diff options
author | Michael Halcrow <mhalcrow@us.ibm.com> | 2009-01-06 17:42:02 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2009-01-06 18:59:22 -0500 |
commit | df261c52abdef147084c76ecf14473184e907547 (patch) | |
tree | f1f423ba612dbacace82193f2b088252f169a9c6 /fs/ecryptfs | |
parent | 87c94c4df0149786ad91d8a03c738a03369ee9c8 (diff) |
eCryptfs: Replace %Z with %z
%Z is a gcc-ism. Using %z instead.
Signed-off-by: Michael Halcrow <mhalcrow@us.ibm.com>
Cc: Dustin Kirkland <dustin.kirkland@gmail.com>
Cc: Eric Sandeen <sandeen@redhat.com>
Cc: Tyler Hicks <tchicks@us.ibm.com>
Cc: David Kleikamp <shaggy@us.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'fs/ecryptfs')
-rw-r--r-- | fs/ecryptfs/crypto.c | 8 | ||||
-rw-r--r-- | fs/ecryptfs/keystore.c | 18 | ||||
-rw-r--r-- | fs/ecryptfs/messaging.c | 4 | ||||
-rw-r--r-- | fs/ecryptfs/miscdev.c | 18 |
4 files changed, 24 insertions, 24 deletions
diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index ea2afd2ce222..490b129311eb 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c | |||
@@ -1679,7 +1679,7 @@ ecryptfs_encrypt_filename(struct ecryptfs_filename *filename, | |||
1679 | kmalloc(filename->encrypted_filename_size, GFP_KERNEL); | 1679 | kmalloc(filename->encrypted_filename_size, GFP_KERNEL); |
1680 | if (!filename->encrypted_filename) { | 1680 | if (!filename->encrypted_filename) { |
1681 | printk(KERN_ERR "%s: Out of memory whilst attempting " | 1681 | printk(KERN_ERR "%s: Out of memory whilst attempting " |
1682 | "to kmalloc [%Zd] bytes\n", __func__, | 1682 | "to kmalloc [%zd] bytes\n", __func__, |
1683 | filename->encrypted_filename_size); | 1683 | filename->encrypted_filename_size); |
1684 | rc = -ENOMEM; | 1684 | rc = -ENOMEM; |
1685 | goto out; | 1685 | goto out; |
@@ -1752,7 +1752,7 @@ ecryptfs_process_key_cipher(struct crypto_blkcipher **key_tfm, | |||
1752 | *key_tfm = NULL; | 1752 | *key_tfm = NULL; |
1753 | if (*key_size > ECRYPTFS_MAX_KEY_BYTES) { | 1753 | if (*key_size > ECRYPTFS_MAX_KEY_BYTES) { |
1754 | rc = -EINVAL; | 1754 | rc = -EINVAL; |
1755 | printk(KERN_ERR "Requested key size is [%Zd] bytes; maximum " | 1755 | printk(KERN_ERR "Requested key size is [%zd] bytes; maximum " |
1756 | "allowable is [%d]\n", *key_size, ECRYPTFS_MAX_KEY_BYTES); | 1756 | "allowable is [%d]\n", *key_size, ECRYPTFS_MAX_KEY_BYTES); |
1757 | goto out; | 1757 | goto out; |
1758 | } | 1758 | } |
@@ -1777,7 +1777,7 @@ ecryptfs_process_key_cipher(struct crypto_blkcipher **key_tfm, | |||
1777 | get_random_bytes(dummy_key, *key_size); | 1777 | get_random_bytes(dummy_key, *key_size); |
1778 | rc = crypto_blkcipher_setkey(*key_tfm, dummy_key, *key_size); | 1778 | rc = crypto_blkcipher_setkey(*key_tfm, dummy_key, *key_size); |
1779 | if (rc) { | 1779 | if (rc) { |
1780 | printk(KERN_ERR "Error attempting to set key of size [%Zd] for " | 1780 | printk(KERN_ERR "Error attempting to set key of size [%zd] for " |
1781 | "cipher [%s]; rc = [%d]\n", *key_size, cipher_name, rc); | 1781 | "cipher [%s]; rc = [%d]\n", *key_size, cipher_name, rc); |
1782 | rc = -EINVAL; | 1782 | rc = -EINVAL; |
1783 | goto out; | 1783 | goto out; |
@@ -2221,7 +2221,7 @@ int ecryptfs_decode_and_decrypt_filename(char **plaintext_name, | |||
