From nobody Mon Feb 9 03:10:46 2026 Received: from mail-wr1-f43.google.com (mail-wr1-f43.google.com [209.85.221.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id F2D0734D4EE for ; Fri, 6 Feb 2026 07:55:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.43 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770364535; cv=none; b=JHuO7cU0PQs7nu9dLmhynQE/J30XEg+Rp2/QD+9o62/O3koAO+M01yfchckl0JvyM2GpfA5YLCdWcI9Guq+bDkcNlhHkyCN798xnZfWYarHJ3LDPaP8hglZb+yZZnTSF36CRtVqDC7oIwi2g5Lu1gOTCoUraJOXnrRHuGO/RYek= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770364535; c=relaxed/simple; bh=1+/QSiPDLFD5kh0w7bUmGr1a70aiPgxlePucbelzdLg=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=tvlAmSHBxlT/7rY0vR1squIxpbejDzf2gYPANVazYOOdCm+rwYU11YgvoOIJfIYwEGkHMFKy9ZUGaE17H9oEwAoHRHyBR2dufVZn67cYF3l9fymbUXP7gDoaPGOswAswFh500o/chYZcBW3RUGqWVezbCph2iVvbicQ46Ek9Vv4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=WOzJgItV; arc=none smtp.client-ip=209.85.221.43 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="WOzJgItV" Received: by mail-wr1-f43.google.com with SMTP id ffacd0b85a97d-43626796202so1061316f8f.3 for ; Thu, 05 Feb 2026 23:55:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770364533; x=1770969333; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=TKRCjnMX4iU4PsaBniZlhPqQtHYlVNjsHQLtx43ivsc=; b=WOzJgItV0hMFnN6Wn6d/yzOJlNgvqI4je6cSrXJpOq6j520Q1pIZ333/RTHkPqAc48 /q5pHxAHULvsFNXBpm2E24GSlaETa7ZACapVzP5OfB2IgaZet/opvw2Zzka/77D780Z+ E+eqbaAxHgDTYi2qFn/aAnELNT/dZuiL4dZj6xewXrYB8OC1vEVKzIqaRNQd18D5T7ci oxYHryUOeQefwDkzj79X6hpREc4q74cEWjIYp8j55gbsCXg156xAGyQ26+bukRRvMTqi HR+7bU/Sge7xBoAcfMA5t0HZn5yf/6EV3okMDBXZ4EkH9oKyCT8QnwXjVR7ptqDRDtKh 9k9A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770364533; x=1770969333; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=TKRCjnMX4iU4PsaBniZlhPqQtHYlVNjsHQLtx43ivsc=; b=gmT097CfSxFka1EmHBsWkMxYgDoE39rKgi7XmWMMF+pOOiGP0aBKgYfniPQvuaKqSg EPyHaYpclCjrMcxA/CKDi9lbG5AzfqjdduzO5QLcWeANEp+ZhPi6J3ptmCeLFAswzzHU 5WCbh0CtpVORbD0GvqN4umLdAEaD9ZAeGcikP3TOonZChSpL4xoQaWToZy0T2Xdh99Om c+Kp4qv89Khr+NbV0bu6oc+TNjwH52MQgtfw1Yg2OCTEJBD5JdD6iLd127QQkP5rxqG+ WE/B1t6DDyFo7x92OpYd/zYM/BMkGiuk2ts8kXO6kHED6cFDFkdUDjmZvs2Brj07vK0g GJAw== X-Forwarded-Encrypted: i=1; AJvYcCW5I0GOWy3sYSnJyJwhDWbOaEkAQGn7LIOwUxIJK2Drw8BM1Tpk37rmpzkKX8oOIKJtOpSmdG9bn46qtm0=@vger.kernel.org X-Gm-Message-State: AOJu0Ywp5MKY2Tb6N/tiCDHYX6X5c/EC0a7E95RTfLlmIlnuMZ/+NvJL y94BMd+/Hjg2sz4k7qBaa+gUAGpgfrsO9tfzl2wHzO7iH4s3VmGjERw= X-Gm-Gg: AZuq6aJfnqMeY8sS/qLOb68ldhDtPfsYqIYUp+NAgnqt/WPpG41KMm5xDWtZc9wwWYB Nc4roOmpMxdU/b7TYLJlJ2mwJHUuScCaLqil6mAc00dh0LVNeXEvHpW/vV6zRCVr72tzOQWWrq0 JRnd4r+P/7JiG6pgL77dGQoqOBD3YcfzYTH+FYBXNi4/Jhva5CfyN05raiLTvaAL7Xjtg/oi7sN +VCTeSv0vFF8Uc2mOdG0GpjYBacWlQohy8dDLZsi+glUYAnLbCmAD+ELe1/xPGgG76Wh126L/iT +pXiKXBoJMNl1XLsqs5UD/8LAxfHY8C6lStjYaoopUGDZJk8BCDH15dR8GfbpeoGgpCWlbA9ccH kH6apmNC/ehX6iS1Hxza5XcLrAIPr5fRPkS9MSKiWZrXUqOk1gfrSEetrFrxT7Ql79+PfZffkWE qhV0Ko11M3dU3nbr5pCK0iMevMVypfJbO9itwcVfl/W7BMySNH2CR6bMSCwPQXXRc= X-Received: by 2002:a05:6000:4284:b0:436:19eb:286e with SMTP id ffacd0b85a97d-43629006f3bmr2655685f8f.0.1770364533125; Thu, 05 Feb 2026 23:55:33 -0800 (PST) Received: from LGPC ([31.223.131.124]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-436296bd3b8sm3836039f8f.11.2026.02.05.23.55.