Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp1039606ybc; Sat, 23 Nov 2019 13:57:50 -0800 (PST) X-Google-Smtp-Source: APXvYqx1P5TUkTX+pTxx/rX7Po57XgFZB2DC8poP9DP2YaXnXZueBKhL7OHWEWVLvWc5qyzir9aT X-Received: by 2002:a17:906:57c3:: with SMTP id u3mr29443964ejr.254.1574546270142; Sat, 23 Nov 2019 13:57:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574546270; cv=none; d=google.com; s=arc-20160816; b=hrZh1vbhttXPnAP31CfSXAv50gNO3WQmMT5vfOl28ySFWw17YffeiRaX6W/S0cNj5F jw+ygMZ5Pbdj25wgYE3IXAvhcqvhmlUJIH+SIGU8J6OJg6qBWI6SIsI9KljdpYkPgQI7 N1NUdRndrm3UKoplfTr2b+vjDPTWSmWD48y5Y5SyVtPNif8/65C81NVSADKGtaJEcEwT KWgn0m4am5wjz00Cod34kxv8sRNMWhpmXeMnR/gK3l6nURoDwQmuMFm9j4btFljnaBoE mt8OIGBIZP/FdmDYE6anAM9r3I6h2B3xU/N/pQv9689zARBsbqPiXrRR90eAnwyGJUPI LtyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=QTD1BJDtGK2D5CzR0HYTzZTFvAREqjglK3s/nEpAJc0=; b=Gkb7DK9n3wIjhbMpESa5pzANE2M8cRzmI23GY6gPChh4FjcsEO7ksZHajFCvJ9Q3Ps zj/LwUhYylFMJgSJIqxqB/7K1bZ9+HxQjjONUlSrYThZVScEQIPsitKlydAqGp/2OSEY WOdOpzZwqvngKYnBf01NJL8zZP2wSMTDJ96DzYvLlLi9zhbNfmY4H9ntup3fvXyusoRk Hu6TIPznpiWkvdADa4EI6vv2gbYlycd/Ygtiqq9GG1dPJzqmfMqxggOShm9JXQlNDd1k o6TuwPPKP5xt8FBZeL96MUUch+2Ui4mStZAViCNg4/fns7sBRCur2Avy6hGUCMRE4Fqt cIRw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p15si1387527ejb.3.2019.11.23.13.57.13; Sat, 23 Nov 2019 13:57:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726869AbfKWVzq (ORCPT + 99 others); Sat, 23 Nov 2019 16:55:46 -0500 Received: from jabberwock.ucw.cz ([46.255.230.98]:43690 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726735AbfKWVzq (ORCPT ); Sat, 23 Nov 2019 16:55:46 -0500 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 080851C1DC8; Sat, 23 Nov 2019 22:55:44 +0100 (CET) Date: Sat, 23 Nov 2019 22:55:28 +0100 From: Pavel Machek To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Alan Mikhak , Lorenzo Pieralisi , Paul Walmsley , Sasha Levin Subject: Re: [PATCH 4.19 217/220] tools: PCI: Fix broken pcitest compilation Message-ID: <20191123215527.GA22003@duo.ucw.cz> References: <20191122100912.732983531@linuxfoundation.org> <20191122100929.234765315@linuxfoundation.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="7JfCtLOvnd9MIVvH" Content-Disposition: inline In-Reply-To: <20191122100929.234765315@linuxfoundation.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --7JfCtLOvnd9MIVvH Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > From: Alan Mikhak >=20 > [ Upstream commit 8a5e0af240e07dd3d4897eb8ff52aab757da7fab ] >=20 > pcitest is currently broken due to the following compiler error > and related warning. Fix by changing the run_test() function > signature to return an integer result. >=20 > pcitest.c: In function run_test: > pcitest.c:143:9: warning: return with a value, in function > returning void > return (ret < 0) ? ret : 1 - ret; /* return 0 if test succeeded */ There is no such line in 4.19 version. > +++ b/tools/pci/pcitest.c > @@ -47,15 +47,15 @@ struct pci_test { > unsigned long size; > }; > =20 > -static void run_test(struct pci_test *test) > +static int run_test(struct pci_test *test) > { > - long ret; > + int ret =3D -EINVAL; > int fd; =2E.. fflush(stdout); } No, sorry, this will bring back warning fef31ecaaf2c was supposed to fix. My recommendation would be to drop this and fef31ecaaf2c from the stable. It is warning, not a "serious bug" after all. Alternatively, it needs to return something at the end of function, after the fflush(). Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --7JfCtLOvnd9MIVvH Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRPfPO7r0eAhk010v0w5/Bqldv68gUCXdmqzwAKCRAw5/Bqldv6 8pnlAKDAfSH8VkUmTSRZNPCevb35JDDkBACfa5vcKOesMKaocy/Vkwm65/9lFRo= =TbXN -----END PGP SIGNATURE----- --7JfCtLOvnd9MIVvH--