From 23fa18eaa71266feff7ba8d83022d9e1cc83c65a Mon Sep 17 00:00:00 2001
From: hc <hc@nodka.com>
Date: Fri, 10 May 2024 07:42:03 +0000
Subject: [PATCH] disable pwm7

---
 kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/rtw_mlme_ext.c |   48 +-----------------------------------------------
 1 files changed, 1 insertions(+), 47 deletions(-)

diff --git a/kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/rtw_mlme_ext.c b/kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/rtw_mlme_ext.c
index 100cc2a..07aab07 100644
--- a/kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/rtw_mlme_ext.c
+++ b/kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/rtw_mlme_ext.c
@@ -2781,10 +2781,6 @@
 				goto authclnt_fail;
 			}
 
-			if (len > sizeof(pmlmeinfo->chg_txt)) {
-				goto authclnt_fail;
-			}
-
 			_rtw_memcpy((void *)(pmlmeinfo->chg_txt), (void *)(p + 2), len);
 			pmlmeinfo->auth_seq = 3;
 			issue_auth(padapter, NULL, 0);
@@ -4686,7 +4682,6 @@
 	/*	Try to get the device password ID from the WPS IE of group negotiation request frame */
 	/*	WiFi Direct test plan 5.1.15 */
 	rtw_get_wps_ie(frame_body + _PUBLIC_ACTION_IE_OFFSET_, len - _PUBLIC_ACTION_IE_OFFSET_, wpsie, &wpsielen);
-	wps_devicepassword_id_len = sizeof(wps_devicepassword_id);
 	rtw_get_wps_attr_content(wpsie, wpsielen, WPS_ATTR_DEVICE_PWID, (u8 *) &wps_devicepassword_id, &wps_devicepassword_id_len);
 	wps_devicepassword_id = be16_to_cpu(wps_devicepassword_id);
 
@@ -6788,11 +6783,9 @@
 
 				merged_p2p_ielen = rtw_p2p_merge_ies(frame_body + _PUBLIC_ACTION_IE_OFFSET_, len - _PUBLIC_ACTION_IE_OFFSET_, merged_p2pie);
 
-				attr_contentlen = sizeof(invitation_flag);
 				rtw_get_p2p_attr_content(merged_p2pie, merged_p2p_ielen, P2P_ATTR_INVITATION_FLAGS, &invitation_flag, &attr_contentlen);
 				if (attr_contentlen) {
 
-					attr_contentlen = sizeof(pwdinfo->p2p_peer_interface_addr);
 					rtw_get_p2p_attr_content(merged_p2pie, merged_p2p_ielen, P2P_ATTR_GROUP_BSSID, pwdinfo->p2p_peer_interface_addr, &attr_contentlen);
 					/*	Commented by Albert 20120510 */
 					/*	Copy to the pwdinfo->p2p_peer_interface_addr. */
@@ -6811,7 +6804,6 @@
 						/*	Re-invoke the persistent group. */
 
 						_rtw_memset(&group_id, 0x00, sizeof(struct group_id_info));
-						attr_contentlen = sizeof(struct group_id_info);
 						rtw_get_p2p_attr_content(merged_p2pie, merged_p2p_ielen, P2P_ATTR_GROUP_ID, (u8 *) &group_id, &attr_contentlen);
 						if (attr_contentlen) {
 							if (_rtw_memcmp(group_id.go_device_addr, adapter_mac_addr(padapter), ETH_ALEN)) {
@@ -6823,7 +6815,6 @@
 								/*	The p2p device sending this p2p invitation request wants to be the persistent GO. */
 								if (is_matched_in_profilelist(pwdinfo->p2p_peer_interface_addr, &pwdinfo->profileinfo[0])) {
 									u8 operatingch_info[5] = { 0x00 };
-									attr_contentlen = sizeof(operatingch_info);
 									if (rtw_get_p2p_attr_content(merged_p2pie, merged_p2p_ielen, P2P_ATTR_OPERATING_CH, operatingch_info,
 										&attr_contentlen)) {
 										if (rtw_chset_search_ch(adapter_to_chset(padapter), (u32)operatingch_info[4]) >= 0) {
@@ -6867,7 +6858,6 @@
 						/*	Received the invitation to join a P2P group. */
 
 						_rtw_memset(&group_id, 0x00, sizeof(struct group_id_info));
-						attr_contentlen = sizeof(struct group_id_info);
 						rtw_get_p2p_attr_content(merged_p2pie, merged_p2p_ielen, P2P_ATTR_GROUP_ID, (u8 *) &group_id, &attr_contentlen);
 						if (attr_contentlen) {
 							if (_rtw_memcmp(group_id.go_device_addr, adapter_mac_addr(padapter), ETH_ALEN)) {
@@ -6912,7 +6902,6 @@
 			_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
 			p2p_ie = rtw_get_p2p_ie(frame_body + _PUBLIC_ACTION_IE_OFFSET_, len - _PUBLIC_ACTION_IE_OFFSET_, NULL, &p2p_ielen);
 			if (p2p_ie) {
-				attr_contentlen = sizeof(attr_content);
 				rtw_get_p2p_attr_content(p2p_ie, p2p_ielen, P2P_ATTR_STATUS, &attr_content, &attr_contentlen);
 
