Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp2717845pxy; Mon, 3 May 2021 06:34:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxu0NrSvKGqirRcOkm3iMyFRxCT/evdPyfxyCjuZAjdD0sG7QTZsROFFI7S3WUxAysyLSWX X-Received: by 2002:a62:1413:0:b029:27f:dd1d:2956 with SMTP id 19-20020a6214130000b029027fdd1d2956mr18803055pfu.29.1620048888039; Mon, 03 May 2021 06:34:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620048888; cv=none; d=google.com; s=arc-20160816; b=xrQexS4b02GbRZDLf+pXrCPcQxvpOgT4XHZlkXPbT81c/c+42TluC5MUKWkAnpCupf gTsGlGaEmQBuko2ds5l2WrWLBReDYdsvMsjB2ZEZEn1j85c3B1PYwhfqlMdQuX5C3Z3/ 2WQMy/EuYnA/8nvUB35aYMOCtERUkrlS0Gk/efIt05lDuhgOsuY1c+29hgrtoJgKDJ9A xmz/QBQ3QNskvfuL8v85D3tiZ4jFjXDr6SJLgD80lDf/npw/mgNaDSFwY5NNVPoeMSWz HmcKUVdTqx/SBnqkmkQK6Sh1BSjHLWJltgdCSWOgpsjdVX5z3j4Wmyx5LduMODqnfkn7 mBqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MRW/zobTXQgjC0Fr0tentBHRd+P7sSbj7igS+cVUjmE=; b=iYIl5tKks5rMCRHR95zFIAiWSN4pjkOKVR4H003Ave6UoWBb19jtZdVvjyQS52Maul Mvebe7PR4NcvFljq+7iPm35oUcJG0qHXmsyWMNNQTUwJRHMp9ZE1HKpJmbDM/6PLTBSH mC4VNfRwGkOdslvP6yg3wCHhOirIJ4IceVk1LjqBi9nSu0Xt/Q9aIipwj8PB1+E+4gfl /EmpWXwX1UbfcefbwK9pwmvy0v3xIwq4APZM+1FOasH/jwGBduquhlPzOrcVJ8l4AKiu yFbGq+S0G08fLEO5M1PmCN92RrKdGCtqXW0aB+f1jxtRTYQ0VIZMaFki+dc3XNb1sQMu UHxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fhUTAqX1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d37si13474595pgm.211.2021.05.03.06.34.34; Mon, 03 May 2021 06:34:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fhUTAqX1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234093AbhECMDv (ORCPT + 99 others); Mon, 3 May 2021 08:03:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:37160 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233836AbhECMCL (ORCPT ); Mon, 3 May 2021 08:02:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7BC23613C1; Mon, 3 May 2021 12:01:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620043278; bh=D87Rl+DfAnAQam7hOJOIuqU3dVxihweRU2T+Bpt49hc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fhUTAqX1eWbKq5OuyzyvipnqA+4wVfNvDKmGpkTCGtBta9V1EVNy93NW2h8NeHcXd 3xClQzREJVHi/DqhbLWWW/GvnkIy9d4l+uwIh9a/7RwEPg/BLgK+imZJBGMPO+bENM 8+ZBUXtffdJcJ0439ODBdJtCluIapStiZnQG0k0g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Kalle Valo Subject: [PATCH 68/69] Revert "brcmfmac: add a check for the status of usb_register" Date: Mon, 3 May 2021 13:57:35 +0200 Message-Id: <20210503115736.2104747-69-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210503115736.2104747-1-gregkh@linuxfoundation.org> References: <20210503115736.2104747-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 42daad3343be4a4e1ee03e30a5f5cc731dadfef5. Because of recent interactions with developers from @umn.edu, all commits from them have been recently re-reviewed to ensure if they were correct or not. Upon review, this commit was found to be incorrect for the reasons below, so it must be reverted. It will be fixed up "correctly" in a later kernel change. The original commit here did nothing to actually help if usb_register() failed, so it gives a "false sense of security" when there is none. The correct solution is to correctly unwind from this error. Cc: Kangjie Lu Cc: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c index 586f4dfc638b..d2a803fc8ac6 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1586,10 +1586,6 @@ void brcmf_usb_exit(void) void brcmf_usb_register(void) { - int ret; - brcmf_dbg(USB, "Enter\n"); - ret = usb_register(&brcmf_usbdrvr); - if (ret) - brcmf_err("usb_register failed %d\n", ret); + usb_register(&brcmf_usbdrvr); } -- 2.31.1