From 3bfa9940983b1122698cd71af33439ee731a848b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Graber?= Date: Thu, 30 May 2024 21:02:00 -0400 Subject: [PATCH] incusd/device/sriov: Line up code with comment MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Stéphane Graber --- internal/server/device/device_utils_network.go | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/internal/server/device/device_utils_network.go b/internal/server/device/device_utils_network.go index d9a24fb5a88..f931d87c363 100644 --- a/internal/server/device/device_utils_network.go +++ b/internal/server/device/device_utils_network.go @@ -778,10 +778,7 @@ func networkSRIOVSetupVF(d deviceCommon, vfParent string, vfDevice string, vfID // before being able to set a new VF MAC or disable spoofchecking. However some devices don't // allow it so ignore failures. link := &ip.Link{Name: vfParent} - err = link.SetVfAddress(volatile["last_state.vf.id"], "00:00:00:00:00:00") - if err != nil { - return vfPCIDev, 0, fmt.Errorf("Failed clearing MAC for VF %q: %w", volatile["last_state.vf.id"], err) - } + _ = link.SetVfAddress(volatile["last_state.vf.id"], "00:00:00:00:00:00") if useSpoofCheck { // Ensure spoof checking is disabled if not enabled in instance (only for real VF).