Convert fscrypt i_ino format strings to use the PRIino format macro in
preparation for the widening of i_ino via kino_t.  Also change the
temporary variable in check_for_busy_inodes() to be kino_t in
preparation of the same change.

Signed-off-by: Jeff Layton <[email protected]>
---
 fs/crypto/crypto.c   | 2 +-
 fs/crypto/hooks.c    | 2 +-
 fs/crypto/keyring.c  | 4 ++--
 fs/crypto/keysetup.c | 2 +-
 4 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/fs/crypto/crypto.c b/fs/crypto/crypto.c
index 
07f9cbfe3ea4115b8fcc881ae5154b3c3e898c04..4fc2990642fd3ee385a9919183cbb0f1c5ba6a58
 100644
--- a/fs/crypto/crypto.c
+++ b/fs/crypto/crypto.c
@@ -365,7 +365,7 @@ void fscrypt_msg(const struct inode *inode, const char 
*level,
        vaf.fmt = fmt;
        vaf.va = &args;
        if (inode && inode->i_ino)
-               printk("%sfscrypt (%s, inode %lu): %pV\n",
+               printk("%sfscrypt (%s, inode %" PRIino "u): %pV\n",
                       level, inode->i_sb->s_id, inode->i_ino, &vaf);
        else if (inode)
                printk("%sfscrypt (%s): %pV\n", level, inode->i_sb->s_id, &vaf);
diff --git a/fs/crypto/hooks.c b/fs/crypto/hooks.c
index 
b97de0d1430fd6ec764f4a758dffe00263496118..f41809f1f1ed0b1ed78b85a4a987ec9e6cbcfa9d
 100644
--- a/fs/crypto/hooks.c
+++ b/fs/crypto/hooks.c
@@ -62,7 +62,7 @@ int fscrypt_file_open(struct inode *inode, struct file *filp)
        dentry_parent = dget_parent(dentry);
        if (!fscrypt_has_permitted_context(d_inode(dentry_parent), inode)) {
                fscrypt_warn(inode,
-                            "Inconsistent encryption context (parent 
directory: %lu)",
+                            "Inconsistent encryption context (parent 
directory: %" PRIino "u)",
                             d_inode(dentry_parent)->i_ino);
                err = -EPERM;
        }
diff --git a/fs/crypto/keyring.c b/fs/crypto/keyring.c
index 
9ec6e5ef0947eff394166d8af438a808cc8a4b2b..c0a2568a88cf6318877dec0f5379c5c8511c00f8
 100644
--- a/fs/crypto/keyring.c
+++ b/fs/crypto/keyring.c
@@ -969,8 +969,8 @@ static int check_for_busy_inodes(struct super_block *sb,
 {
        struct list_head *pos;
        size_t busy_count = 0;
-       unsigned long ino;
        char ino_str[50] = "";
+       kino_t ino;
 
        spin_lock(&mk->mk_decrypted_inodes_lock);
 
@@ -994,7 +994,7 @@ static int check_for_busy_inodes(struct super_block *sb,
 
        /* If the inode is currently being created, ino may still be 0. */
        if (ino)
-               snprintf(ino_str, sizeof(ino_str), ", including ino %lu", ino);
+               snprintf(ino_str, sizeof(ino_str), ", including ino %" PRIino 
"u", ino);
 
        fscrypt_warn(NULL,
                     "%s: %zu inode(s) still busy after removing key with %s 
%*phN%s",
diff --git a/fs/crypto/keysetup.c b/fs/crypto/keysetup.c
index 
40fa05688d3a1d4aa33d29e9508441faf4bca933..b30630f2c6a4e341c72af0db6aa173f59f742fa1
 100644
--- a/fs/crypto/keysetup.c
+++ b/fs/crypto/keysetup.c
@@ -91,7 +91,7 @@ select_encryption_mode(const union fscrypt_policy *policy,
        if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode))
                return &fscrypt_modes[fscrypt_policy_fnames_mode(policy)];
 
-       WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for 
inode %lu, which is not encryptable (file type %d)\n",
+       WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for 
inode %" PRIino "u, which is not encryptable (file type %d)\n",
                  inode->i_ino, (inode->i_mode & S_IFMT));
        return ERR_PTR(-EINVAL);
 }

-- 
2.53.0


Reply via email to