Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2668429pxj; Mon, 31 May 2021 07:50:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvXvzmza+qHV5bkDNSMCIdU+52yds0f9nqc8Pyx4mwiNubJejfoqgWbTWGtzEieGcehLIl X-Received: by 2002:a02:384b:: with SMTP id v11mr7764532jae.90.1622472655593; Mon, 31 May 2021 07:50:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622472655; cv=none; d=google.com; s=arc-20160816; b=wkSj9RKAbBYfnS7+1aX9yahcT2QaUlcZbt2839mjLsKhoIiCkgJD9xckKnfI1UAsjN NA5x/lsdfwkK04987B/UylLx/qWJ2fzZ/ciOjqLv4CBIZCeyUEwFwYNbWZ3IhncsGjun WQ0ayEqWRBBn0VKg9L7jp7m+etESRjsVunH19nYkwLdW8J0XQs9HAClx6rEW6UsGVo5m 3t4oodNT19+/eKEy2o63vQ93mgIwGNou5iOdi7SJTJy+tnqVM+UPl63NS0iVH+Sbz6Ta gT1j3a+3Liw3lZhTOXssy+jDIYtPmZaJlDPPcwqjTBO39y6Ol9S+YJCB1YA0fnIQQ1iZ Ag6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=efg9OydhS1APxRajIJ8xixJEzCn1MJuspZ6WEQBP/X0=; b=y/SW8VK+0+ua4KyWlW90bMPKb2UUwZMrNsyB2YyjjlHBqY0+W6efhqKLQQnCPf2YlD dVCFOW+HxpcGjvi2xcPbgupFMnwp7jGvh+Tw1uQ/IwXYnyMnb/rn9QGL7pAqjJnB7o0H jW9FwuX5w5MgDyJqkl/q22pnH8eLLxSm7QvBFqjTGsn8oDKWsuXcep1i5UvkEEeMkk+7 Va0dBIXXIWoqFPZKocUuq17zWHJY/m81hsLnqYSrFvvvvkUXKKc2yMu6ZKdzq6P95ERf 7/Ycbm9HPHxoroVpDLWACq2dc6Z9klNdMPqhXN0P3WTwYUpXcVZ7U+LwunoaEiC8gHJY lw3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lOdXG2jU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s13si15619476jat.68.2021.05.31.07.50.42; Mon, 31 May 2021 07:50:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lOdXG2jU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230262AbhEaOvu (ORCPT + 99 others); Mon, 31 May 2021 10:51:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:37786 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232626AbhEaOCc (ORCPT ); Mon, 31 May 2021 10:02:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6D48161948; Mon, 31 May 2021 13:37:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622468235; bh=4q0YyHM0SbsFNSLazTrvIfuRC/KdV8PwvZYubE5KCAw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lOdXG2jU/tbM4E6dORsIdg2jpyPPtGpVuLpkudTvR4SnbWC5dguLscSQIU675Akh6 X8QGRaXMkz6gJLs5f/s4pfhb1iNTRsChYoXFT3SFtjEpivlduU3cP5OMXQxDAYuFsM 4szAEhT9VRytD9tcoONxzBG9MkKH9tdRxwL4zFx8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Kalle Valo , Sasha Levin Subject: [PATCH 5.10 168/252] Revert "brcmfmac: add a check for the status of usb_register" Date: Mon, 31 May 2021 15:13:53 +0200 Message-Id: <20210531130703.718990488@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130657.971257589@linuxfoundation.org> References: <20210531130657.971257589@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman [ Upstream commit 30a350947692f794796f563029d29764497f2887 ] This reverts commit 42daad3343be4a4e1ee03e30a5f5cc731dadfef5. Because of recent interactions with developers from @umn.edu, all commits from them have been recently re-reviewed to ensure if they were correct or not. Upon review, this commit was found to be incorrect for the reasons below, so it must be reverted. It will be fixed up "correctly" in a later kernel change. The original commit here did nothing to actually help if usb_register() failed, so it gives a "false sense of security" when there is none. The correct solution is to correctly unwind from this error. Cc: Kangjie Lu Cc: Kalle Valo Link: https://lore.kernel.org/r/20210503115736.2104747-69-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c index 586f4dfc638b..d2a803fc8ac6 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1586,10 +1586,6 @@ void brcmf_usb_exit(void) void brcmf_usb_register(void) { - int ret; - brcmf_dbg(USB, "Enter\n"); - ret = usb_register(&brcmf_usbdrvr); - if (ret) - brcmf_err("usb_register failed %d\n", ret); + usb_register(&brcmf_usbdrvr); } -- 2.30.2