From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 648E3EDEBE1 for ; Tue, 3 Mar 2026 18:06:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id CA1606B0088; Tue, 3 Mar 2026 13:06:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id C79BA6B0089; Tue, 3 Mar 2026 13:06:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B447C6B008A; Tue, 3 Mar 2026 13:06:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id A04146B0088 for ; Tue, 3 Mar 2026 13:06:35 -0500 (EST) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 482041B72AB for ; Tue, 3 Mar 2026 18:06:35 +0000 (UTC) X-FDA: 84505531950.19.CE46844 Received: from sonic311-30.consmr.mail.ne1.yahoo.com (sonic311-30.consmr.mail.ne1.yahoo.com [66.163.188.211]) by imf28.hostedemail.com (Postfix) with ESMTP id F171DC0008 for ; Tue, 3 Mar 2026 18:06:32 +0000 (UTC) Authentication-Results: imf28.hostedemail.com; dkim=pass header.d=yahoo.com header.s=s2048 header.b=dJygi75l ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1772561193; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=KjlUdjsOzm6pJry5XKEK2Wx6SVd9EaVKNafYPkrR4Uc=; b=Uiti3JjpE52aqI1RQXNybp7s5j503yBprlbWQ6f/DBtpPwhv7Ji7/JJ8qpf2Fn3jQ5stxG Xy5nbQbAXXLpiW4FK87+test0DUyHT0v8ebIKYAtwuBuXgTSd4h4blwh7hKVTEYowXocDZ j1VVmTopvDz4PFdkbNoKH3LkLpjsr80= ARC-Authentication-Results: i=1; imf28.hostedemail.com; dkim=pass header.d=yahoo.com header.s=s2048 header.b=dJygi75l; spf=none (imf28.hostedemail.com: domain of casey@schaufler-ca.com has no SPF policy when checking 66.163.188.211) smtp.mailfrom=casey@schaufler-ca.com; dmarc=none ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1772561193; a=rsa-sha256; cv=none; b=sBBi18MQQ5rIxhfPMFG/GYdi0HJUOI6IXxZM75SVL2zP/3sGtRU4iQByrj+hFbpXqk1T6P Ng71OZXVRa+sloaATjyHYDg+Mtg4l0mUjpsGO0W7XB91SruoNGfFWHK51LGHo13zCiRbcR LZF1iqeL8h3cg/YSRQjczpNTLWFlPzc= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1772561191; bh=KjlUdjsOzm6pJry5XKEK2Wx6SVd9EaVKNafYPkrR4Uc=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=dJygi75lVKA43mVnaQwlBdfPAVdSis4jB5h3GrfRWjcs/eV+bjGnEl73Q1CkoLMfSAxuUxYWAgMHD/+ZMhEF8C/DvNjwgvm+IYU3QS+8vsQGMOvByOqQP7MjwgXU9nHznZlARxHB6CWUkkDiTVAq6T0ThlEqpJGZwSgJa+9GQo48tNjzsUCT7hSn96E3O6ItiyT22PKmVkcFCjTP0t6pfAE65VAnUDtzubQ0UAqSwQ6gk353h/MTAU/J5NqOQCiBWAIVfKkaZNzyYor20+PsN0xDvEqLDrQ9ywG7X0zbI1ztYyl5GKSDHETWf2rcE9rUFeZvn56NFy0s1fVLbgQkvw== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1772561191; bh=uiQpYOQ/+Be/Kyo9JbtDjh7SRSLZbCKMFxcEEhPL+gi=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=rmImhLtSV9rlGseo/NbhlSTfiqxJpx4YkQXN/i+eSzm20eNReczfpaCwUQz7V4t386mMOu4OQeLSiXRvZiFw09ltUikZPDvvXvWkO+k2MMxREQzzk2+CWKN4qX2sndFqFXR+nG0cXUKMCm8b10yV0r2BPnBsXwlxMabcoBt7qjs5TpMBd0P/81eokKunTjlCxVrUhFh86xx0vosMy/2BCyeGxv00Rd+RsxYmjHwbbMrv8h0leiJ23ZOyRA1Kjn5a9GZ262ozKNmyJFrGNoVOl3XRezYLaJEvgkOq6e+NauKqsggJamHCc2At8O5VAFnIlAj2albbhQL8+v96tWUPlA== X-YMail-OSG: 