2221 | decoded_name = kmalloc(decoded_name_size, GFP_KERNEL); | 2221 | decoded_name = kmalloc(decoded_name_size, GFP_KERNEL); |
2222 | if (!decoded_name) { | 2222 | if (!decoded_name) { |
2223 | printk(KERN_ERR "%s: Out of memory whilst attempting " | 2223 | printk(KERN_ERR "%s: Out of memory whilst attempting " |
2224 | "to kmalloc [%Zd] bytes\n", __func__, | 2224 | "to kmalloc [%zd] bytes\n", __func__, |
2225 | decoded_name_size); | 2225 | decoded_name_size); |
2226 | rc = -ENOMEM; | 2226 | rc = -ENOMEM; |
2227 | goto out; | 2227 | goto out; |
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c index dafceb5560e5..e6a96e8f5e67 100644 --- a/fs/ecryptfs/keystore.c +++ b/fs/ecryptfs/keystore.c | |||
@@ -358,7 +358,7 @@ parse_tag_67_packet(struct ecryptfs_key_record *key_rec, | |||
358 | /* verify that everything through the encrypted FEK size is present */ | 358 | /* verify that everything through the encrypted FEK size is present */ |
359 | if (message_len < 4) { | 359 | if (message_len < 4) { |
360 | rc = -EIO; | 360 | rc = -EIO; |
361 | printk(KERN_ERR "%s: message_len is [%Zd]; minimum acceptable " | 361 | printk(KERN_ERR "%s: message_len is [%zd]; minimum acceptable " |
362 | "message length is [%d]\n", __func__, message_len, 4); | 362 | "message length is [%d]\n", __func__, message_len, 4); |
363 | goto out; | 363 | goto out; |
364 | } | 364 | } |
@@ -385,13 +385,13 @@ parse_tag_67_packet(struct ecryptfs_key_record *key_rec, | |||
385 | i += data_len; | 385 | i += data_len; |
386 | if (message_len < (i + key_rec->enc_key_size)) { | 386 | if (message_len < (i + key_rec->enc_key_size)) { |
387 | rc = -EIO; | 387 | rc = -EIO; |
388 | printk(KERN_ERR "%s: message_len [%Zd]; max len is [%Zd]\n", | 388 | printk(KERN_ERR "%s: message_len [%zd]; max len is [%zd]\n", |
389 | __func__, message_len, (i + key_rec->enc_key_size)); | 389 | __func__, message_len, (i + key_rec->enc_key_size)); |
390 | goto out; | 390 | goto out; |
391 | } | 391 | } |
392 | if (key_rec->enc_key_size > ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES) { | 392 | if (key_rec->enc_key_size > ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES) { |
393 | rc = -EIO; | 393 | rc = -EIO; |
394 | printk(KERN_ERR "%s: Encrypted key_size [%Zd] larger than " | 394 | printk(KERN_ERR "%s: Encrypted key_size [%zd] larger than " |
395 | "the maximum key size [%d]\n", __func__, | 395 | "the maximum key size [%d]\n", __func__, |
396 | key_rec->enc_key_size, | 396 | key_rec->enc_key_size, |
397 | ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES); | 397 | ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES); |
@@ -511,7 +511,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
511 | s = kmalloc(sizeof(*s), GFP_KERNEL); | 511 | s = kmalloc(sizeof(*s), GFP_KERNEL); |
512 | if (!s) { | 512 | if (!s) { |
513 | printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc " | 513 | printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc " |
514 | "[%d] bytes of kernel memory\n", __func__, sizeof(*s)); | 514 | "[%zd] bytes of kernel memory\n", __func__, sizeof(*s)); |
515 | goto out; | 515 | goto out; |
516 | } | 516 | } |
