From nobody Tue Mar 3 05:08:37 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4FD2F39EF13; Mon, 2 Mar 2026 20:36:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772483805; cv=none; b=IOt7RhKxP87xFBTuDNDlDbipnJMXdaCo/bSRl71ZkKaDiPzYsRjaNPgMdfLHKth+cH3VLW1bbIksPQzRlzwvczbVZHg0bHFcf+dH7ypNOhIGRQhddRnbBRACnxVFBGEmE+HNSb5c+hCt5r99QloNdsHrsCplx8qmOHBOH9jZs48= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772483805; c=relaxed/simple; bh=H3tL61fbWz+6oVu8xWt6IvuT0fFPzYC+T2ZsfuwYtEE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=smcFwSZ4f7CYIhbsapnqxBvDT5gmUaagjNWASTf/QR8dL9lDnDJm3cVwIg3W3Vp7gER0orNeEIJCC75MA0WZAZrBsAo3QalmnFw6qoDHvyz6AOXh+WManvylNaKBJjktWFNDo0rrG0zQCbOTqpTItGTXuKjnJVEG3enLrhM0e98= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=jb0EwRhp; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="jb0EwRhp" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 11E28C2BC87; Mon, 2 Mar 2026 20:36:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772483805; bh=H3tL61fbWz+6oVu8xWt6IvuT0fFPzYC+T2ZsfuwYtEE=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=jb0EwRhpHGcE220YDMsWSuPg35XSq9cyiwcFhJQ8siQHLMQWzG8i2y3FoBOtdsxS9 /EDw7m1rf0WcV5mtk0FOjBB0zCbpG7g1rtQxNdqr6jhRcr+BbjiUm/sYPWDTSY3p8c IQXLH/KIH0e4kWvqpZ54+HPEHzQaOhGJaPC7QVzKeWNtWoDth/SKHT0Dy3XzCN94A0 RaeG5MiKhhWwatscIOBrsa2NW3KO2i2v94MUPvP0MdcEGNt4dFzcNMtV2Qok4k1a3I uxmlDo6F4HEGR6q8t+BVX2Nv0OXZ+To870NHKFm9/QQh62tmbhyPuTdmgvQV/j3muj jte1N/R0jEc7w== From: Jeff Layton Date: Mon, 02 Mar 2026 15:24:33 -0500 Subject: [PATCH v2 049/110] security: use PRIino format for i_ino Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260302-iino-u64-v2-49-e5388800dae0@kernel.org> References: <20260302-iino-u64-v2-0-e5388800dae0@kernel.org> In-Reply-To: <20260302-iino-u64-v2-0-e5388800dae0@kernel.org> To: Alexander Viro , Christian Brauner , Jan Kara , Steven Rostedt , Masami Hiramatsu , Mathieu Desnoyers , Dan Williams , Matthew Wilcox , Eric Biggers , "Theodore Y. Ts'o" , Muchun Song , Oscar Salvador , David Hildenbrand , David Howells , Paulo Alcantara , Andreas Dilger , Jan Kara , Jaegeuk Kim , Chao Yu , Trond Myklebust , Anna Schumaker , Chuck Lever , NeilBrown , Olga Kornievskaia , Dai Ngo , Tom Talpey , Steve French , Ronnie Sahlberg , Shyam Prasad N , Bharath SM , Alexander Aring , Ryusuke Konishi , Viacheslav Dubeyko , Eric Van Hensbergen , Latchesar Ionkov , Dominique Martinet , Christian Schoenebeck , David Sterba , Marc Dionne , Ian Kent , Luis de Bethencourt , Salah Triki , "Tigran A. Aivazian" , Ilya Dryomov , Alex Markuze , Jan Harkes , coda@cs.cmu.edu, Nicolas Pitre , Tyler Hicks , Amir Goldstein , Christoph Hellwig , John Paul Adrian Glaubitz , Yangtao Li , Mikulas Patocka , David Woodhouse , Richard Weinberger , Dave Kleikamp , Konstantin Komarov , Mark Fasheh , Joel Becker , Joseph Qi , Mike Marshall , Martin Brandenburg , Miklos Szeredi , Anders Larsen , Zhihao Cheng , Damien Le Moal , Naohiro Aota , Johannes Thumshirn , John Johansen , Paul Moore , James Morris , "Serge E. Hallyn" , Mimi Zohar , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Fan Wu , Stephen Smalley , Ondrej Mosnacek , Casey Schaufler , Alex Deucher , =?utf-8?q?Christian_K=C3=B6nig?