From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753444AbbHCLsD (ORCPT ); Mon, 3 Aug 2015 07:48:03 -0400 Received: from smtprelay0056.hostedemail.com ([216.40.44.56]:52570 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753171AbbHCLsB (ORCPT ); Mon, 3 Aug 2015 07:48:01 -0400 X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,:::::::,RULES_HIT:41:355:379:541:800:960:973:988:989:1260:1277:1311:1313:1314:1345:1373:1515:1516:1518:1534:1539:1561:1593:1594:1711:1714:1730:1747:1777:1792:2393:2559:2562:2828:3138:3139:3140:3141:3142:3866:3870:4321:4605:5007:6261:10004:10400:10848:11026:11473:11658:11914:12043:12517:12519:12555:13069:13095:13311:13357:14394:21080,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fn,MSBL:0,DNSBL:none,Custom_rules:0:0:0 X-HE-Tag: juice17_45cc98e7c0723 X-Filterd-Recvd-Size: 1432 Message-ID: <1438602478.30149.24.camel@perches.com> Subject: [TRIVIAL patch] exofs: Correct misuse of %0x From: Joe Perches To: Boaz Harrosh , Benny Halevy Cc: osd-dev@open-osd.org, linux-kernel@vger.kernel.org Date: Mon, 03 Aug 2015 04:47:58 -0700 Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: Evolution 3.16.0-fta1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Correct misuse of 0x%u in logging message. Signed-off-by: Joe Perches --- fs/exofs/dir.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/exofs/dir.c b/fs/exofs/dir.c index e5bb2ab..9a8eba6 100644 --- a/fs/exofs/dir.c +++ b/fs/exofs/dir.c @@ -137,7 +137,7 @@ Espan: bad_entry: EXOFS_ERR( "ERROR [exofs_check_page]: bad entry in directory(0x%lx): %s - " - "offset=%lu, inode=0x%llu, rec_len=%d, name_len=%d\n", + "offset=%lu, inode=0x%llx, rec_len=%d, name_len=%d\n", dir->i_ino, error, (page->index<inode_no)), rec_len, p->name_len);