6qEKZb4VM1mOPvHn7Uky8BLhsENz.Nyl5rO4hX07ZBdzkKNvAbN93r7SwnGv8zQ MOEAM1TyLxpPrC_1W4HY0I4nAGeFARjLGqVnBcy4RyeSkx3QXytRBKp5ZSBujFbe9ETIVatSforn FSxNg1Gg1MLkmXWZ3hqwCf7mi9wgiueuIdFsohTnJsnlQHFlfO91UgUYi0f0KIOTpzE_gyo34vOd TNFUNAVPak16uB8d0cDxn766g4TxsxPScRVT1LDVkTyXlC77dDNWN0NUAKMW7MA0IVIW30wXFKP1 f1QNH44tCLkGF3DdNc9QA8Gus7CxRd5RCO.6Pi3bJZKJmqmKRRQDZgF4XgnIKiUlYcb8n5jorqjp w0LSJrTHs8Oe5.5.OlLBFGXheiICMdcMZQTKedlBkcui5awdhNPMQ7A8pUSBaJ352UyxgEeBRgct Yk.pha._3m6itzIc7m6kHXmEXA_KgV1ZVYlmqhtX1fAsxmz1iIwlHjtwcdcJDknWj2Qr4W1aGLEh 8fxu7gojbxyumw0KoUsciBvY1iRsKXAIIurtEWEYDWRokPlDxfq_aLegp7QjdsYaGbhuRi7IRGis wuG_4SAsiXFTAGQkDdFTeGhzXwqV7rVp0CBrHW0VOI3ethXL.io5aAswpW_pVVzRSXe5_LsOv9Pf vEru9Va5BfRMitItZnB0srVAMlfS9JT2jKZKnUukCSmvdMFqilxPCmJUV7Y70F67wvKIyHMch1n8 PqEjv14nznBVJHd1bb0Sx9mcwuP.kLGam5Ee72aUeQu7eJs5Nna6PDxEf5UYlk4Q8T.ecj9BMq8V 3XMXfgIJxOWYkmRoO6LRk4TgVcidi8wU0ZBK.QI7G4YNdbvw3TMMefWpn.YSzt7Ijlu3Qie7N7lQ tKkUpdShYtVFRZFoX3rn26CMSagxvLx2JWHeHr_U4ixL_nb57HwHo4XtR2NF0SigqK.OltfPfdTs sno.Uuupgnzpd4rp4vPtei9eY4Sb4FwJdjaf_pFLg0iGkkYvhy9ou9dvIrgmwXYjG5l7E7DyPilp Dcv2ybUAEE0wIS8AnrNbHUDq9fk5ezK.XVwG0ETQIzhaHgZfobl6sdO3BkyFvjSAu7sB1JNWfOw7 9PsD4VmoQjqBNYo4S4IgvW6gTzvAOEFjY7mHdwYzSXuwbXJvv06SQ5GpUJ2fd98pbH6SiWrKcB.G aYuzrJCBEYWog5v5MTcwWQbao1ozyZ_4IKN7lfm.rsu_Uz8MYThse5FBbU0knS6_cAeXxT_6dDo1 DhY8XarHMjenIoPp_EX5P259dokFnacHP3HSIGrj515pnUVXgzHa.8LTpNkqClAb9IU4SA1BIrSZ Z3XMlTolP6RaTAX26CKfe0S7pMfb80D29HSvdOQZr0GnGMXPDCXRs60i3sLK1eQt8SOWzOlRxKEt 8hrd8Wce7l.empNNiwxjvbKsGqNLjNyXHgqI8ZEcayTB34NRmyyGOykjIYDjDK_qcBWmxjyEpuqr A4J8uH20SOGXs.QDHuQxCHYs9Ue7xaIbrzisfGInee459BUMC5NlfxokkWnBRTBZPKKWumcL6Az5 sRa60dpLeiEpzlapdK2_8lj6ZbTb_NCTVpN1dixQqAf4OZQp5yrcYCzlJxub6LZXox0eSHM1eLbG P061TdlGuOyRibM_5ujixXXOoZNLevVmB23mMrQxMD2ZYdPA70.5D_i512mvXrCBQOlPvlfH7H2W Z8YJd8.8eYBuVmFoQI9T91UwAGJYTKbruomiVZLqpPrPz34Fln8QHi2BnR3Hn8zWdTjthyhhwRGa hlI52i47RQ_IaYVv7sj_F20auQjcc_m.4tCDZRQXAuO_pSXv4nVLeM1ulnVtQmAtPefBfKZ7_MFd cRDdtvnXo3zt9E239CUTEl9169.cyiySvJPIPrM7emX0R7Aawd4OFz6TmDFfmcYFhwTazPpROqGQ W.2WeJFnKonnweBXpRvaTKIz3_CeXlAh_uhpqEqy_gDayR_EiGOnw0MhlbXVQgsNyqnP.ILnmwjY ke3pa6UhUF2FxSf6Nc3EhgR80iEPXCa7_uMXvZfSvtEBqWwlwegOWYveHcCtSNlvZ4XCMCntwO9E Qwsvn6jiRhov8dlg4SJvkMCgFnmerEqV2K.4CfBGDj.7IPSLD5DdkUsuOdsENKCfsevzsvewXUua ePjUyCJeo_GFXhVHx1Dmm02YkpV42riaWW7SrC8Khgjhx5h0.OMnxORbPpIy.KrI8pvK03iiOo65 KP_7ijkM8ZjTa2GvxkG.Si2zL54Eo3_xFVPaebbNtapmaJJlb4iyygGkUYzNnGKym48ssi4xkcRu DFw-- X-Sonic-MF: X-Sonic-ID: b6543f29-25ec-4e47-a4ff-8569995f7946 Received: from sonic.gate.mail.ne1.yahoo.com by sonic311.consmr.mail.ne1.yahoo.com with HTTP; Tue, 3 Mar 2026 18:06:31 +0000 Received: by hermes--production-gq1-6dfcf9f8b-82g65 (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID ec3c5f6ef2538eb0ae6f07d34b315ce9; Tue, 03 Mar 2026 18:06:25 +0000 (UTC) Message-ID: Date: Tue, 3 Mar 2026 10:06:19 -0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 105/110] security: replace PRIino with %llu/%llx format strings To: Jeff Layton , Alexander Viro , Christian Brauner , Jan Kara , Steven Rostedt , Masami Hiramatsu , Mathieu Desnoyers , Dan Williams , Matthew Wilcox , Eric Biggers , "Theodore Y. Ts'o" , Muchun Song , Oscar Salvador , David Hildenbrand , David Howells , Paulo Alcantara , Andreas Dilger , Jan Kara , Jaegeuk Kim , Chao Yu , Trond Myklebust , Anna Schumaker , Chuck Lever , NeilBrown , Olga Kornievskaia , Dai Ngo , Tom Talpey , Steve French , Ronnie Sahlberg , Shyam Prasad N , Bharath SM , Alexander Aring , Ryusuke Konishi , Viacheslav Dubeyko , Eric Van Hensbergen , Latchesar Ionkov , Dominique Martinet , Christian Schoenebeck , David Sterba , Marc Dionne , Ian Kent , Luis de Bethencourt , Salah Triki , "Tigran A. Aivazian" , Ilya Dryomov , Alex Markuze , Jan Harkes , coda@cs.cmu.edu, Nicolas Pitre , Tyler Hicks , Amir Goldstein , Christoph Hellwig , John Paul Adrian Glaubitz , Yangtao Li , Mikulas Patocka , David Woodhouse , Richard Weinberger , Dave Kleikamp , Konstantin Komarov , Mark Fasheh , Joel Becker , Joseph Qi , Mike Marshall , Martin Brandenburg , Miklos Szeredi , Anders Larsen , Zhihao Cheng , Damien Le Moal , Naohiro Aota , Johannes Thumshirn , John Johansen , Paul Moore , James Morris , "Serge E. Hallyn" , Mimi Zohar , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Fan Wu , Stephen Smalley , Ondrej Mosnacek , Alex Deucher , =?UTF-8?Q?Christian_K=C3=B6nig?= , David Airlie , Simona Vetter , Sumit Semwal , Eric Dumazet , Kuniyuki Iwashima , Paolo Abeni , Willem de Bruijn , "David S. Miller" , Jakub Kicinski , Simon Horman , Oleg Nesterov , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , James Clark , "Darrick J. Wong" , Martin Schiller , Eric Paris , Joerg Reuter , Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz , Oliver Hartkopp , Marc Kleine-Budde , David Ahern , Neal Cardwell , Steffen Klassert , Herbert Xu , Remi Denis-Courmont , Marcelo Ricardo Leitner , Xin Long , Magnus Karlsson , Maciej Fijalkowski , Stanislav Fomichev , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, nvdimm@lists.linux.dev, fsverity@lists.linux.dev, linux-mm@kvack.org, netfs@lists.linux.dev, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-nilfs@vger.kernel.org, v9fs@lists.linux.dev, linux-afs@lists.infradead.org, autofs@vger.kernel.org, ceph-devel@vger.kernel.org, codalist@coda.cs.cmu.edu, ecryptfs@vger.kernel.org, linux-mtd@lists.infradead.org, jfs-discussion@lists.sourceforge.net, ntfs3@lists.linux.dev, ocfs2-devel@lists.linux.dev, devel@lists.orangefs.org, linux-unionfs@vger.kernel.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, netdev@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-xfs@vger.kernel.org, linux-hams@vger.kernel.org, linux-x25@vger.kernel.org, audit@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-can@vger.kernel.org, linux-sctp@vger.kernel.org, bpf@vger.kernel.org References: <20260302-iino-u64-v2-0-e5388800dae0@kernel.org> <20260302-iino-u64-v2-105-e5388800dae0@kernel.org> Content-Language: en-US From: Casey Schaufler In-Reply-To: <20260302-iino-u64-v2-105-e5388800dae0@kernel.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Mailer: WebService/1.1.25198 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.yahoo X-Stat-Signature: tj6r1puknmw59no6htpjusgsm4f494rm X-Rspamd-Server: rspam09 X-Rspam-User: X-Rspamd-Queue-Id: F171DC0008 X-HE-Tag: 1772561192-818537 X-HE-Meta: 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 X971Hide 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 hZa6TQpp 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 6jWpNZjk kRI3yeleTXHCYRzhIv5Z7OMD3WjFgCoOrGA1Exr0IKjR+Y+8vNtKNGTkxdiroyrJbc/TfAh1Gmo+2FyNyCRvoD92A/PQH//oEmWT2h3agHM6PXncRXFW1mrQauwN1I9UeXdAc3WOj/P2h4eQIOWvdufhmdEjeXAedTq3rKS8/QLRhOFo29kOTfEEHnDB3kUOtol/DnenkK3EdGRqkwqmvb/1EEmts/dh3SoVaP/8F8EBcoaK+nJuGo0uRoGqs/LfDF8zR4BWon71yJUZcAGladfkrBk42IArZB2dYxwDYAtsvbuQ/OD0q8SH0ctBB+UNlV9OPeIR9MhGw9KNptD95C08tOM6oT/1o5OCS88XkOs0MDI1owE2cXKvHKOjonnDNkqTjCuNYOXIDTj8rsibaoRnxmN1yeHS6sgSzf2Yshk4qZmic4Y9aPmsojG9piCoDYMwyfEpnMCDywBLyKsTgV/MGEZwZ/gfdkq7DaoVrnNzM5GaU9XoDmhS9RX8hzFBoQ7+q6TaF+46qUD3EvBV6//44aIFN+KDGktlZS/72Neptln4IUB/JDfIeut5OIkyGAa04p0OoGKnMdXh/bLxuXuDIXrssYDaeA17x0NPA9aZC8/dIppXmY8ozOiMyuBWqvX+XpQjEtUXTm6/UTXdWydtu8+morpR3uAbGD+jaKj7Ng2dqvQkBeGk9Uv2QI8f/blq58woMr1ywtgMOTpfiR7ry7M39+tvg2PsFwWx65nm5fqh0JrwKmVbUQl37qqfMpgSwHSsm7eJw1wCSYSEPLs5Ge3uiTTTVFaVem5qil+SE/oNT5/Ycwob6ljwipJ6fEPMtmpDuCk1gvcFG0uXo5ysz5gJd5NGlXsaL5jBIWWOhY1XUz2GV1gCHxjB0lrqGu8CEMnqiaXOfcky6cBf41TV5q3qG+Jv2fNO2vpxwijOZOXI2klFJQagi4As4mu9R1wQ/VJKcr98BUYvTHC69i6eN+vkl 0NZyLG/0 