, u8 channel) { u32 ielen, out_len; enum ieee80211_max_ampdu_length_exp max_rx_ampdu_factor; @@ -2448,20 +2473,26 @@ void rtw_update_ht_cap(struct adapter *padapter, u8= *pie, uint ie_len, u8 channe phtpriv->ampdu_enable =3D true; =20 /* check Max Rx A-MPDU Size */ - len =3D 0; - p =3D rtw_get_ie(pie + sizeof(struct ndis_802_11_fix_ie), WLAN_EID_HT_CAP= ABILITY, &len, ie_len - sizeof(struct ndis_802_11_fix_ie)); - if (p && len > 0) { - pht_capie =3D (struct ieee80211_ht_cap *)(p + 2); - max_ampdu_sz =3D (pht_capie->ampdu_params_info & IEEE80211_HT_CAP_AMPDU_= FACTOR); - max_ampdu_sz =3D 1 << (max_ampdu_sz + 3); /* max_ampdu_sz (kbytes); */ - - phtpriv->rx_ampdu_maxlen =3D max_ampdu_sz; - } + { + u8 *ies =3D pie + sizeof(struct ndis_802_11_fix_ie); + uint ies_len =3D ie_len - sizeof(struct ndis_802_11_fix_ie); + + len =3D 0; + p =3D rtw_get_ie(ies, WLAN_EID_HT_CAPABILITY, &len, ies_len); + if (p && len > 0) { + pht_capie =3D (struct ieee80211_ht_cap *)(p + 2); + max_ampdu_sz =3D pht_capie->ampdu_params_info & + IEEE80211_HT_CAP_AMPDU_FACTOR; + max_ampdu_sz =3D 1 << (max_ampdu_sz + 3); + + phtpriv->rx_ampdu_maxlen =3D max_ampdu_sz; + } =20 - len =3D 0; - p =3D rtw_get_ie(pie + sizeof(struct ndis_802_11_fix_ie), WLAN_EID_HT_OPE= RATION, &len, ie_len - sizeof(struct ndis_802_11_fix_ie)); - if (p && len > 0) { - /* todo: */ + len =3D 0; + p =3D rtw_get_ie(ies, WLAN_EID_HT_OPERATION, &len, ies_len); + if (p && len > 0) { + /* todo: */ + } } =20 if ((pregistrypriv->bw_mode & 0x0f) > 0) --=20 2.52.0