= , David Airlie , Simona Vetter , Sumit Semwal , Eric Dumazet , Kuniyuki Iwashima , Paolo Abeni , Willem de Bruijn , "David S. Miller" , Jakub Kicinski , Simon Horman , Oleg Nesterov , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , James Clark , "Darrick J. Wong" , Martin Schiller , Eric Paris , Joerg Reuter , Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz , Oliver Hartkopp , Marc Kleine-Budde , David Ahern , Neal Cardwell , Steffen Klassert , Herbert Xu , Remi Denis-Courmont , Marcelo Ricardo Leitner , Xin Long , Magnus Karlsson , Maciej Fijalkowski , Stanislav Fomichev , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, nvdimm@lists.linux.dev, fsverity@lists.linux.dev, linux-mm@kvack.org, netfs@lists.linux.dev, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-nilfs@vger.kernel.org, v9fs@lists.linux.dev, linux-afs@lists.infradead.org, autofs@vger.kernel.org, ceph-devel@vger.kernel.org, codalist@coda.cs.cmu.edu, ecryptfs@vger.kernel.org, linux-mtd@lists.infradead.org, jfs-discussion@lists.sourceforge.net, ntfs3@lists.linux.dev, ocfs2-devel@lists.linux.dev, devel@lists.orangefs.org, linux-unionfs@vger.kernel.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, netdev@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-xfs@vger.kernel.org, linux-hams@vger.kernel.org, linux-x25@vger.kernel.org, audit@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-can@vger.kernel.org, linux-sctp@vger.kernel.org, bpf@vger.kernel.org, Jeff Layton X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=openpgp-sha256; l=9136; i=jlayton@kernel.org; h=from:subject:message-id; bh=H3tL61fbWz+6oVu8xWt6IvuT0fFPzYC+T2ZsfuwYtEE=; b=owEBbQKS/ZANAwAKAQAOaEEZVoIVAcsmYgBppfH7D5zjUk6ZmaUDERwrTJr0eT7+HFUlu3gfC gJ2G/7C4vGJAjMEAAEKAB0WIQRLwNeyRHGyoYTq9dMADmhBGVaCFQUCaaXx+wAKCRAADmhBGVaC FUGAD/4tZ8ATwOq5FhuMuFqlnoBgDgX4KgpAqw3nDkOioCbzRI2x0A4UdyghtBNj2ENMISFUiSc Aat6uAxQuXz216zBpHpV0AvGeuW74IDTVEqTkP1iKmKXcM/nf879ZTeWUl9HvtNFB5piLmT0AKb USC2zGKx8pih/uyufVImQcZsLvJcWz6RX+jADkYFTA1ttN5lyahaRFJ6EZ3ZJkwCm+ZpRMjFXDh pt8C5Cl0GWw4x81tnJgbSYHUGwzPyYnNZHLXD8Wlbkxa/CB4hQNdIOqUkkg/+9UcICK3/RENtoJ zqs0aQrqzBvk2AlX1q5OmLhGejCZuGefd4y+2LigaI5FJj5g282DBNppyCEyOipT2eqHAF2Na/+ KCCMeC5OWo4zMrmypcQJ+kkKUYo9ZKvj2X0Mudel7eLUZ1I0dMfcs1od4E74C2m9jsspDR4JF7S lf/NjzfWtH8CaY/x+DvvAlG+ExMGk5hM6kreEq34SLp0ibsAD/8lp55HGc2xXQHfcbeqYseMkyV LlXACKLdA0S53mH4jZi0vfT1bOWAwC6HMhDhfrejzvZpXezlkoNVo077BtvVXMHW20PhJ5c61pQ 74oQLAYB8YWWR7ZqRuTKTXsdcqVx74hcl6wMQak/8LWj2D0dyeMxqws9EgC3tzGM8ct2S5rMvb/ agR0vgUd1qAypMg== X-Developer-Key: i=jlayton@kernel.org; a=openpgp; fpr=4BC0D7B24471B2A184EAF5D3000E684119568215 Convert security i_ino format strings to use the PRIino format macro in preparation for the widening of i_ino via kino_t. Also correct signed format specifiers to unsigned, since inode numbers are unsigned values. Signed-off-by: Jeff Layton Acked-by: Paul Moore (LSM/SELinux) --- security/apparmor/apparmorfs.c | 4 ++-- security/integrity/integrity_audit.c | 2 +- security/ipe/audit.c | 2 +- security/lsm_audit.c | 10 +++++----- security/selinux/hooks.c | 10 +++++----- security/smack/smack_lsm.c | 12 ++++++------ 6 files changed, 20 insertions(+), 20 deletions(-) diff --git a/security/apparmor/apparmorfs.c b/security/apparmor/apparmorfs.c index 2f84bd23edb69e7e69cb097e554091df0132816d..be343479f80b71566be6fda90fc= 4e00912faad63 100644 --- a/security/apparmor/apparmorfs.c +++ b/security/apparmor/apparmorfs.c @@ -149,7 +149,7 @@ static int aafs_count; =20 static