udCSVQc/4tcbCVWk2esRfTjPn7V2a2EJh9ffiCukXceoQX2h9p9++XKjFO8HenM/BwnqmOcIfJt5N0xX9ZXN+bddRN3Ln+tILzut9rtiO0KLnKCr7M7+cA53Hn+xk8F46ogpM5ndZa6C3AoR/a/dKtxJw5Yvd4ws0NfROz0FsDSf8xf1mRR0m3oyvpKzk0EZVgTxrtm0zr8Jehr587EuA4hUH6jlEBhItnNS9c4gc5svd7V/JH4sHV8AMhYftrHaij365smTEJi9y51X/fV+Dp6RSl1u/KpcOazLl9dVkdSQ== Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 3/2/2026 12:25 PM, Jeff Layton wrote: > Now that i_ino is u64 and the PRIino format macro has been removed, > replace all uses in security with the concrete format strings. > > Signed-off-by: Jeff Layton For the security/smack changes: Acked-by: Casey Schaufler > --- > security/apparmor/apparmorfs.c | 4 ++-- > security/integrity/integrity_audit.c | 2 +- > security/ipe/audit.c | 2 +- > security/lsm_audit.c | 10 +++++----- > security/selinux/hooks.c | 10 +++++----- > security/smack/smack_lsm.c | 12 ++++++------ > 6 files changed, 20 insertions(+), 20 deletions(-) > > diff --git a/security/apparmor/apparmorfs.c b/security/apparmor/apparmorfs.c > index be343479f80b71566be6fda90fc4e00912faad63..7b645f40e71c956f216fa6a7d69c3ecd4e2a5ff4 100644 > --- a/security/apparmor/apparmorfs.c > +++ b/security/apparmor/apparmorfs.c > @@ -149,7 +149,7 @@ static int aafs_count; > > static int aafs_show_path(struct seq_file *seq, struct dentry *dentry) > { > - seq_printf(seq, "%s:[%" PRIino "u]", AAFS_NAME, d_inode(dentry)->i_ino); > + seq_printf(seq, "%s:[%llu]", AAFS_NAME, d_inode(dentry)->i_ino); > return 0; > } > > @@ -2644,7 +2644,7 @@ static int policy_readlink(struct dentry *dentry, char __user *buffer, > char name[32]; > int res; > > - res = snprintf(name, sizeof(name), "%s:[%" PRIino "u]", AAFS_NAME, > + res = snprintf(name, sizeof(name), "%s:[%llu]", AAFS_NAME, > d_inode(dentry)->i_ino); > if (res > 0 && res < sizeof(name)) > res = readlink_copy(buffer, buflen, name, strlen(name)); > diff --git a/security/integrity/integrity_audit.c b/security/integrity/integrity_audit.c > index d28dac23a4e7cf651856b80ab7756d250187ccde..d8d9e5ff1cd22b091f462d1e83d28d2d6bd983e9 100644 > --- a/security/integrity/integrity_audit.c > +++ b/security/integrity/integrity_audit.c > @@ -62,7 +62,7 @@ void integrity_audit_message(int audit_msgno, struct inode *inode, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } > audit_log_format(ab, " res=%d errno=%d", !result, errno); > audit_log_end(ab); > diff --git a/security/ipe/audit.c b/security/ipe/audit.c > index 0de95dd4fbea15d4d913fc42e197c3120a9d24a0..93fb59fbddd60b56c0b22be2a38b809ef9e18b76 100644 > --- a/security/ipe/audit.c > +++ b/security/ipe/audit.c > @@ -153,7 +153,7 @@ void ipe_audit_match(const struct ipe_eval_ctx *const ctx, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } else { > audit_log_format(ab, " dev=? ino=?"); > } > diff --git a/security/lsm_audit.c