From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 44483EB3624 for ; Mon, 2 Mar 2026 20:36:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AC0006B00DF; Mon, 2 Mar 2026 15:36:05 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A73546B00E7; Mon, 2 Mar 2026 15:36:05 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 935F66B00E8; Mon, 2 Mar 2026 15:36:05 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 7FCE06B00DF for ; Mon, 2 Mar 2026 15:36:05 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 3D06C1C30F for ; Mon, 2 Mar 2026 20:36:05 +0000 (UTC) X-FDA: 84502279890.07.11150B5 Received: from sea.source.kernel.org (sea.source.kernel.org [172.234.252.31]) by imf21.hostedemail.com (Postfix) with ESMTP id 3EF2A1C0008 for ; Mon, 2 Mar 2026 20:36:03 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=REYuvFsD; spf=pass (imf21.hostedemail.com: domain of jlayton@kernel.org designates 172.234.252.31 as permitted sender) smtp.mailfrom=jlayton@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1772483763; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=GtBwFCmTOtYrZVX2ZfDd0HFcsutrtkdY7SKo4Y8xCEI=; b=FeaE6QCorQOYoDVqBeGVpdAhXy/Ah2JLN7TD6LyoLVQL6PT0KVmEK1bTKeop6XZmaUyrRt pIh3ODXWWf/umTJzxbBf0ESm3e4xP6VSa6mN6w8/1557hmd1mcViNYJ9jH7tCtZJpdT0kZ uGnf65D84jooWk02bNaEJGMDXOYgZRI= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1772483763; a=rsa-sha256; cv=none; b=qGUgwvhd7iBpXQzQTJ7FbnOzIn2ttQPxgUfcJfmNcRYhtTu6Iw+ijmtkpSfMct2SW+3dXm 98uGfNY1D4PhVrWDYisrb+DRU3rZzDaCnjTMAoJNwV04BcN54HwGUlfQQTUylHERhgjuK9 nEJ3dI51wfU6BCn/cPG6Qhbwt9i6HyA= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=REYuvFsD; spf=pass (imf21.hostedemail.com: domain of jlayton@kernel.org designates 172.234.252.31 as permitted sender) smtp.mailfrom=jlayton@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sea.source.kernel.org (Postfix) with ESMTP id 5491D43B42; Mon, 2 Mar 2026 20:36:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0873CC2BCB5; Mon, 2 Mar 2026 20:35:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772483762; bh=ERGVnc/eNvk3T/zuaFFuXcHD9EL1GuErviurDex5W4o=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=REYuvFsDDR+oxBK7+A0CfVNiADY41vFTKoKcokLx+U/4MauiWmR5IPgW1ys7G/NW0 loEvYpig71yLk0MwJ0ymDsMR98bBIpzDrWen0Tw54b7bCP/xbmKsKGfH9coaRp/18y Eo0H6ZGp5Ty/7F7rwpR4r+Hx2H0nZLg+fbnV+iiEv5zC6whurjOhbHJHY3KZ17yzlS XKpFn831tIVJfa3gRbLsfyQ4ot+jkdGNv2F60iwxRINAN0TQk+lIUPAd1iK7ktRn3M O0XnapSqAqCnsDUZsfqS8R2J6JsY/rdYoLvxzMnEaMALXPuXaWeiy70Wdi10ERpMSm X3mDLx+Xd6KIw== From: Jeff Layton Date: Mon, 02 Mar 2026 15:24:30 -0500 Subject: [PATCH v2 046/110] udf: use PRIino format for i_ino MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20260302-iino-u64-v2-46-e5388800dae0@kernel.org> References: <20260302-iino-u64-v2-0-e5388800dae0@kernel.org> In-Reply-To: <20260302-iino-u64-v2-0-e5388800dae0@kernel.org> To: Alexander Viro , Christian Brauner , Jan Kara , Steven Rostedt , Masami Hiramatsu , Mathieu Desnoyers , Dan Williams , Matthew Wilcox , Eric Biggers , "Theodore Y. Ts'o" , Muchun Song , Oscar Salvador , David Hildenbrand , David Howells , Paulo Alcantara , Andreas Dilger , Jan Kara , Jaegeuk Kim , Chao Yu , Trond Myklebust , Anna Schumaker , Chuck Lever , NeilBrown , Olga Kornievskaia , Dai Ngo , Tom Talpey , Steve French , Ronnie Sahlberg , Shyam Prasad N , Bharath SM , Alexander Aring , Ryusuke Konishi , Viacheslav Dubeyko , Eric Van Hensbergen , Latchesar Ionkov , Dominique Martinet , Christian Schoenebeck , David Sterba , Marc Dionne , Ian Kent , Luis de Bethencourt , Salah Triki , "Tigran A. Aivazian" , Ilya Dryomov , Alex Markuze , Jan Harkes , coda@cs.cmu.edu, Nicolas Pitre , Tyler Hicks , Amir Goldstein , Christoph Hellwig , John Paul Adrian Glaubitz , Yangtao Li , Mikulas Patocka , David Woodhouse , Richard Weinberger , Dave Kleikamp , Konstantin Komarov , Mark Fasheh , Joel Becker , Joseph Qi , Mike Marshall , Martin Brandenburg , Miklos Szeredi , Anders Larsen , Zhihao Cheng , Damien Le Moal , Naohiro Aota , Johannes Thumshirn , John Johansen , Paul Moore , James Morris , "Serge E. Hallyn" , Mimi Zohar , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Fan Wu , Stephen Smalley , Ondrej Mosnacek , Casey Schaufler , Alex Deucher , =?utf-8?q?Christian_K=C3=B6nig?= , David Airlie , Simona Vetter , Sumit Semwal , Eric Dumazet , Kuniyuki Iwashima , Paolo Abeni , Willem de Bruijn , "David S. Miller" , Jakub Kicinski , Simon Horman , Oleg Nesterov , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , James Clark , "Darrick J. Wong" , Martin Schiller , Eric Paris , Joerg Reuter , Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz , Oliver Hartkopp , Marc Kleine-Budde , David Ahern , Neal Cardwell , Steffen Klassert , Herbert Xu , Remi Denis-Courmont , Marcelo Ricardo Leitner , Xin Long , Magnus Karlsson , Maciej Fijalkowski , Stanislav Fomichev , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, nvdimm@lists.linux.dev, fsverity@lists.linux.dev, linux-mm@kvack.org, netfs@lists.linux.dev, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-nilfs@vger.kernel.org, v9fs@lists.linux.dev, linux-afs@lists.infradead.org, autofs@vger.kernel.org, ceph-devel@vger.kernel.org, codalist@coda.cs.cmu.edu, ecryptfs@vger.kernel.org, linux-mtd@lists.infradead.org, jfs-discussion@lists.sourceforge.net, ntfs3@lists.linux.dev, ocfs2-devel@lists.linux.dev, devel@lists.orangefs.org, linux-unionfs@vger.kernel.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, netdev@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-xfs@vger.kernel.org, linux-hams@vger.kernel.org, linux-x25@vger.kernel.org, audit@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-can@vger.kernel.org, linux-sctp@vger.kernel.org, bpf@vger.kernel.org, Jeff Layton X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=openpgp-sha256; l=9467; i=jlayton@kernel.org; h=from:subject:message-id; bh=ERGVnc/eNvk3T/zuaFFuXcHD9EL1GuErviurDex5W4o=; b=owEBbQKS/ZANAwAKAQAOaEEZVoIVAcsmYgBppfH7+07vkyyUMJ8L7y9+mlPY4jMzb+NyG+v/R pgBoyVgEcOJAjMEAAEKAB0WIQRLwNeyRHGyoYTq9dMADmhBGVaCFQUCaaXx+wAKCRAADmhBGVaC FfZHEADJ/fjGrDSfQhhbluCM8cNtkizM9fG4iQpD1GJd8F6pckX2OF3puZnuhvDvkJx1GrSQGpf QW/yi7pUzSsl5pmkzn8cPf0XOVnw/HrW30iy7qftMlY1u4pe2cGXaxj9L5mEwIF3RaXpFvqiU45 812ILv/xFfAB+tE0lLgn8azq/WMlHUpMUdDxjKutRWykRDMjdYLNd7xsS1Iv/C4J3qmMZGBCPhW oJ4fdndEf8wcBjyb2ZakJRWtI5/6KqcytqeHHnC3Hf8MxGbSEoxP+U+AfYMb6Up7xG4/BZJIoqu NH0S4x6NhuPkIz7iKLoyYpNPaCfjTBfW32smIeAFg1dmNWBaSxFLsp7I1sW9MCTU7GjwT3kJB0e RqzRBjmuIMay1eqHOGoO3jQAhchsuDJ/RKxnWofZPYIQQAKLDB+w4DwT6sAHBFBtJt3Pog1XFGw 