517 | s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; | 517 | s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; |
@@ -566,7 +566,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
566 | GFP_KERNEL); | 566 | GFP_KERNEL); |
567 | if (!s->block_aligned_filename) { | 567 | if (!s->block_aligned_filename) { |
568 | printk(KERN_ERR "%s: Out of kernel memory whilst attempting to " | 568 | printk(KERN_ERR "%s: Out of kernel memory whilst attempting to " |
569 | "kzalloc [%Zd] bytes\n", __func__, | 569 | "kzalloc [%zd] bytes\n", __func__, |
570 | s->block_aligned_filename_size); | 570 | s->block_aligned_filename_size); |
571 | rc = -ENOMEM; | 571 | rc = -ENOMEM; |
572 | goto out_unlock; | 572 | goto out_unlock; |
@@ -721,7 +721,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
721 | printk(KERN_ERR "%s: Error setting key for crypto context; " | 721 | printk(KERN_ERR "%s: Error setting key for crypto context; " |
722 | "rc = [%d]. s->auth_tok->token.password.session_key_" | 722 | "rc = [%d]. s->auth_tok->token.password.session_key_" |
723 | "encryption_key = [0x%p]; mount_crypt_stat->" | 723 | "encryption_key = [0x%p]; mount_crypt_stat->" |
724 | "global_default_fn_cipher_key_bytes = [%Zd]\n", __func__, | 724 | "global_default_fn_cipher_key_bytes = [%zd]\n", __func__, |
725 | rc, | 725 | rc, |
726 | s->auth_tok->token.password.session_key_encryption_key, | 726 | s->auth_tok->token.password.session_key_encryption_key, |
727 | mount_crypt_stat->global_default_fn_cipher_key_bytes); | 727 | mount_crypt_stat->global_default_fn_cipher_key_bytes); |
@@ -792,7 +792,7 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, | |||
792 | } | 792 | } |
793 | s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; | 793 | s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; |
794 | if (max_packet_size < (1 + 1 + ECRYPTFS_SIG_SIZE + 1 + 1)) { | 794 | if (max_packet_size < (1 + 1 + ECRYPTFS_SIG_SIZE + 1 + 1)) { |
795 | printk(KERN_WARNING "%s: max_packet_size is [%Zd]; it must be " | 795 | printk(KERN_WARNING "%s: max_packet_size is [%zd]; it must be " |
796 | "at least [%d]\n", __func__, max_packet_size, | 796 | "at least [%d]\n", __func__, max_packet_size, |
797 | (1 + 1 + ECRYPTFS_SIG_SIZE + 1 + 1)); | 797 | (1 + 1 + ECRYPTFS_SIG_SIZE + 1 + 1)); |
798 | rc = -EINVAL; | 798 | rc = -EINVAL; |
@@ -909,7 +909,7 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, | |||
909 | printk(KERN_ERR "%s: Error setting key for crypto context; " | 909 | printk(KERN_ERR "%s: Error setting key for crypto context; " |
910 | "rc = [%d]. s->auth_tok->token.password.session_key_" | 910 | "rc = [%d]. s->auth_tok->token.password.session_key_" |
911 | "encryption_key = [0x%p]; mount_crypt_stat->" | 911 | "encryption_key = [0x%p]; mount_crypt_stat->" |
912 | "global_default_fn_cipher_key_bytes = [%Zd]\n", __func__, | 912 | "global_default_fn_cipher_key_bytes = [%zd]\n", __func__, |
913 | rc, | 913 | rc, |
914 | s->auth_tok->token.password.session_key_encryption_key, | 914 | s->auth_tok->token.password.session_key_encryption_key, |
915 | mount_crypt_stat->global_default_fn_cipher_key_bytes); | 915 | mount_crypt_stat->global_default_fn_cipher_key_bytes); |
