From: Subrata <ris...@li...> - 2010-05-07 05:18:08
|
The branch, master, has been updated via f0be8b0c4489defeb6eaf6715576524a48b8998a (commit) from 3e113a2101b36d6799ec1d41317bfa16d197c9a2 (commit) - Log ----------------------------------------------------------------- commit f0be8b0c4489defeb6eaf6715576524a48b8998a Author: Subrata Modak <sub...@su...> Date: Fri May 7 10:33:00 2010 +0530 We should to check the return value of trigger_eventfd_overflow() in overflow_poll_test(). Signed-off-by: Shi Weihua <sh...@cn...>, Acked-by: Garrett Cooper <yan...@gm...>, ----------------------------------------------------------------------- Summary of changes: testcases/kernel/syscalls/eventfd/eventfd01.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/testcases/kernel/syscalls/eventfd/eventfd01.c b/testcases/kernel/syscalls/eventfd/eventfd01.c index 83eb86e..ce55746 100644 --- a/testcases/kernel/syscalls/eventfd/eventfd01.c +++ b/testcases/kernel/syscalls/eventfd/eventfd01.c @@ -602,7 +602,7 @@ static void overflow_poll_test(int evfd) int ret; ret = trigger_eventfd_overflow(evfd, &fd, &ctx); - if (fd == -1) { + if (ret == -1) { tst_resm(TBROK, "error triggering eventfd overflow"); return; } hooks/post-receive -- ltp |