Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp564124pxy; Wed, 21 Apr 2021 09:22:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxB/fRNwXPHMdmt/bssoeFh9RKLsyXQVoUi0Ts8C77GCFYwUlYEwgoUUXajo6kwmxchp6zB X-Received: by 2002:a17:90a:d201:: with SMTP id o1mr12133753pju.230.1619022137246; Wed, 21 Apr 2021 09:22:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619022137; cv=none; d=google.com; s=arc-20160816; b=iCA8xIxLy73ZmIE7dnCNfBT71M4EJwO5wJjE+2v7UKucZnbLyggA+NQNItUFaeNaEC Ex1GdFnCTqt6zNsjUDIbSXA58kVFKzDZY86UZJZu6AYIndCWmJdAUfNZJpJp8V9rIXXL ordqe7HJ/lJ7vDOTOsGTQxGDW5UsXegeszb1xY2+T/sDuCEEIp6qZW+FAjmDFGe2gbfg H08pg5mzcOD4bDYepqYVBWdVUresTsBHRSdNbBOkB5N6dNMRXO3g1LuiegPWbdkzk7ON gN4fs77YVJjVejeg78I2vk0BwWaxjEBbdRTZM1JySYPxLl80ZNfgFBjqz+YWFdQ1VHw/ z3FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=c1371y/BEyz7JEePhraPPLX25xQR6HJf3hvY4hN7kdM=; b=x3jLpvy0FTE9QypkG2vBUH5qeC/WxkG+XTZfd7n6jxrQ6zquZvsNiZp1IprtPm2hZ7 Yti+l6tzq6zjxkG0UNlDLTmmlHgEygaNXEE53N2PHl+sAeXv7tx4bGTEgMcyEAA7jGMN VsDs4Z7xRoeJRLhpGxG1ZVb+g4nCJ0Kys6z6viTtue9efAwYe2UeveUetgal1ZglfXpI uhRJPmu1/uKSR0K3b6JsXXoXjnBAWlaF84UGv/YEUZMMtNJNCZhDdKj3M5/pZvVv9Iss KRqvqyPUDS/2uAmWkfxYqXM6iCUWQleH6zm10rsHiT+Gn65EM3cBQEe6SKUsbSeQanwf j2eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TTEMkrZ+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b2si2679848pfr.200.2021.04.21.09.22.04; Wed, 21 Apr 2021 09:22:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TTEMkrZ+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242062AbhDUNLi (ORCPT + 99 others); Wed, 21 Apr 2021 09:11:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:46176 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241448AbhDUNIp (ORCPT ); Wed, 21 Apr 2021 09:08:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7473361455; Wed, 21 Apr 2021 13:08:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010485; bh=y5PVB7fNleulNKSU7VJvXDmsJJ2dPpIc06m0fj3jUr4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TTEMkrZ+CqOFqEdVqurPjs2uWRu12i5Rfa7xkMXm8oUYdPZRlXm3xI2LD1cv7m1dD rQRf33RTMftJLAZ7E8r15IehtXHHM1a9+FaAVJiY7WDthIlXYdPasNQ6XWXz51ZPKt k5GWEVi6hfrphEMsBVCPYNRL7PDCdZdfiNPsr3gM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Kalle Valo Subject: [PATCH 154/190] Revert "ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()" Date: Wed, 21 Apr 2021 15:00:29 +0200 Message-Id: <20210421130105.1226686-155-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit fc6a6521556c8250e356ddc6a3f2391aa62dc976. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/ath/ath6kl/wmi.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/net/wireless/ath/ath6kl/wmi.c b/drivers/net/wireless/ath/ath6kl/wmi.c index b137e7f34397..aca9732ec1ee 100644 --- a/drivers/net/wireless/ath/ath6kl/wmi.c +++ b/drivers/net/wireless/ath/ath6kl/wmi.c @@ -776,8 +776,10 @@ int ath6kl_wmi_set_roam_lrssi_cmd(struct wmi *wmi, u8 lrssi) cmd->info.params.roam_rssi_floor = DEF_LRSSI_ROAM_FLOOR; cmd->roam_ctrl = WMI_SET_LRSSI_SCAN_PARAMS; - return ath6kl_wmi_cmd_send(wmi, 0, skb, WMI_SET_ROAM_CTRL_CMDID, + ath6kl_wmi_cmd_send(wmi, 0, skb, WMI_SET_ROAM_CTRL_CMDID, NO_SYNC_WMIFLAG); + + return 0; } int ath6kl_wmi_force_roam_cmd(struct wmi *wmi, const u8 *bssid) -- 2.31.1