Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp572480pxy; Wed, 21 Apr 2021 09:33:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZYte7tfKCCMJhts9gSRZnHt+b3H4VqyyDyXewwmYQD4/ACyCVB5SBxMAaKBUecDrPBxYw X-Received: by 2002:a63:dc56:: with SMTP id f22mr22720932pgj.287.1619022790528; Wed, 21 Apr 2021 09:33:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619022790; cv=none; d=google.com; s=arc-20160816; b=sGt2BYLvDlhMswCLlJPyXOI4qERZLDxwqbh4/2TO8w1bOtydSb7e0YnZq6MaS0z8O4 38NQsEKKLU8j8fWQbHuCum3IgzTVW3gxt0U3FMnRV8uLqBKmN0ZtJD3v1jlMdwTn9CZO 92m4jlef6/Iczmp2lcPJU0eJnQn5V21qtyOXtqwXfSkSvX4Bi64oBvtn0xUumcNqkOO9 3h5DerjipbVbNwco6C8sX5Wy2T6+xnYxBI3Tvki9zSacBCYLE+sRsX7YQ5qDhZ0pinzD dEzaiLqxPhpU1I9cN7EJCoCv8hcTjH5e5IAKrbFzQk8gX3eATvwQLZo+Brl1TCPegS5d x83g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=HBwyvP+WaE9rsB1iRGydBgDMhnS38Ts/X6qJmFwGQm0=; b=SeHX2F7gnGh1gn7UdW6GRh2tVe6FdjVAhY3otamyUqY0BI6H0Tk8APyhorjxio8wEQ pvsI6r7kaw0kKGUJTGGfo94/JdWHUqisVlDp/5gDA3cYMN2cIhcOtz2rvv8AVKQahi/v NTxZE+pqJrEk+gI5JAqnUP2gYg4fxrtw5uuWNYOCT2H97hUZZF8rGYJuAKfIGq5IvE5t CT2ya2MWV4DYA0GTIhE1BMI/uB97z5mFc9iXBEBo1M1HGz2BlEyAw6VNzPpt3W8OFrsy lLtYF1S6rQsXoowuObYOvY2AZodggXtDpNo3GFju9inPVttv3dalcMwRQxD0Im49iOM9 F8GQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qWqGFZSD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n17si83080plf.49.2021.04.21.09.32.58; Wed, 21 Apr 2021 09:33:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qWqGFZSD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241497AbhDUNSY (ORCPT + 99 others); Wed, 21 Apr 2021 09:18:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:47148 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239792AbhDUNJC (ORCPT ); Wed, 21 Apr 2021 09:09:02 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 074B761476; Wed, 21 Apr 2021 13:08:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010487; bh=XeXUQhnBtVX/+NBADaBX5aGK6jRrb4fNppiFs2jMYVQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qWqGFZSDqFnmdB2UcJEg5XJZZFk/rMAJXj631qy9/Dv51eoBwz+h5KyZJPTWBaTwm I3JfOJ5qphq3ScvxWur31Flz/3qXq1z15PX2AhCvf5wYpZJk+xr7sziUrLLsYyVfUM j4FXti9LyzPDRIbmz0RM6HPddStY58MSnB6xPGMA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Kalle Valo Subject: [PATCH 155/190] Revert "brcmfmac: add a check for the status of usb_register" Date: Wed, 21 Apr 2021 15:00:30 +0200 Message-Id: <20210421130105.1226686-156-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 42daad3343be4a4e1ee03e30a5f5cc731dadfef5. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c index 586f4dfc638b..d2a803fc8ac6 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1586,10 +1586,6 @@ void brcmf_usb_exit(void) void brcmf_usb_register(void) { - int ret; - brcmf_dbg(USB, "Enter\n"); - ret = usb_register(&brcmf_usbdrvr); - if (ret) - brcmf_err("usb_register failed %d\n", ret); + usb_register(&brcmf_usbdrvr); } -- 2.31.1