From 8f3e59803fbbea833d849a8d982e446860b06fd0 Mon Sep 17 00:00:00 2001 From: weishu Date: Mon, 22 May 2023 10:39:54 +0800 Subject: [PATCH] kernel: fix format warnning --- kernel/allowlist.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/kernel/allowlist.c b/kernel/allowlist.c index 31afd183..2a76a1b0 100644 --- a/kernel/allowlist.c +++ b/kernel/allowlist.c @@ -126,7 +126,7 @@ void do_persistent_allow_list(struct work_struct *work) filp_open(KERNEL_SU_ALLOWLIST, O_WRONLY | O_CREAT, 0644); if (IS_ERR(fp)) { - pr_err("save_allow_list creat file failed: %d\n", PTR_ERR(fp)); + pr_err("save_allow_list creat file failed: %ld\n", PTR_ERR(fp)); return; } @@ -173,11 +173,11 @@ void do_load_allow_list(struct work_struct *work) ksu_allow_uid(2000, true, true); // allow adb shell by default } else { - pr_err("load_allow_list open file failed: %d\n", + pr_err("load_allow_list open file failed: %ld\n", PTR_ERR(fp)); } #else - pr_err("load_allow_list open file failed: %d\n", PTR_ERR(fp)); + pr_err("load_allow_list open file failed: %ld\n", PTR_ERR(fp)); #endif return; } @@ -202,7 +202,7 @@ void do_load_allow_list(struct work_struct *work) bool allow = false; ret = ksu_kernel_read_compat(fp, &uid, sizeof(uid), &off); if (ret <= 0) { - pr_info("load_allow_list read err: %d\n", ret); + pr_info("load_allow_list read err: %zd\n", ret); break; } ret = ksu_kernel_read_compat(fp, &allow, sizeof(allow), &off);