Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2745405pxj; Mon, 31 May 2021 09:39:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx90Q6gvI8/Y8psPCx9/t2gbk1Q0QPGjSgGjPq1DxNyH3MhXdL+LxKDUmyLBvFogPNsU68f X-Received: by 2002:a17:906:28d8:: with SMTP id p24mr12166562ejd.64.1622479194738; Mon, 31 May 2021 09:39:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622479194; cv=none; d=google.com; s=arc-20160816; b=sZnO40ILbAoqpJu+cPPo+VFdtXmDv69kj4yUACwHbOqng5ZbwV+EdU2mRkUtBc8cQJ pTmT89HG1AlBsa3XLl5CLrjkJxaFuCADfeGOdI/1tpZEIiE2DX5UhdECsKglVmclLWOM KyGbCnBheSG1sn13laK5udyYc+OC3l/JMrgwEEi2SIrImNRB3NQ/tVHBoEArv1zSQn2H 4AdBwIqBvOKD1XnuaL+IEnkWFZLQHObcgD7iWEC13HV2LG2EBN2yDwPbfYP3RlVNC/q7 LBz1kbRO5h10WdhMkWtz0ZnfraugsgUWY5OIvTMR3nS0Yfc1LVsttG4C1y3mPcPQmtwf hxaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=efg9OydhS1APxRajIJ8xixJEzCn1MJuspZ6WEQBP/X0=; b=sw1hzZTcnKgBH5so8uese6zuVodj8YZMcfP5L7ePdEbotPQ2x3dmiRAa2hr7FCihCv fZGYnWdpFJIR1PdrpIrduKOWCG2PpgTUg73LzlPiGvPEziH7D9oltHk91FVLTNql3jgn YF7vB/L5rjh4veofRdsB2D94tzP4jD+RMVsI1oItqsdVMx04mRNi328wPGjkRHijUgoS +Mv1BrycFvzbJxD4tKR7PaA/fi/7wdmm8cEC/RjfGYnB2+kWbYFzT4NWagGOmcTlOVsv 8mXRU05lgNc+G1MN7dglTZRuznQbLxu7wTjqPMNP/to5uRtiko+enQFdruj9bbbSmNdp ApKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0q2vFTCw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l18si13958670edt.366.2021.05.31.09.39.31; Mon, 31 May 2021 09:39:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0q2vFTCw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233232AbhEaQiE (ORCPT + 99 others); Mon, 31 May 2021 12:38:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:40792 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231637AbhEaOtl (ORCPT ); Mon, 31 May 2021 10:49:41 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0E91E61400; Mon, 31 May 2021 13:57:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622469439; bh=4q0YyHM0SbsFNSLazTrvIfuRC/KdV8PwvZYubE5KCAw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0q2vFTCwMemZ420iq3TxxpuoedyOGV+Fh3TC2L1WY9u+EMn8o7Lhh2mcMM+kph8cq pXxu58mCI2ACyF03AwJpyV94vyyVx2o17NB1c6hoPmgw7+zulftUoqiNYlR9Vko856 iJ07urG272A20Rn8FMBrNhon+eiU5xR1c2dHkDvk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Kalle Valo , Sasha Levin Subject: [PATCH 5.12 198/296] Revert "brcmfmac: add a check for the status of usb_register" Date: Mon, 31 May 2021 15:14:13 +0200 Message-Id: <20210531130710.536328981@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130703.762129381@linuxfoundation.org> References: <20210531130703.762129381@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman [ Upstream commit 30a350947692f794796f563029d29764497f2887 ] This reverts commit 42daad3343be4a4e1ee03e30a5f5cc731dadfef5. Because of recent interactions with developers from @umn.edu, all commits from them have been recently re-reviewed to ensure if they were correct or not. Upon review, this commit was found to be incorrect for the reasons below, so it must be reverted. It will be fixed up "correctly" in a later kernel change. The original commit here did nothing to actually help if usb_register() failed, so it gives a "false sense of security" when there is none. The correct solution is to correctly unwind from this error. Cc: Kangjie Lu Cc: Kalle Valo Link: https://lore.kernel.org/r/20210503115736.2104747-69-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c index 586f4dfc638b..d2a803fc8ac6 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1586,10 +1586,6 @@ void brcmf_usb_exit(void) void brcmf_usb_register(void) { - int ret; - brcmf_dbg(USB, "Enter\n"); - ret = usb_register(&brcmf_usbdrvr); - if (ret) - brcmf_err("usb_register failed %d\n", ret); + usb_register(&brcmf_usbdrvr); } -- 2.30.2