Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2707539pxj; Mon, 31 May 2021 08:44:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy17eCp4lbnTzuuA0GuN80exppucAHanm3ME9e3NK31ZOM8Jw7w7B7aeVb8bTt8oWKTovs4 X-Received: by 2002:a05:6402:22f1:: with SMTP id dn17mr25975851edb.286.1622475881224; Mon, 31 May 2021 08:44:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622475881; cv=none; d=google.com; s=arc-20160816; b=UzfVMhTz3cFJPn71xEKteKaQ5IiDfXdDUHOjUlOKP9whxV45fwd6nVQwQ+SbNnnWvc lrk4a/M/QszUMw2+Sh0ZPlbjJwS1c1kU4xlzS8eTBlNITeEoagwp9/mlQ5B7GMDVW9df +gn9Z5okRMLPTmhNJ2tzNnVl9BkwjNRGQwz2jStGpCFcgRDQTtjN+YOqSaHvgifhB3Nm pz0ovNtyKpQUrOjgSANV13Z3Z9P7roAe9W6dEwZHEVv1bUEAzlU1pHX/yOvyX8874TdE FPNBa8J7h2BkPCE/KcTOb66MlIoQklrJkb9PTo4FaYVBq0SXbZ59YwQRFogoTms9RssL iZhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ryLtENtTKUp89FojJG6cN0/BAOTSxiUUG/9bx06DKbs=; b=mqkAI2tae2Pz5BBBM8k8XCpkfIa1HKSl+qp62f7to9tPKFTLhrIhBzsVwMGZiq/rqj fxPuw85CYAEZWQX5Um0M9vhW1TKphShbgI9itBKDnW1isN/eW6JgGuGh50CyN4cAEK6i Ti8dG88W2yL1KksfMbfeAzD3xUBc0KuX1Vw3HT2vONCvHIO9U7mGlah1SQhd3obOazQK bzg8drSg5d/4yE9/XN0HeTCJ0dggw/vdCTmMfRndoLQTiYaSZmFKnO5ki9qezBDyDjWc yuH5i8tMMh9bmzpl9pvoMgOzPUVgBm2Tufc8Ng/FwHv52R4mG/Fa3WT8ozydHUZpYO6m vdlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TtNsZczc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r24si15615378ejy.134.2021.05.31.08.44.18; Mon, 31 May 2021 08:44:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TtNsZczc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233645AbhEaPo2 (ORCPT + 99 others); Mon, 31 May 2021 11:44:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:47636 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233499AbhEaOZD (ORCPT ); Mon, 31 May 2021 10:25:03 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C39FC613F1; Mon, 31 May 2021 13:46:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622468772; bh=g6d2Jt9q55l7Ht6mRDOobLRlNSvQALDKJx4ukrRtYhg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TtNsZczc5wA3+ncy1naUffOE1ZteOweM6XvBYbFJDyT3lx+h2ECmvvP4OEByvsCBZ j854HK0YDLlKPkxU7Barefo7waV8lxKAvDTbWSRie0QhddEIOttX4V6zchzjvDMBEV y1k6rtpr/gUrB4wKbAgzTWMXAxFFFHhJXJdKyjyk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Kalle Valo , Sasha Levin Subject: [PATCH 5.4 121/177] Revert "brcmfmac: add a check for the status of usb_register" Date: Mon, 31 May 2021 15:14:38 +0200 Message-Id: <20210531130652.098017068@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130647.887605866@linuxfoundation.org> References: <20210531130647.887605866@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman [ Upstream commit 30a350947692f794796f563029d29764497f2887 ] This reverts commit 42daad3343be4a4e1ee03e30a5f5cc731dadfef5. Because of recent interactions with developers from @umn.edu, all commits from them have been recently re-reviewed to ensure if they were correct or not. Upon review, this commit was found to be incorrect for the reasons below, so it must be reverted. It will be fixed up "correctly" in a later kernel change. The original commit here did nothing to actually help if usb_register() failed, so it gives a "false sense of security" when there is none. The correct solution is to correctly unwind from this error. Cc: Kangjie Lu Cc: Kalle Valo Link: https://lore.kernel.org/r/20210503115736.2104747-69-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c index 575ed19e9195..6f41d28930e4 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1560,10 +1560,6 @@ void brcmf_usb_exit(void) void brcmf_usb_register(void) { - int ret; - brcmf_dbg(USB, "Enter\n"); - ret = usb_register(&brcmf_usbdrvr); - if (ret) - brcmf_err("usb_register failed %d\n", ret); + usb_register(&brcmf_usbdrvr); } -- 2.30.2