From: Jakub Kicinski <jakub.kicinski@netronome.com>
Date: Fri, 15 Dec 2017 10:39:31 -0800
Subject: nfp: bpf: correct printk formats for size_t
Patch-mainline: v4.16-rc1
Git-commit: 0bce7c9a607f1dbf8d83dd2865e1657096dbce59
References: bsc#1109837
Build bot reported warning about invalid printk formats on 32bit
architectures. Use %zu for size_t and %zd ptr diff.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Thomas Bogendoerfer <tbogendoerfer@suse.de>
---
drivers/net/ethernet/netronome/nfp/bpf/main.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- a/drivers/net/ethernet/netronome/nfp/bpf/main.c
+++ b/drivers/net/ethernet/netronome/nfp/bpf/main.c
@@ -235,7 +235,7 @@ static int nfp_bpf_parse_capabilities(st
}
}
if (mem - start != nfp_cpp_area_size(area)) {
- nfp_err(cpp, "BPF capabilities left after parsing, parsed:%lu total length:%lu\n",
+ nfp_err(cpp, "BPF capabilities left after parsing, parsed:%zd total length:%zu\n",
mem - start, nfp_cpp_area_size(area));
goto err_release_free;
}
@@ -245,7 +245,7 @@ static int nfp_bpf_parse_capabilities(st
return 0;
err_release_free:
- nfp_err(cpp, "invalid BPF capabilities at offset:%ld\n", mem - start);
+ nfp_err(cpp, "invalid BPF capabilities at offset:%zd\n", mem - start);
nfp_cpp_area_release_free(area);
return -EINVAL;
}