 				if (attr_contentlen == 1) {
@@ -9402,8 +9391,6 @@
 #endif /* CONFIG_IOCTL_CFG80211 */
 
 				pframe = rtw_set_ie(pframe, EID_WPA2, pIE->Length, pIE->data, &(pattrib->pktlen));
-				/* tmp: update rsn's spp related opt. */
-				rtw_set_spp_amsdu_mode(padapter->registrypriv.amsdu_mode, pframe - (pIE->Length + 2), pIE->Length +2);
 			}
 			break;
 #ifdef CONFIG_80211N_HT
@@ -10331,12 +10318,6 @@
 			else /* TX AMSDU disabled */
 				BA_para_set &= ~BIT(0);
 #endif
-			psta = rtw_get_stainfo(pstapriv, raddr);
-			if (psta != NULL) {
-				if (psta->flags & WLAN_STA_AMSDU_DISABLE)
-					BA_para_set &= ~BIT(0);
-			}
-
 			BA_para_set = cpu_to_le16(BA_para_set);
 			pframe = rtw_set_fixed_ie(pframe, 2, (unsigned char *)(&(BA_para_set)), &(pattrib->pktlen));
 
@@ -10379,11 +10360,6 @@
 					BA_para_set &= ~BIT(0);
 				else if (pregpriv->rx_ampdu_amsdu == 1) /* enabled */
 					BA_para_set |= BIT(0);
-			}
-			psta = rtw_get_stainfo(pstapriv, raddr);
-			if (psta != NULL) {
-				if (psta->flags & WLAN_STA_AMSDU_DISABLE)
-					BA_para_set &= ~BIT(0);
 			}
 
 			BA_para_set = cpu_to_le16(BA_para_set);
@@ -11265,7 +11241,6 @@
 			u32	attr_contentlen = 0;
 			u8 listen_ch[5] = { 0x00 };
 
-			attr_contentlen = sizeof(listen_ch);
 			rtw_get_p2p_attr_content(p2p_ie, p2p_ielen, P2P_ATTR_LISTEN_CH, listen_ch, &attr_contentlen);
 			bssid->Configuration.DSConfig = listen_ch[4];
 		} else {
@@ -11397,8 +11372,7 @@
 #ifdef CONFIG_RTW_80211K
 	p = rtw_get_ie(bssid->IEs + ie_offset, _EID_RRM_EN_CAP_IE_, &len, bssid->IELength - ie_offset);
 	if (p)
-		_rtw_memcpy(bssid->PhyInfo.rm_en_cap, (p + 2), MIN(*(p + 1),
-			    sizeof(bssid->PhyInfo.rm_en_cap)));
+		_rtw_memcpy(bssid->PhyInfo.rm_en_cap, (p + 2), *(p + 1));
 
 	/* save freerun counter */
 	bssid->PhyInfo.free_cnt = precv_frame->u.hdr.attrib.free_cnt;
@@ -15123,20 +15097,6 @@
 	return	H2C_SUCCESS;
 }
 
-static u8 amsdu_spp_enable(_adapter *pdapter, enum security_type type)
-{
-	u8 ret = _FALSE;
-
-	if (pdapter->registrypriv.amsdu_mode == RTW_AMSDU_MODE_SPP) {
-		if ( type == _AES_ || type == _CCMP_256_
-			|| type == _GCMP_ || type == _GCMP_256_ )
-			ret = _SUCCESS;
-	}
-
-	return ret;
-}
-
-
 /*
 SEC CAM Entry format (32 bytes)
 DW0 - MAC_ADDR[15:0] | Valid[15] | MFB[14:8] | RSVD[7]  | GK[6] | MIC_KEY[5] | SEC_TYPE[4:2] | KID[1:0]
@@ -15229,8 +15189,6 @@
 		RTW_INFO_DUMP("GTK : ", pparm->key, sizeof(pparm->key));
 		ctrl |= BIT(9);
 	}	
-	if (amsdu_spp_enable(padapter, pparm->algorithm) == _SUCCESS)
-		ctrl |= BIT(7);
 
 	write_cam(padapter, cam_id, ctrl, addr, pparm->key);
 
@@ -15378,12 +15336,8 @@
 			RTW_INFO_DUMP("PTK : ", pparm->key, sizeof(pparm->key));
 			ctrl |= BIT(9);
 		}
-		if (amsdu_spp_enable(padapter, pparm->algorithm) == _SUCCESS)
-			ctrl |= BIT(7);
 
 		write_cam(padapter, cam_id, ctrl, pparm->addr, pparm->key);
-		if (!(pparm->gk))
-			ATOMIC_INC(&psta->keytrack);	/*CVE-2020-24587*/		
 	}
 	ret = H2C_SUCCESS_RSP;
 

--
Gitblit v1.6.2