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Feb 2026 23:55:32 -0800 (PST) From: lukagejak5@gmail.com X-Google-Original-From: luka.gejak@linux.dev To: Greg Kroah-Hartman Cc: Dan Carpenter , linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org, Luka Gejak Subject: [PATCH v2 26/26] staging: rtl8723bs: core: fix various line length overflows Date: Fri, 6 Feb 2026 08:54:39 +0100 Message-ID: <20260206075439.103287-27-luka.gejak@linux.dev> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260206075439.103287-1-luka.gejak@linux.dev> References: <20260206075439.103287-1-luka.gejak@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Luka Gejak Fix lines exceeding 100 characters in rtw_ieee80211.c and rtw_security.c to comply with kernel coding style. Signed-off-by: Luka Gejak --- .../staging/rtl8723bs/core/rtw_ieee80211.c | 36 ++++++++++++++----- drivers/staging/rtl8723bs/core/rtw_security.c | 11 ++++-- 2 files changed, 35 insertions(+), 12 deletions(-) diff --git a/drivers/staging/rtl8723bs/core/rtw_ieee80211.c b/drivers/stagi= ng/rtl8723bs/core/rtw_ieee80211.c index 92b12a13d27c..8584bfceab96 100644 --- a/drivers/staging/rtl8723bs/core/rtw_ieee80211.c +++ b/drivers/staging/rtl8723bs/core/rtw_ieee80211.c @@ -333,11 +333,17 @@ int rtw_generate_ie(struct registry_priv *pregistrypr= iv) ie =3D rtw_set_ie(ie, WLAN_EID_DS_PARAMS, 1, (u8 *)&(pdev_network->config= uration.ds_config), &sz); =20 /* IBSS Parameter Set */ + { + u8 *atim =3D (u8 *)&pdev_network->configuration.atim_window; =20 - ie =3D rtw_set_ie(ie, WLAN_EID_IBSS_PARAMS, 2, (u8 *)&(pdev_network->conf= iguration.atim_window), &sz); + ie =3D rtw_set_ie(ie, WLAN_EID_IBSS_PARAMS, 2, atim, &sz); + } + + if (rateLen > 8) { + u8 *ext_rates =3D pdev_network->supported_rates + 8; =20 - if (rateLen > 8) - ie =3D rtw_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, (rateLen - 8), (pdev_netw= ork->supported_rates + 8), &sz); + ie =3D rtw_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, rateLen - 8, ext_rates, &= sz); + } =20 /* HT Cap. */ if ((pregistrypriv->wireless_mode & WIRELESS_11_24N) && @@ -437,7 +443,8 @@ int rtw_get_wpa2_cipher_suite(u8 *s) return 0; } =20 -int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, int *p= airwise_cipher, int *is_8021x) +int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, + int *pairwise_cipher, int *is_8021x) { int i, ret =3D _SUCCESS; int left, count; @@ -500,7 +507,8 @@ int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *g= roup_cipher, int *pairwis return ret; } =20 -int rtw_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, int *= pairwise_cipher, int *is_8021x) +int rtw_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, + int *pairwise_cipher, int *is_8021x) { int i, ret =3D _SUCCESS; int left, count; @@ -738,7 +746,8 @@ u8 *rtw_get_wps_attr(u8 *wps_ie, uint wps_ielen, u16 ta= rget_attr_id, u8 *buf_att * * Returns: the address of the specific WPS attribute content found, or NU= LL */ -u8 *rtw_get_wps_attr_content(u8 *wps_ie, uint wps_ielen, u16 target_attr_i= d, u8 *buf_content, uint *len_content) +u8 *rtw_get_wps_attr_content(u8 *wps_ie, uint wps_ielen, u16 target_attr_i= d, + u8 *buf_content, uint *len_content) { u8 *attr_ptr; u32 attr_len; @@ -1019,7 +1028,11 @@ static int rtw_get_cipher_info(struct wlan_network *= pnetwork) pbuf =3D rtw_get_wpa2_ie(&pnetwork->network.ies[12], &wpa_ielen, pnetwor= k->network.ie_length-12); =20 if (pbuf && (wpa_ielen > 0)) { - if (rtw_parse_wpa2_ie(pbuf, wpa_ielen+2, &group_cipher, &pairwise_ciphe= r, &is8021x) =3D=3D _SUCCESS) { + int ret2 =3D rtw_parse_wpa2_ie(pbuf, wpa_ielen + 2, + &group_cipher, + &pairwise_cipher, + &is8021x); + if (ret2 =3D=3D _SUCCESS) { pnetwork->bcn_info.pairwise_cipher =3D pairwise_cipher; pnetwork->bcn_info.group_cipher =3D group_cipher; pnetwork->bcn_info.is_8021x =3D is8021x; @@ -1065,7 +1078,11 @@ void rtw_get_bcn_info(struct wlan_network *pnetwork) =20 /* get bwmode and ch_offset */ /* parsing HT_CAP_IE */ - p =3D rtw_get_ie(pnetwork->network.ies + _FIXED_IE_LENGTH_, WLAN_EID_HT_C= APABILITY, &len, pnetwork->network.ie_length - _FIXED_IE_LENGTH_); + { + u8 *ies_start =3D pnetwork->network.ies + _FIXED_IE_LENGTH_; + uint ies_len =3D pnetwork->network.ie_length - _FIXED_IE_LENGTH_; + + p =3D rtw_get_ie(ies_start, WLAN_EID_HT_CAPABILITY, &len, ies_len); if (p && len > 0) { pht_cap =3D (struct ieee80211_ht_cap *)(p + 2); pnetwork->bcn_info.ht_cap_info =3D le16_to_cpu(pht_cap->cap_info); @@ -1073,7 +1090,8 @@ void rtw_get_bcn_info(struct wlan_network *pnetwork) pnetwork->bcn_info.ht_cap_info =3D 0; } /* parsing HT_INFO_IE */ - p =3D rtw_get_ie(pnetwork->network.ies + _FIXED_IE_LENGTH_, WLAN_EID_HT_O= PERATION, &len, pnetwork->network.ie_length - _FIXED_IE_LENGTH_); + p =3D rtw_get_ie(ies_start, WLAN_EID_HT_OPERATION, &len, ies_len); + } if (p && len > 0) { pht_info =3D (struct HT_info_element *)(p + 2); pnetwork->bcn_info.ht_info_infos_0 =3D pht_info->infos[0]; diff --git a/drivers/staging/rtl8723bs/core/rtw_security.c b/drivers/stagin= g/rtl8723bs/core/rtw_security.c index 86e54454145a..11231f0d8fd0 100644 --- a/drivers/staging/rtl8723bs/core/rtw_security.c +++ b/drivers/staging/rtl8723bs/core/rtw_security.c @@ -60,9 +60,12 @@ void rtw_wep_encrypt(struct adapter *padapter, u8 *pxmit= frame) keylength =3D psecuritypriv->dot11DefKeylen[psecuritypriv->dot11PrivacyK= eyIndex]; =20 for (curfragnum =3D 0; curfragnum < pattrib->nr_frags; curfragnum++) { + u8 keyidx =3D psecuritypriv->dot11PrivacyKeyIndex; + u8 *defkey =3D psecuritypriv->dot11DefKey[keyidx].skey; + iv =3D pframe + pattrib->hdrlen; memcpy(&wepkey[0], iv, 3); - memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11Priv= acyKeyIndex].skey[0], keylength); + memcpy(&wepkey[3], defkey, keylength); payload =3D pframe + pattrib->iv_len + pattrib->hdrlen; =20 if ((curfragnum + 1) =3D=3D pattrib->nr_frags) { /* the last fragment */ @@ -1063,7 +1066,8 @@ static signed int aes_decipher(u8 *key, uint hdrlen, if (hdrlen !=3D WLAN_HDR_A3_QOS_LEN) hdrlen +=3D 2; =20 - } else if ((frtype =3D=3D WIFI_DATA) && /* only for data packet . add for= CONFIG_IEEE80211W, none 11w also can use */ + /* only for data packet . add for CONFIG_IEEE80211W, none 11w also can us= e */ + } else if ((frtype =3D=3D WIFI_DATA) && ((frsubtype =3D=3D 0x08) || (frsubtype =3D=3D 0x09) || (frsubtype =3D=3D 0x0a) || @@ -1487,8 +1491,9 @@ void rtw_sec_restore_wep_key(struct adapter *adapter) { struct security_priv *securitypriv =3D &(adapter->securitypriv); signed int keyid; + u32 alg =3D securitypriv->dot11PrivacyAlgrthm; =20 - if ((securitypriv->dot11PrivacyAlgrthm =3D=3D _WEP40_) || (securitypriv->= dot11PrivacyAlgrthm =3D=3D _WEP104_)) { + if ((alg =3D=3D _WEP40_) || (alg =3D=3D _WEP104_)) { for (keyid =3D 0; keyid < 4; keyid++) { if (securitypriv->key_mask & BIT(keyid)) { if (keyid =3D=3D securitypriv->dot11PrivacyKeyIndex) --=20 2.52.0