summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSimon Glass <sjg@chromium.org>2013-08-15 21:32:08 -0600
committerChromeBot <chrome-bot@google.com>2013-08-25 16:57:28 -0700
commit3401fdcd4125beea1a8cb1cc59ee27df89d4d88a (patch)
tree5fd2c191d0f98ab276bf11f87c88d3c7fbfe222a
parent47779880b28f2c549dd3349d8f28d68a0f784eb4 (diff)
downloadvboot-3401fdcd4125beea1a8cb1cc59ee27df89d4d88a.tar.gz
Correct some minor compiler warnings
A few places in the code through up warnings when building with strict compiler flags. Correct these. BUG=chrome-os-partner:21115 BRANCH=pit TEST=manual Build with: FEATURES=test emerge-peach_pit vboot_reference and see that iot now succeeds. Warnings include: host/arch/arm/lib/crossystem_arch.c: In function 'ReadFdtValue': host/arch/arm/lib/crossystem_arch.c:93:8: error: ignoring return value of 'fread', declared with attribute warn_unused_result [-Werror=unused-result] Change-Id: I765723636e5f8979b794925c7b610081b2849026 Signed-off-by: Simon Glass <sjg@chromium.org> Reviewed-on: https://gerrit.chromium.org/gerrit/66174
-rw-r--r--futility/futility.c3
-rw-r--r--host/arch/arm/lib/crossystem_arch.c5
-rw-r--r--host/lib/host_keyblock.c2
-rw-r--r--tests/vboot_api_kernel_tests.c5
4 files changed, 10 insertions, 5 deletions
diff --git a/futility/futility.c b/futility/futility.c
index 54921d1a..35620865 100644
--- a/futility/futility.c
+++ b/futility/futility.c
@@ -108,7 +108,8 @@ static void log_str(char *str)
return;
}
- write(log_fd, "\n", 1);
+ if (write(log_fd, "\n", 1) < 0)
+ return;
}
static void log_close(void)
diff --git a/host/arch/arm/lib/crossystem_arch.c b/host/arch/arm/lib/crossystem_arch.c
index 033632e4..99b86897 100644
--- a/host/arch/arm/lib/crossystem_arch.c
+++ b/host/arch/arm/lib/crossystem_arch.c
@@ -90,7 +90,10 @@ static int ReadFdtValue(const char *property, int *value) {
return E_FILEOP;
}
- fread(&data, 1, sizeof(data), file);
+ if (fread(&data, 1, sizeof(data), file) != sizeof(data)) {
+ fprintf(stderr, "Unable to read FDT property %s\n", property);
+ return E_FILEOP;
+ }
fclose(file);
if (value)
diff --git a/host/lib/host_keyblock.c b/host/lib/host_keyblock.c
index b12f024f..e1dd95be 100644
--- a/host/lib/host_keyblock.c
+++ b/host/lib/host_keyblock.c
@@ -147,7 +147,7 @@ VbKeyBlockHeader* KeyBlockRead(const char* filename) {
/* Verify the hash of the key block, since we can do that without
* the public signing key. */
if (0 != KeyBlockVerify(block, file_size, NULL, 1)) {
- VBDEBUG(("Invalid key block file: filename\n", filename));
+ VBDEBUG(("Invalid key block file: %s\n", filename));
free(block);
return NULL;
}
diff --git a/tests/vboot_api_kernel_tests.c b/tests/vboot_api_kernel_tests.c
index 56cb2104..87dc6cfa 100644
--- a/tests/vboot_api_kernel_tests.c
+++ b/tests/vboot_api_kernel_tests.c
@@ -234,7 +234,8 @@ VbError_t VbExDiskGetInfo(VbDiskInfo **infos_ptr, uint32_t *count,
t->disks_to_provide[i].flags;
mock_disks[num_disks].handle = (VbExDiskHandle_t)
t->disks_to_provide[i].diskname;
- VBDEBUG((" mock_disk[%d] %lld %lld 0x%x %s\n", i,
+ VBDEBUG((" mock_disk[%d] %" PRIu64 " %" PRIu64
+ " 0x%x %s\n", i,
mock_disks[num_disks].bytes_per_lba,
mock_disks[num_disks].lba_count,
mock_disks[num_disks].flags,
@@ -253,7 +254,7 @@ VbError_t VbExDiskGetInfo(VbDiskInfo **infos_ptr, uint32_t *count,
else
*count = num_disks;
- VBDEBUG((" *count=%lld\n", *count));
+ VBDEBUG((" *count=%" PRIu32 "\n", *count));
VBDEBUG((" return 0x%x\n", t->diskgetinfo_return_val));
return t->diskgetinfo_return_val;