@@ -936,7 +936,7 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, | |||
936 | s->i++; | 936 | s->i++; |
937 | (*filename_size) = (s->block_aligned_filename_size - s->i); | 937 | (*filename_size) = (s->block_aligned_filename_size - s->i); |
938 | if (!((*filename_size) > 0 && (*filename_size < PATH_MAX))) { | 938 | if (!((*filename_size) > 0 && (*filename_size < PATH_MAX))) { |
939 | printk(KERN_WARNING "%s: Filename size is [%Zd], which is " | 939 | printk(KERN_WARNING "%s: Filename size is [%zd], which is " |
940 | "invalid\n", __func__, (*filename_size)); | 940 | "invalid\n", __func__, (*filename_size)); |
941 | rc = -EINVAL; | 941 | rc = -EINVAL; |
942 | goto out_free_unlock; | 942 | goto out_free_unlock; |
diff --git a/fs/ecryptfs/messaging.c b/fs/ecryptfs/messaging.c index 6913f727624d..96ef51489e01 100644 --- a/fs/ecryptfs/messaging.c +++ b/fs/ecryptfs/messaging.c | |||
@@ -193,7 +193,7 @@ ecryptfs_spawn_daemon(struct ecryptfs_daemon **daemon, uid_t euid, | |||
193 | (*daemon) = kzalloc(sizeof(**daemon), GFP_KERNEL); | 193 | (*daemon) = kzalloc(sizeof(**daemon), GFP_KERNEL); |
194 | if (!(*daemon)) { | 194 | if (!(*daemon)) { |
195 | rc = -ENOMEM; | 195 | rc = -ENOMEM; |
196 | printk(KERN_ERR "%s: Failed to allocate [%Zd] bytes of " | 196 | printk(KERN_ERR "%s: Failed to allocate [%zd] bytes of " |
197 | "GFP_KERNEL memory\n", __func__, sizeof(**daemon)); | 197 | "GFP_KERNEL memory\n", __func__, sizeof(**daemon)); |
198 | goto out; | 198 | goto out; |
199 | } | 199 | } |
@@ -435,7 +435,7 @@ int ecryptfs_process_response(struct ecryptfs_message *msg, uid_t euid, | |||
435 | msg_ctx->msg = kmalloc(msg_size, GFP_KERNEL); | 435 | msg_ctx->msg = kmalloc(msg_size, GFP_KERNEL); |
436 | if (!msg_ctx->msg) { | 436 | if (!msg_ctx->msg) { |
437 | rc = -ENOMEM; | 437 | rc = -ENOMEM; |
438 | printk(KERN_ERR "%s: Failed to allocate [%Zd] bytes of " | 438 | printk(KERN_ERR "%s: Failed to allocate [%zd] bytes of " |
439 | "GFP_KERNEL memory\n", __func__, msg_size); | 439 | "GFP_KERNEL memory\n", __func__, msg_size); |
440 | goto unlock; | 440 | goto unlock; |
441 | } | 441 | } |
diff --git a/fs/ecryptfs/miscdev.c b/fs/ecryptfs/miscdev.c index efd95a0ed1ea..a67fea655f49 100644 --- a/fs/ecryptfs/miscdev.c +++ b/fs/ecryptfs/miscdev.c | |||
@@ -199,7 +199,7 @@ int ecryptfs_send_miscdev(char *data, size_t data_size, | |||
199 | if (!msg_ctx->msg) { | 199 | if (!msg_ctx->msg) { |
200 | rc = -ENOMEM; | 200 | rc = -ENOMEM; |
201 | printk(KERN_ERR "%s: Out of memory whilst attempting " | 201 | printk(KERN_ERR "%s: Out of memory whilst attempting " |
202 | "to kmalloc(%Zd, GFP_KERNEL)\n", __func__, | 202 | "to kmalloc(%zd, GFP_KERNEL)\n", __func__, |
203 | (sizeof(*msg_ctx->msg) + data_size)); | 203 | (sizeof(*msg_ctx->msg) + data_size)); |
204 | goto out_unlock; | 204 | goto out_unlock; |
205 | } | 205 | } |
@@ -322,7 +322,7 @@ check_list: | |||
322 | if (count < total_length) { | 322 | if (count < total_length) { |
323 | rc = 0; | 323 | rc = 0; |
324 | printk(KERN_WARNING "%s: Only given user buffer of " | 324 | printk(KERN_WARNING "%s: Only given user buffer of " |
325 | "size [%Zd], but we need [%Zd] to read the " | 325 | "size [%zd], but we need [%zd] to read the " |
