Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp37817pja; Fri, 22 Nov 2019 03:09:02 -0800 (PST) X-Google-Smtp-Source: APXvYqwRXt4hD5OkBIrpKWUgBLVCu5DUp+y0Ro+KHUgIy0EsJdGg36tZJvrFNKCGDZlhCn+OMMYR X-Received: by 2002:a17:906:378d:: with SMTP id n13mr6151255ejc.260.1574420942579; Fri, 22 Nov 2019 03:09:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574420942; cv=none; d=google.com; s=arc-20160816; b=T17XlcAXPo7/U0QYr/NVeggtc4g/yAfnVtpcT9Rdo1YlULPVftsBRuZZ57RUueJ65m cW38TL/+eACNwwLM25QQc0wZDjlpFBNCPEEfHARXtC/1nIny1oePG346uv72bGZVj/KT bB2d4CrSYSl+4PIJAHDmsrxRQcUyKJ3Nr5vqeZyTUN81gPUR4iIREkCCYSirfy1R+tQ2 pSJ/6aFgADJ6t9apBkVBoMS6oIzi1MHVHFHj31MhhZjRNLaC2PBpU5FOTh0GGWDy/ids HKog+im2PK7z0itSohAvUn1dVsrPbcujsf6XDtnVQGkERhrru/ion96OtM85XzZsW5jv jJGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=lIbBi0U8HsWIo4f76HLP7/Y7g7aAgUibYk1aavgA/zA=; b=tz3irPAJUWkmwk3KttCKTEeT7JWMuHPKszJyvyKvCoYHrK78R6dhjKIMoEE8PJVBhI JTYpMWV7z9pEJPOMf3eUqznu9ur5Xy6yOYD/nbk2RtPW2oj+1Bh4SqJtkYYh2xgrSbEZ svZsa9KXVCeWjUkwRuEuCOEK+6IzpWnqmqF0RGMXOZKaEyDMS7FXiqW1PI5U4VhLNRNN aP4hr9oerU3mwDaragf2Y8/ssEL4C3C55cSzXWJfTEg8YLgA+r1uGrNKUtWK5CUQgCyG Lyu6BtM7fLEQo43NNDPT0kS24i0GfMc1gDp0iXk0GIb+uFr+wY8BNFH4YVsWDFIL7UhV SB2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JNOFYtKm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v6si3976645ejj.375.2019.11.22.03.08.38; Fri, 22 Nov 2019 03:09:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JNOFYtKm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726977AbfKVLGZ (ORCPT + 99 others); Fri, 22 Nov 2019 06:06:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:34598 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731856AbfKVLGW (ORCPT ); Fri, 22 Nov 2019 06:06:22 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE9F220726; Fri, 22 Nov 2019 11:06:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574420782; bh=o2JFch+A6p3gmn/4HgcsJDUv94dfZLgFB7wi3AqrSk8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JNOFYtKm6IMqDRmeX5Lhp5eRfjTS7+V5jFyw2GsYioMm8EA7SIjaCeqmJx6I0v9ca 5SU8GXTMX4VfCrpKVqCbDS5vR+fX/aA85x4B+LDUEqQSgF66Oo1FBdZyx6EdhxYGo4 fZf1Tyv8E98FRx4s6eQDK9Rwwdy9He3NoSTJqYi0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alan Mikhak , Lorenzo Pieralisi , Paul Walmsley , Sasha Levin Subject: [PATCH 4.19 217/220] tools: PCI: Fix broken pcitest compilation Date: Fri, 22 Nov 2019 11:29:42 +0100 Message-Id: <20191122100929.234765315@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100912.732983531@linuxfoundation.org> References: <20191122100912.732983531@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alan Mikhak [ Upstream commit 8a5e0af240e07dd3d4897eb8ff52aab757da7fab ] pcitest is currently broken due to the following compiler error and related warning. Fix by changing the run_test() function signature to return an integer result. pcitest.c: In function run_test: pcitest.c:143:9: warning: return with a value, in function returning void return (ret < 0) ? ret : 1 - ret; /* return 0 if test succeeded */ pcitest.c: In function main: pcitest.c:232:9: error: void value not ignored as it ought to be return run_test(test); Fixes: fef31ecaaf2c ("tools: PCI: Fix compilation warnings") Signed-off-by: Alan Mikhak Signed-off-by: Lorenzo Pieralisi Reviewed-by: Paul Walmsley Signed-off-by: Sasha Levin --- tools/pci/pcitest.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/pci/pcitest.c b/tools/pci/pcitest.c index ec4d51f3308b8..4c5be77c211f0 100644 --- a/tools/pci/pcitest.c +++ b/tools/pci/pcitest.c @@ -47,15 +47,15 @@ struct pci_test { unsigned long size; }; -static void run_test(struct pci_test *test) +static int run_test(struct pci_test *test) { - long ret; + int ret = -EINVAL; int fd; fd = open(test->device, O_RDWR); if (fd < 0) { perror("can't open PCI Endpoint Test device"); - return; + return -ENODEV; } if (test->barnum >= 0 && test->barnum <= 5) { -- 2.20.1