int aafs_show_path(struct seq_file *seq, struct dentry *dentry) { - seq_printf(seq, "%s:[%lu]", AAFS_NAME, d_inode(dentry)->i_ino); + seq_printf(seq, "%s:[%" PRIino "u]", AAFS_NAME, d_inode(dentry)->i_ino); return 0; } =20 @@ -2644,7 +2644,7 @@ static int policy_readlink(struct dentry *dentry, cha= r __user *buffer, char name[32]; int res; =20 - res =3D snprintf(name, sizeof(name), "%s:[%lu]", AAFS_NAME, + res =3D snprintf(name, sizeof(name), "%s:[%" PRIino "u]", AAFS_NAME, d_inode(dentry)->i_ino); if (res > 0 && res < sizeof(name)) res =3D readlink_copy(buffer, buflen, name, strlen(name)); diff --git a/security/integrity/integrity_audit.c b/security/integrity/inte= grity_audit.c index 0ec5e4c22cb2a1066c2b897776ead6d3db72635c..d28dac23a4e7cf651856b80ab77= 56d250187ccde 100644 --- a/security/integrity/integrity_audit.c +++ b/security/integrity/integrity_audit.c @@ -62,7 +62,7 @@ void integrity_audit_message(int audit_msgno, struct inod= e *inode, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } audit_log_format(ab, " res=3D%d errno=3D%d", !result, errno); audit_log_end(ab); diff --git a/security/ipe/audit.c b/security/ipe/audit.c index 3f0deeb54912730d9acf5e021a4a0cb29a34e982..0de95dd4fbea15d4d913fc42e19= 7c3120a9d24a0 100644 --- a/security/ipe/audit.c +++ b/security/ipe/audit.c @@ -153,7 +153,7 @@ void ipe_audit_match(const struct ipe_eval_ctx *const c= tx, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } else { audit_log_format(ab, " dev=3D? ino=3D?"); } diff --git a/security/lsm_audit.c b/security/lsm_audit.c index 7d623b00495c14b079e10e963c21a9f949c11f07..523f2ee116f0f928003aec30a10= 5d6d4ecb49b0b 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c @@ -202,7 +202,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } break; } @@ -215,7 +215,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } break; } @@ -228,7 +228,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } =20 audit_log_format(ab, " ioctlcmd=3D0x%hx", a->u.op->cmd); @@ -246,7 +246,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, if (inode) { audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); } break; } @@ -265,7 +265,7 @@ void audit_log_lsm_data(struct audit_buffer *ab, } audit_log_format(ab, " dev=3D"); audit_log_untrustedstring(ab, inode->i_sb->s_id); - audit_log_format(ab, " ino=3D%lu", inode->i_ino); + audit_log_format(ab, " ino=3D%" PRIino "u", inode->i_ino); rcu_read_unlock(); break; } diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d8224ea113d1ac273aac1fb52324f00b3301ae75..9430f44c81447708c67ddc35c5b= 4254f16731b8f 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -1400,7 +1400,7 @@ static int inode_doinit_use_xattr(struct inode *inode= , struct dentry *dentry, if (rc < 0) { kfree(context); if (rc !=3D -ENODATA) { - pr_warn("SELinux: %s: getxattr returned %d for dev=3D%s ino=3D%ld\n", + pr_warn("SELinux: %s: getxattr returned %d for dev=3D%s ino=3D%" PRIin= o "u\n", __func__, -rc, inode->i_sb->s_id, inode->i_ino); return rc; } @@ -1412,13 +1412,13 @@ static int inode_doinit_use_xattr(struct inode *ino= de, struct dentry *dentry, def_sid, GFP_NOFS); if (rc) { char *dev =3D inode->i_sb->s_id; - unsigned long ino =3D inode->i_ino; + kino_t ino =3D inode->i_ino; =20 if (rc =3D=3D -EINVAL) { - pr_notice_ratelimited("SELinux: inode=3D%lu on dev=3D%s was found to ha= ve an invalid context=3D%s. This indicates you may need to relabel the ino= de or the filesystem in question.