0fFbFLdIOZhBnJoWN6O2n+BW8auYit7amRfHOQcyREVzZhFGjJdwruGm0vXmoCfUMBgecY1Josh 1sot2IriM7ar0A+xdl7wMN74Fer508nUbS76dwwBz+KNC8OTHje4X5uWQXE/XzBqXWeuFRgYK6E qTaGyUMzpjWB2HiLSpxSKYcyu6wLbgTYgBtGNMo2HR2W4GR5ZXkfdtWbSGi6w3i4eZ2BwxyF6NW i6WIlbxHST3GYpA== X-Developer-Key: i=jlayton@kernel.org; a=openpgp; fpr=4BC0D7B24471B2A184EAF5D3000E684119568215 X-Stat-Signature: ztaocjwefwztbd8zamoo7gimz3yak4s3 X-Rspam-User: X-Rspamd-Queue-Id: 3EF2A1C0008 X-Rspamd-Server: rspam12 X-HE-Tag: 1772483763-773327 X-HE-Meta: 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 bbbor8LR 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 dDxZyO+N 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 VFi664ih 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 CsfwcIhu 60BSpPSNzfThvtmlI5rG/wkrPS5a3FjHni0Xzhi1LOIvsTgHtNYXTj2xr2DlAxwWQW6Zmh2w2lJkpZra9T2CSmBO5vRzWd0OutsHXsRU+fanpf8IlV1e+1/fbiHUbUZnGp6ZyiD2+bceU84KbfOn5By6gWh5RKqHc78HieadaSwNHfZhbm7LTSy2FjpSF4mgZlF0VjWBCK/LL3OPwuUUiuWEy7nVFacziegjfUbE2c+azGDuQdgsVTAL9hsII0dBQTA58a1G4hOlyWzIH6alMZRN7piQTXOcQURjWOdKDopwNtDBrekhIRfuo4SY1gxGCwzKET/qEuGCzfxILB7PAzPOGNhLC6HMk= Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Convert udf i_ino format strings to use the PRIino format macro in preparation for the widening of i_ino via kino_t. Signed-off-by: Jeff Layton --- fs/udf/directory.c | 18 +++++++++--------- fs/udf/file.c | 2 +- fs/udf/inode.c | 12 ++++++------ fs/udf/namei.c | 8 ++++---- fs/udf/super.c | 2 +- 5 files changed, 21 insertions(+), 21 deletions(-) diff --git a/fs/udf/directory.c b/fs/udf/directory.c index 632453aa38934a0b58b420717ec0674c85627ce5..c825e11c017f652500a3dfc83905679ef86ec570 100644 --- a/fs/udf/directory.c +++ b/fs/udf/directory.c @@ -22,7 +22,7 @@ static int udf_verify_fi(struct udf_fileident_iter *iter) if (iter->fi.descTag.tagIdent != cpu_to_le16(TAG_IDENT_FID)) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has entry at pos %llu with incorrect tag %x\n", + "directory (ino %" PRIino "u) has entry at pos %llu with incorrect tag %x\n", iter->dir->i_ino, (unsigned long long)iter->pos, le16_to_cpu(iter->fi.descTag.tagIdent)); return -EFSCORRUPTED; @@ -30,7 +30,7 @@ static int udf_verify_fi(struct udf_fileident_iter *iter) len = udf_dir_entry_len(&iter->fi); if (le16_to_cpu(iter->fi.lengthOfImpUse) & 3) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has entry at pos %llu with unaligned length of impUse field\n", + "directory (ino %" PRIino "u) has entry at pos %llu with unaligned length of impUse field\n", iter->dir->i_ino, (unsigned long long)iter->pos); return -EFSCORRUPTED; } @@ -41,20 +41,20 @@ static int udf_verify_fi(struct udf_fileident_iter *iter) */ if (len > 1 << iter->dir->i_blkbits) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has too big (%u) entry at pos %llu\n", + "directory (ino %" PRIino "u) has too big (%u) entry at pos %llu\n", iter->dir->i_ino, len, (unsigned long long)iter->pos); return -EFSCORRUPTED; } if (iter->pos + len > iter->dir->i_size) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has entry past directory size at pos %llu\n", + "directory (ino %" PRIino "u) has entry past directory size at pos %llu\n", iter->dir->i_ino, (unsigned long long)iter->pos); return -EFSCORRUPTED; } if (udf_dir_entry_len(&iter->fi) != sizeof(struct