Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4215470ybl; Mon, 13 Jan 2020 09:46:08 -0800 (PST) X-Google-Smtp-Source: APXvYqxpFksjvRHkkZRIjt4ZQ8froptgSOMmbW4Ua7b2aQLeHuOc+8jRY9Ds8efTIU5l14TqFBq8 X-Received: by 2002:a05:6830:1f19:: with SMTP id u25mr14452412otg.170.1578937568234; Mon, 13 Jan 2020 09:46:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578937568; cv=none; d=google.com; s=arc-20160816; b=WIfWTuB7PiZoM7RYkOYActZGySNZ22DQEZvSFBJoQTAHoxD344BflpKURCiad6DVWp rqYYKm5I6J5WCA1XavQ7blXW86L4A6W4hX3kvUIbROMKiv7DP7SD2mwKcW+MFp5SHs06 QYDho2WXHBypMceaDylHF+Wl42o507nrCPwDhqQK2+zLHwXUjz24xOoBDRRJr5wdqpr9 awZ+BKjyphvvQuVeZyfBwhAcT6oXr6x4nMZHHaQvLX0j6BeU6krgTGJfeXm9Ew6qFAL3 DGylnOt26hlujVrkbCnrDYLABjig7y84mKeq/oWqGZ7RP772AwJO/kfNHwqeU2XvBS/q 8wiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=cLTpqhoGPr9SQ8acRvogAJqWfCnJhLY3jhTXml/SSIM=; b=whKGwbV2FdJwzxolyMzM5ajCvaSlwpzihJtXeCTYmwdUG5DdkwelHTcwHHszRSuG0Z VLoTh8pm1TJTs59HYv7H7kH9w2PCf2d9MJRywAQx/mYDzbe3DU7wYsVKgIyZwwjLihD8 PIQbiCqovx5bjBtDE19hWMWC/Byx4CXOEtRZW6wp7AdX7E37/0wi34Mi6j+tUFvipChf 9T7FsQdr9vRfOFIs91L/PbqxNmrvOLDXKojktI5nEj77L9eY3ObUFUAgk74QUeQMilMR rptQWRSjYKqlezRhgoZkiQY4UvBPCiuLijZq1NbVyZSTs498YprXvm5NWRKxVu+RMFim 2G8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b4si6230938oib.70.2020.01.13.09.45.55; Mon, 13 Jan 2020 09:46:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728641AbgAMRo6 (ORCPT + 99 others); Mon, 13 Jan 2020 12:44:58 -0500 Received: from relay8-d.mail.gandi.net ([217.70.183.201]:35497 "EHLO relay8-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726109AbgAMRo6 (ORCPT ); Mon, 13 Jan 2020 12:44:58 -0500 X-Originating-IP: 84.44.14.226 Received: from nexussix.ar.arcelik (unknown [84.44.14.226]) (Authenticated sender: cengiz@kernel.wtf) by relay8-d.mail.gandi.net (Postfix) with ESMTPSA id AE1D91BF206; Mon, 13 Jan 2020 17:44:55 +0000 (UTC) From: Cengiz Can To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo Cc: linux-kernel@vger.kernel.org, Cengiz Can Subject: [PATCH] tools: perf: fix augmented syscall format warning Date: Mon, 13 Jan 2020 20:44:39 +0300 Message-Id: <20200113174438.102975-1-cengiz@kernel.wtf> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org sockaddr related examples given in `tools/perf/examples/bpf/augmented_syscalls.c` almost always use `long`s to represent most of their fields. However, `size_t syscall_arg__scnprintf_sockaddr(..)` has a `scnprintf` call that uses `"%#x"` as format string. This throws a warning (whenever the syscall argument is `unsigned long`). Added `l` identifier to indicate that the `arg->value` is an unsigned long. Not sure about the complications of this with x86 though. Signed-off-by: Cengiz Can --- tools/perf/trace/beauty/sockaddr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/perf/trace/beauty/sockaddr.c b/tools/perf/trace/beauty/sockaddr.c index 173c8f760763..e0c13e6a5788 100644 --- a/tools/perf/trace/beauty/sockaddr.c +++ b/tools/perf/trace/beauty/sockaddr.c @@ -72,5 +72,5 @@ size_t syscall_arg__scnprintf_sockaddr(char *bf, size_t size, struct syscall_arg if (arg->augmented.args) return syscall_arg__scnprintf_augmented_sockaddr(arg, bf, size); - return scnprintf(bf, size, "%#x", arg->val); + return scnprintf(bf, size, "%#lx", arg->val); } -- 2.24.1