326 | "pending message\n", __func__, count, total_length); | 326 | "pending message\n", __func__, count, total_length); |
327 | goto out_unlock_msg_ctx; | 327 | goto out_unlock_msg_ctx; |
328 | } | 328 | } |
@@ -376,7 +376,7 @@ static int ecryptfs_miscdev_response(char *data, size_t data_size, | |||
376 | 376 | ||
377 | if ((sizeof(*msg) + msg->data_len) != data_size) { | 377 | if ((sizeof(*msg) + msg->data_len) != data_size) { |
378 | printk(KERN_WARNING "%s: (sizeof(*msg) + msg->data_len) = " | 378 | printk(KERN_WARNING "%s: (sizeof(*msg) + msg->data_len) = " |
379 | "[%Zd]; data_size = [%Zd]. Invalid packet.\n", __func__, | 379 | "[%zd]; data_size = [%zd]. Invalid packet.\n", __func__, |
380 | (sizeof(*msg) + msg->data_len), data_size); | 380 | (sizeof(*msg) + msg->data_len), data_size); |
381 | rc = -EINVAL; | 381 | rc = -EINVAL; |
382 | goto out; | 382 | goto out; |
@@ -421,7 +421,7 @@ ecryptfs_miscdev_write(struct file *file, const char __user *buf, | |||
421 | data = kmalloc(count, GFP_KERNEL); | 421 | data = kmalloc(count, GFP_KERNEL); |
422 | if (!data) { | 422 | if (!data) { |
423 | printk(KERN_ERR "%s: Out of memory whilst attempting to " | 423 | printk(KERN_ERR "%s: Out of memory whilst attempting to " |
424 | "kmalloc([%Zd], GFP_KERNEL)\n", __func__, count); | 424 | "kmalloc([%zd], GFP_KERNEL)\n", __func__, count); |
425 | goto out; | 425 | goto out; |
426 | } | 426 | } |
427 | rc = copy_from_user(data, buf, count); | 427 | rc = copy_from_user(data, buf, count); |
@@ -436,8 +436,8 @@ ecryptfs_miscdev_write(struct file *file, const char __user *buf, | |||
436 | case ECRYPTFS_MSG_RESPONSE: | 436 | case ECRYPTFS_MSG_RESPONSE: |
437 | if (count < (1 + 4 + 1 + sizeof(struct ecryptfs_message))) { | 437 | if (count < (1 + 4 + 1 + sizeof(struct ecryptfs_message))) { |
438 | printk(KERN_WARNING "%s: Minimum acceptable packet " | 438 | printk(KERN_WARNING "%s: Minimum acceptable packet " |
439 | "size is [%Zd], but amount of data written is " | 439 | "size is [%zd], but amount of data written is " |
440 | "only [%Zd]. Discarding response packet.\n", | 440 | "only [%zd]. Discarding response packet.\n", |
441 | __func__, | 441 | __func__, |
442 | (1 + 4 + 1 + sizeof(struct ecryptfs_message)), | 442 | (1 + 4 + 1 + sizeof(struct ecryptfs_message)), |
443 | count); | 443 | count); |
@@ -455,9 +455,9 @@ ecryptfs_miscdev_write(struct file *file, const char __user *buf, | |||
455 | } | 455 | } |
456 | i += packet_size_length; | 456 | i += packet_size_length; |
457 | if ((1 + 4 + packet_size_length + packet_size) != count) { | 457 | if ((1 + 4 + packet_size_length + packet_size) != count) { |
458 | printk(KERN_WARNING "%s: (1 + packet_size_length([%Zd])" | 458 | printk(KERN_WARNING "%s: (1 + packet_size_length([%zd])" |
459 | " + packet_size([%Zd]))([%Zd]) != " | 459 | " + packet_size([%zd]))([%zd]) != " |
460 | "count([%Zd]). Invalid packet format.\n", | 460 | "count([%zd]). Invalid packet format.\n", |
461 | __func__, packet_size_length, packet_size, | 461 | __func__, packet_size_length, packet_size, |
462 | (1 + packet_size_length + packet_size), count); | 462 | (1 + packet_size_length + packet_size), count); |
463 | goto out_free; | 463 | goto out_free; |