tag) + le16_to_cpu(iter->fi.descTag.descCRCLength)) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has entry where CRC length (%u) does not match entry length (%u)\n", + "directory (ino %" PRIino "u) has entry where CRC length (%u) does not match entry length (%u)\n", iter->dir->i_ino, (unsigned)le16_to_cpu(iter->fi.descTag.descCRCLength), (unsigned)(udf_dir_entry_len(&iter->fi) - @@ -78,7 +78,7 @@ static int udf_copy_fi(struct udf_fileident_iter *iter) } if (iter->dir->i_size < iter->pos + sizeof(struct fileIdentDesc)) { udf_err(iter->dir->i_sb, - "directory (ino %lu) has entry straddling EOF\n", + "directory (ino %" PRIino "u) has entry straddling EOF\n", iter->dir->i_ino); return -EFSCORRUPTED; } @@ -184,7 +184,7 @@ static int udf_fiiter_advance_blk(struct udf_fileident_iter *iter) return 0; } udf_err(iter->dir->i_sb, - "extent after position %llu not allocated in directory (ino %lu)\n", + "extent after position %llu not allocated in directory (ino %" PRIino "u)\n", (unsigned long long)iter->pos, iter->dir->i_ino); return -EFSCORRUPTED; } @@ -272,7 +272,7 @@ int udf_fiiter_init(struct udf_fileident_iter *iter, struct inode *dir, if (pos == dir->i_size) return 0; udf_err(dir->i_sb, - "position %llu not allocated in directory (ino %lu)\n", + "position %llu not allocated in directory (ino %" PRIino "u)\n", (unsigned long long)pos, dir->i_ino); err = -EFSCORRUPTED; goto out; @@ -483,7 +483,7 @@ int udf_fiiter_append_blk(struct udf_fileident_iter *iter) &iter->loffset, &etype); if (err <= 0 || etype != (EXT_RECORDED_ALLOCATED >> 30)) { udf_err(iter->dir->i_sb, - "block %llu not allocated in directory (ino %lu)\n", + "block %llu not allocated in directory (ino %" PRIino "u)\n", (unsigned long long)block, iter->dir->i_ino); return -EFSCORRUPTED; } diff --git a/fs/udf/file.c b/fs/udf/file.c index 32ae7cfd72c549958b70824b449cf146f6750f44..ab8093b87dc8f21ce8af6a72621e2868fb4b9a82 100644 --- a/fs/udf/file.c +++ b/fs/udf/file.c @@ -133,7 +133,7 @@ long udf_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) int result; if (file_permission(filp, MAY_READ) != 0) { - udf_debug("no permission to access inode %lu\n", inode->i_ino); + udf_debug("no permission to access inode %" PRIino "u\n", inode->i_ino); return -EPERM; } diff --git a/fs/udf/inode.c b/fs/udf/inode.c index 7fae8002344a0e1e7e51022e97f1e0e2424185f9..ecc22aded0d287ccdfb34b42a0d82e392054f585 100644 --- a/fs/udf/inode.c +++ b/fs/udf/inode.c @@ -147,7 +147,7 @@ void udf_evict_inode(struct inode *inode) if (iinfo->i_alloc_type != ICBTAG_FLAG_AD_IN_ICB && inode->i_size != iinfo->i_lenExtents) { udf_warn(inode->i_sb, - "Inode %lu (mode %o) has inode size %llu different from extent length %llu. Filesystem need not be standards compliant.\n", + "Inode %" PRIino "u (mode %o) has inode size %llu different from extent length %llu. Filesystem need not be standards compliant.