b/security/lsm_audit.c > index 523f2ee116f0f928003aec30a105d6d4ecb49b0b..737f5a263a8f79416133315edf363ece3d79c722 100644 > --- a/security/lsm_audit.c > +++ b/security/lsm_audit.c > @@ -202,7 +202,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } > break; > } > @@ -215,7 +215,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } > break; > } > @@ -228,7 +228,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } > > audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); > @@ -246,7 +246,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, > if (inode) { > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > } > break; > } > @@ -265,7 +265,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, > } > audit_log_format(ab, " dev="); > audit_log_untrustedstring(ab, inode->i_sb->s_id); > - audit_log_format(ab, " ino=%" PRIino "u", inode->i_ino); > + audit_log_format(ab, " ino=%llu", inode->i_ino); > rcu_read_unlock(); > break; > } > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c > index 9430f44c81447708c67ddc35c5b4254f16731b8f..8f38de4d223ea59cfea6bbe73747d7b228e0c33f 100644 > --- a/security/selinux/hooks.c > +++ b/security/selinux/hooks.c > @@ -1400,7 +1400,7 @@ static int inode_doinit_use_xattr(struct inode *inode, struct dentry *dentry, > if (rc < 0) { > kfree(context); > if (rc != -ENODATA) { > - pr_warn("SELinux: %s: getxattr returned %d for dev=%s ino=%" PRIino "u\n", > + pr_warn("SELinux: %s: getxattr returned %d for dev=%s ino=%llu\n", > __func__, -rc, inode->i_sb->s_id, inode->i_ino); > return rc; > } > @@ -1412,13 +1412,13 @@ static int inode_doinit_use_xattr(struct inode *inode, struct dentry *dentry, > def_sid, GFP_NOFS); > if (rc) { > char *dev = inode->i_sb->s_id; > - kino_t ino = inode->i_ino; > + u64 ino = inode->i_ino; > > if (rc == -EINVAL) { > - pr_notice_ratelimited("SELinux: inode=%" PRIino "u on dev=%s was found to have an invalid context=%s. This indicates you may need to relabel the inode or the filesystem in question.\n", > + pr_notice_ratelimited("SELinux: inode=%llu on dev=%s was found to have an invalid context=%s. This indicates you may need to relabel the inode or the filesystem in question.\n", > ino, dev, context); > } else { > - pr_warn("SELinux: %s: context_to_sid(%s) returned %d for dev=%s ino=%" PRIino "u\n", > + pr_warn("SELinux: %s: context_to_sid(%s) returned %d for dev=%s ino=%llu\n", > __func__, context, -rc, dev, ino); > } > } > @@ -3477,7 +3477,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name, > &newsid); > if (rc) { > pr_err("SELinux: unable to map context to SID" > - "for (%s, %" PRIino "u), rc=%d\n", > + "for (%s, %llu), rc=%d\n", > inode->i_sb->s_id, inode->i_ino, -rc); > return; > } > diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c > index 22b6bd322840c82697c38c07b19a4677e7da2598..2eb3368a3632b836df54ba8628c16f7215ddf3ea 100644 > --- a/security/smack/smack_lsm.c > +++ b/security/smack/smack_lsm.c > @@ -182,7 +182,7 @@ static int smk_bu_inode(struct inode *inode, int mode, int rc) > char acc[SMK_NUM_ACCESS_TYPE + 1]; > > if (isp->smk_flags & SMK_INODE_IMPURE) > - pr_info("Smack Unconfined Corruption: inode=(%s %" PRIino "u) %s\n", > + pr_info("Smack Unconfined Corruption: inode=(%s %llu) %s\n", > inode->i_sb->s_id, inode->i_ino, current->comm); > > if (rc <= 0) > @@ -195,7 +195,7 @@ static int smk_bu_inode(struct inode *inode, int mode, int rc) > > smk_bu_mode(mode, acc); > > - pr_info("Smack %s: (%s %s %s) inode=(%s %" PRIino "u) %s\n", smk_bu_mess[rc], > + pr_info("Smack %s: (%s %s %s) inode=(%s %llu) %s\n", smk_bu_mess[rc], > tsp->smk_task->smk_known, isp->smk_inode->smk_known, acc, > inode->i_sb->s_id, inode->i_ino, current->comm); > return 0; > @@ -214,7 +214,7 @@ static int smk_bu_file(struct file *file, int mode, int rc) > char acc[SMK_NUM_ACCESS_TYPE + 1]; > > if (isp->smk_flags & SMK_INODE_IMPURE) > - pr_info("Smack Unconfined Corruption: inode=(%s %" PRIino "u) %s\n", > + pr_info("Smack Unconfined Corruption: inode=(%s %llu) %s\n", > inode->i_sb->s_id, inode->i_ino, current->comm); > > if (rc <= 0) > @@ -223,7 +223,7 @@ static int smk_bu_file(struct file *file, int mode, int rc) > rc = 0; > > smk_bu_mode(mode, acc); > - pr_info("Smack %s: (%s %s %s) file=(%s %" PRIino "u %pD) %s\n", smk_bu_mess[rc], > + pr_info("Smack %s: (%s %s %s) file=(%s %llu %pD) %s\n", smk_bu_mess[rc], > sskp->smk_known, smk_of_inode(inode)->smk_known, acc, > inode->i_sb->s_id, inode->i_ino, file, > current->comm); > @@ -244,7 +244,7 @@ static int smk_bu_credfile(const struct cred *cred, struct file *file, > char acc[SMK_NUM_ACCESS_TYPE + 1]; > > if (isp->smk_flags & SMK_INODE_IMPURE) > - pr_info("Smack Unconfined Corruption: inode=(%s %" PRIino "u) %s\n", > + pr_info("Smack Unconfined Corruption: inode=(%s %llu) %s\n", > inode->i_sb->s_id, inode->i_ino, current->comm); > > if (rc <= 0) > @@ -253,7 +253,7 @@ static int smk_bu_credfile(const struct cred *cred, struct file *file, > rc = 0; > > smk_bu_mode(mode, acc); > - pr_info("Smack %s: (%s %s %s) file=(%s %" PRIino "u %pD) %s\n", smk_bu_mess[rc], > + pr_info("Smack %s: (%s %s %s) file=(%s %llu %pD) %s\n", smk_bu_mess[rc], > sskp->smk_known, smk_of_inode(inode)->smk_known, acc, > inode->i_sb->s_id, inode->i_ino, file, > current->comm); >