From: Paul Chaignon Date: Sat, 21 Sep 2019 13:00:51 +0000 (+0200) Subject: tests: fix format warnings on x32 X-Git-Tag: v5.3~24 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=92ee9f0b83ce8c0d7801a12a37c3d5b635935fba;p=strace tests: fix format warnings on x32 The type of __X32_SYSCALL_BIT changed from int to unsigned long by Linux kernel commit v5.3-rc1-1-g45e29d119e9923ff14dfb840e3482bef1667bbfb. Consequently, __NR_* macros are now defined to values of an unsigned long integer type on x32. tests/prctl-seccomp-filter-v.c (PRINT_ALLOW_SYSCALL, PRINT_DENY_SYSCALL): Fix format warning. tests/seccomp-filter-v.c (PRINT_ALLOW_SYSCALL, PRINT_DENY_SYSCALL): Likewise. Signed-off-by: Paul Chaignon --- diff --git a/tests/prctl-seccomp-filter-v.c b/tests/prctl-seccomp-filter-v.c index 6e1affc0..61e0ae3c 100644 --- a/tests/prctl-seccomp-filter-v.c +++ b/tests/prctl-seccomp-filter-v.c @@ -43,14 +43,14 @@ BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL) # define PRINT_ALLOW_SYSCALL(nr) \ - printf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \ + printf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#lx, 0, 0x1), " \ "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), ", \ - __NR_ ## nr) + (long) __NR_ ## nr) # define PRINT_DENY_SYSCALL(nr, err) \ - printf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \ + printf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#lx, 0, 0x1), " \ "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|%#x), ", \ - __NR_ ## nr, err) + (long) __NR_ ## nr, err) static const struct sock_filter filter[] = { /* load syscall number */ diff --git a/tests/seccomp-filter-v.c b/tests/seccomp-filter-v.c index f3adce44..f8bd7834 100644 --- a/tests/seccomp-filter-v.c +++ b/tests/seccomp-filter-v.c @@ -43,14 +43,14 @@ BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL) # define PRINT_ALLOW_SYSCALL(nr) \ - tprintf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \ - "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), ", \ - __NR_ ## nr) + tprintf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#lx, 0, 0x1), " \ + "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), ", \ + (long) __NR_ ## nr) # define PRINT_DENY_SYSCALL(nr, err) \ - tprintf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \ - "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|%#x), ", \ - __NR_ ## nr, err) + tprintf("BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#lx, 0, 0x1), " \ + "BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|%#x), ", \ + (long) __NR_ ## nr, err) static const struct sock_filter filter_c[] = { /* load syscall number */