diff options
author | Frédéric Bérat <fberat@redhat.com> | 2023-06-01 16:27:47 +0200 |
---|---|---|
committer | Siddhesh Poyarekar <siddhesh@sourceware.org> | 2023-06-01 13:01:32 -0400 |
commit | 29e25f6f136182fb3756d51e03dea7c4d1919dd9 (patch) | |
tree | 4d3950068c9fec569ae21055641b986632371fbb /support/test-container.c | |
parent | a952fcda58cd7aa191140fc9e7d453df212b9117 (diff) | |
download | glibc-29e25f6f136182fb3756d51e03dea7c4d1919dd9.zip glibc-29e25f6f136182fb3756d51e03dea7c4d1919dd9.tar.gz glibc-29e25f6f136182fb3756d51e03dea7c4d1919dd9.tar.bz2 |
tests: fix warn unused results
With fortification enabled, few function calls return result need to be
checked, has they get the __wur macro enabled.
Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
Diffstat (limited to 'support/test-container.c')
-rw-r--r-- | support/test-container.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/support/test-container.c b/support/test-container.c index d4ca41f..008ced2 100644 --- a/support/test-container.c +++ b/support/test-container.c @@ -714,8 +714,8 @@ check_for_unshare_hints (int require_pidns) continue; val = -1; /* Sentinel. */ - fscanf (f, "%d", &val); - if (val != files[i].bad_value) + int cnt = fscanf (f, "%d", &val); + if (cnt == 1 && val != files[i].bad_value) continue; printf ("To enable test-container, please run this as root:\n"); |