\n", inode->i_ino, inode->i_mode, (unsigned long long)inode->i_size, (unsigned long long)iinfo->i_lenExtents); @@ -1386,13 +1386,13 @@ static int udf_read_inode(struct inode *inode, bool hidden_inode) */ bh = udf_read_ptagged(inode->i_sb, iloc, 0, &ident); if (!bh) { - udf_err(inode->i_sb, "(ino %lu) failed !bh\n", inode->i_ino); + udf_err(inode->i_sb, "(ino %" PRIino "u) failed !bh\n", inode->i_ino); return -EIO; } if (ident != TAG_IDENT_FE && ident != TAG_IDENT_EFE && ident != TAG_IDENT_USE) { - udf_err(inode->i_sb, "(ino %lu) failed ident=%u\n", + udf_err(inode->i_sb, "(ino %" PRIino "u) failed ident=%u\n", inode->i_ino, ident); goto out; } @@ -1641,7 +1641,7 @@ static int udf_read_inode(struct inode *inode, bool hidden_inode) udf_debug("METADATA BITMAP FILE-----\n"); break; default: - udf_err(inode->i_sb, "(ino %lu) failed unknown file type=%u\n", + udf_err(inode->i_sb, "(ino %" PRIino "u) failed unknown file type=%u\n", inode->i_ino, fe->icbTag.fileType); goto out; } @@ -1942,7 +1942,7 @@ static int udf_update_inode(struct inode *inode, int do_sync) if (do_sync) { sync_dirty_buffer(bh); if (buffer_write_io_error(bh)) { - udf_warn(inode->i_sb, "IO error syncing udf inode [%08lx]\n", + udf_warn(inode->i_sb, "IO error syncing udf inode [%08" PRIino "x]\n", inode->i_ino); err = -EIO; } @@ -2224,7 +2224,7 @@ int udf_next_aext(struct inode *inode, struct extent_position *epos, if (++indirections > UDF_MAX_INDIR_EXTS) { udf_err(inode->i_sb, - "too many indirect extents in inode %lu\n", + "too many indirect extents in inode %" PRIino "u\n", inode->i_ino); return -EFSCORRUPTED; } diff --git a/fs/udf/namei.c b/fs/udf/namei.c index 5f2e9a892bffa9579143cedf71d80efa7ad6e9fb..32209549a31f451a486918e673a41497bef42e89 100644 --- a/fs/udf/namei.c +++ b/fs/udf/namei.c @@ -550,7 +550,7 @@ static int udf_unlink(struct inode *dir, struct dentry *dentry) goto end_unlink; if (!inode->i_nlink) { - udf_debug("Deleting nonexistent file (%lu), %u\n", + udf_debug("Deleting nonexistent file (%" PRIino "u), %u\n", inode->i_ino, inode->i_nlink); set_nlink(inode, 1); } @@ -809,7 +809,7 @@ static int udf_rename(struct mnt_idmap *idmap, struct inode *old_dir, &diriter); if (retval == -ENOENT) { udf_err(old_inode->i_sb, - "directory (ino %lu) has no '..' entry\n", + "directory (ino %" PRIino "u) has no '..' entry\n", old_inode->i_ino); retval = -EFSCORRUPTED; } @@ -821,7 +821,7 @@ static int udf_rename(struct mnt_idmap *idmap, struct inode *old_dir, old_dir->i_ino) { retval = -EFSCORRUPTED; udf_err(old_inode->i_sb, - "directory (ino %lu) has parent entry pointing to another inode (%lu != %u)\n", + "directory (ino %" PRIino "u) has parent entry pointing to another inode (%" PRIino "u != %u)\n", old_inode->i_ino, old_dir->i_ino, udf_get_lb_pblock(old_inode->i_sb, &tloc, 0)); goto out_oiter; @@ -869,7 +869,7 @@ static int udf_rename(struct mnt_idmap *idmap, struct inode *old_dir, retval = udf_fiiter_find_entry(old_dir, &old_dentry->d_name, &oiter); if (retval) { udf_err(old_dir->i_sb, - "failed to find renamed entry again in directory (ino %lu)\n", + "failed to find renamed entry again in directory (ino %" PRIino "u)\n", old_dir->i_ino); } else { udf_fiiter_delete_entry(&oiter); diff --git a/fs/udf/super.c b/fs/udf/super.c index 27f463fd1d89e8ae4844cd70c291d737aee1589e..c6e372d573885742745d3ff4b3b017facf228a32 100644 --- a/fs/udf/super.c +++ b/fs/udf/super.c @@ -1166,7 +1166,7 @@ static int udf_fill_partdesc_info(struct super_block *sb, } map->s_uspace.s_table = inode; map->s_partition_flags |= UDF_PART_FLAG_UNALLOC_TABLE; - udf_debug("unallocSpaceTable (part %d) @ %lu\n", + udf_debug("unallocSpaceTable (part %d) @ %" PRIino "u\n", p_index, map->s_uspace.s_table->i_ino); } -- 2.53.0