Now that i_ino is u64 and the PRIino format macro has been removed,
replace all uses in fscrypt with the concrete format strings.

Signed-off-by: Jeff Layton <[email protected]>
---
 fs/crypto/crypto.c   | 2 +-
 fs/crypto/hooks.c    | 2 +-
 fs/crypto/keyring.c  | 4 ++--
 fs/crypto/keysetup.c | 2 +-
 4 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/fs/crypto/crypto.c b/fs/crypto/crypto.c
index 
4fc2990642fd3ee385a9919183cbb0f1c5ba6a58..570a2231c945a6c649cf8dc3b457f0b55657e0c3
 100644
--- a/fs/crypto/crypto.c
+++ b/fs/crypto/crypto.c
@@ -365,7 +365,7 @@ void fscrypt_msg(const struct inode *inode, const char 
*level,
        vaf.fmt = fmt;
        vaf.va = &args;
        if (inode && inode->i_ino)
-               printk("%sfscrypt (%s, inode %" PRIino "u): %pV\n",
+               printk("%sfscrypt (%s, inode %llu): %pV\n",
                       level, inode->i_sb->s_id, inode->i_ino, &vaf);
        else if (inode)
                printk("%sfscrypt (%s): %pV\n", level, inode->i_sb->s_id, &vaf);
diff --git a/fs/crypto/hooks.c b/fs/crypto/hooks.c
index 
f41809f1f1ed0b1ed78b85a4a987ec9e6cbcfa9d..a7a8a3f581a0460537f5ff955bc8b5d30573a033
 100644
--- a/fs/crypto/hooks.c
+++ b/fs/crypto/hooks.c
@@ -62,7 +62,7 @@ int fscrypt_file_open(struct inode *inode, struct file *filp)
        dentry_parent = dget_parent(dentry);
        if (!fscrypt_has_permitted_context(d_inode(dentry_parent), inode)) {
                fscrypt_warn(inode,
-                            "Inconsistent encryption context (parent 
directory: %" PRIino "u)",
+                            "Inconsistent encryption context (parent 
directory: %llu)",
                             d_inode(dentry_parent)->i_ino);
                err = -EPERM;
        }
diff --git a/fs/crypto/keyring.c b/fs/crypto/keyring.c
index 
c0a2568a88cf6318877dec0f5379c5c8511c00f8..be8e6e8011f2131f2908da746a37d33fd5295122
 100644
--- a/fs/crypto/keyring.c
+++ b/fs/crypto/keyring.c
@@ -970,7 +970,7 @@ static int check_for_busy_inodes(struct super_block *sb,
        struct list_head *pos;
        size_t busy_count = 0;
        char ino_str[50] = "";
-       kino_t ino;
+       u64 ino;
 
        spin_lock(&mk->mk_decrypted_inodes_lock);
 
@@ -994,7 +994,7 @@ static int check_for_busy_inodes(struct super_block *sb,
 
        /* If the inode is currently being created, ino may still be 0. */
        if (ino)
-               snprintf(ino_str, sizeof(ino_str), ", including ino %" PRIino 
"u", ino);
+               snprintf(ino_str, sizeof(ino_str), ", including ino %llu", ino);
 
        fscrypt_warn(NULL,
                     "%s: %zu inode(s) still busy after removing key with %s 
%*phN%s",
diff --git a/fs/crypto/keysetup.c b/fs/crypto/keysetup.c
index 
b30630f2c6a4e341c72af0db6aa173f59f742fa1..df58ca4a5e3cb1df94e2f08e3f3b093c33368993
 100644
--- a/fs/crypto/keysetup.c
+++ b/fs/crypto/keysetup.c
@@ -91,7 +91,7 @@ select_encryption_mode(const union fscrypt_policy *policy,
        if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode))
                return &fscrypt_modes[fscrypt_policy_fnames_mode(policy)];
 
-       WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for 
inode %" PRIino "u, which is not encryptable (file type %d)\n",
+       WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for 
inode %llu, which is not encryptable (file type %d)\n",
                  inode->i_ino, (inode->i_mode & S_IFMT));
        return ERR_PTR(-EINVAL);
 }

-- 
2.53.0


Reply via email to