\n", + pr_notice_ratelimited("SELinux: inode=3D%" PRIino "u on dev=3D%s was fo= und to have an invalid context=3D%s. This indicates you may need to relabe= l the inode or the filesystem in question.\n", ino, dev, context); } else { - pr_warn("SELinux: %s: context_to_sid(%s) returned %d for dev=3D%s ino= =3D%ld\n", + pr_warn("SELinux: %s: context_to_sid(%s) returned %d for dev=3D%s ino= =3D%" PRIino "u\n", __func__, context, -rc, dev, ino); } } @@ -3477,7 +3477,7 @@ static void selinux_inode_post_setxattr(struct dentry= *dentry, const char *name, &newsid); if (rc) { pr_err("SELinux: unable to map context to SID" - "for (%s, %lu), rc=3D%d\n", + "for (%s, %" PRIino "u), rc=3D%d\n", inode->i_sb->s_id, inode->i_ino, -rc); return; } diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 98af9d7b943469d0ddd344fc78c0b87ca40c16c4..22b6bd322840c82697c38c07b19= a4677e7da2598 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -182,7 +182,7 @@ static int smk_bu_inode(struct inode *inode, int mode, = int rc) char acc[SMK_NUM_ACCESS_TYPE + 1]; =20 if (isp->smk_flags & SMK_INODE_IMPURE) - pr_info("Smack Unconfined Corruption: inode=3D(%s %ld) %s\n", + pr_info("Smack Unconfined Corruption: inode=3D(%s %" PRIino "u) %s\n", inode->i_sb->s_id, inode->i_ino, current->comm); =20 if (rc <=3D 0) @@ -195,7 +195,7 @@ static int smk_bu_inode(struct inode *inode, int mode, = int rc) =20 smk_bu_mode(mode, acc); =20 - pr_info("Smack %s: (%s %s %s) inode=3D(%s %ld) %s\n", smk_bu_mess[rc], + pr_info("Smack %s: (%s %s %s) inode=3D(%s %" PRIino "u) %s\n", smk_bu_mes= s[rc], tsp->smk_task->smk_known, isp->smk_inode->smk_known, acc, inode->i_sb->s_id, inode->i_ino, current->comm); return 0; @@ -214,7 +214,7 @@ static int smk_bu_file(struct file *file, int mode, int= rc) char acc[SMK_NUM_ACCESS_TYPE + 1]; =20 if (isp->smk_flags & SMK_INODE_IMPURE) - pr_info("Smack Unconfined Corruption: inode=3D(%s %ld) %s\n", + pr_info("Smack Unconfined Corruption: inode=3D(%s %" PRIino "u) %s\n", inode->i_sb->s_id, inode->i_ino, current->comm); =20 if (rc <=3D 0) @@ -223,7 +223,7 @@ static int smk_bu_file(struct file *file, int mode, int= rc) rc =3D 0; =20 smk_bu_mode(mode, acc); - pr_info("Smack %s: (%s %s %s) file=3D(%s %ld %pD) %s\n", smk_bu_mess[rc], + pr_info("Smack %s: (%s %s %s) file=3D(%s %" PRIino "u %pD) %s\n", smk_bu_= mess[rc], sskp->smk_known, smk_of_inode(inode)->smk_known, acc, inode->i_sb->s_id, inode->i_ino, file, current->comm); @@ -244,7 +244,7 @@ static int smk_bu_credfile(const struct cred *cred, str= uct file *file, char acc[SMK_NUM_ACCESS_TYPE + 1]; =20 if (isp->smk_flags & SMK_INODE_IMPURE) - pr_info("Smack Unconfined Corruption: inode=3D(%s %ld) %s\n", + pr_info("Smack Unconfined Corruption: inode=3D(%s %" PRIino "u) %s\n", inode->i_sb->s_id, inode->i_ino, current->comm); =20 if (rc <=3D 0) @@ -253,7 +253,7 @@ static int smk_bu_credfile(const struct cred *cred, str= uct file *file, rc =3D 0; =20 smk_bu_mode(mode, acc); - pr_info("Smack %s: (%s %s %s) file=3D(%s %ld %pD) %s\n", smk_bu_mess[rc], + pr_info("Smack %s: (%s %s %s) file=3D(%s %" PRIino "u %pD) %s\n", smk_bu_= mess[rc], sskp->smk_known, smk_of_inode(inode)->smk_known, acc, inode->i_sb->s_id, inode->i_ino, file, current->comm); --=20 2.53.0