Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp393190pxb; Wed, 24 Feb 2021 05:14:05 -0800 (PST) X-Google-Smtp-Source: ABdhPJyFlqBfdEZhOU4Prngf/USsIZSe9ThsPkHrYVqe0qAUQmwlPnQVC6IGItwBOSAnNMuAJgMW X-Received: by 2002:aa7:dc17:: with SMTP id b23mr33812578edu.139.1614172445354; Wed, 24 Feb 2021 05:14:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614172445; cv=none; d=google.com; s=arc-20160816; b=l17ZzpEhXojVwzgwX6/7bI17UW05dmmJWKOdAmj9uR2O2cG26XPTgMxwNiCzaRgwow 4EsHgY3qRQAKXzp1RrgyJj+3oBAWW+tL1BIZAsLzALJo8L/nojEFAzpRCr+/HQKCRRzM OwP4GABDb/lxeC1+vT7z9elFAjaEoqH9F6ZRWjYf+6S36vFusyUFFxXgAe9QLMGkF5m3 SISZ79hPhgRjSiwZj/F0fGiA5fQsJtXdn6+V2ZRcgaCGxwiARx+hExIBc4yVqGrKYV4B rpaj8o56cdqUO1rQOINC6GEWgGdFybBR29V/IHLdvMr0lbnr3cPW9BbzDF9bQiLgFuLh QNvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Eu77uFwN5GFsT+LaG23RdKOC5VPPK+uGS1pjdFCkIMY=; b=occWEp8ZlhAL7lDhm616DEU/aczf5DxxYtQ5IC644m1xchl/Yov42UrESxl1NccZAf W9P+73mGdbeq/r550pjKFXgD3mYZr7SzeEHw1P98HXqM/DmnfDi5B9GvhjMaPZQF0RdD iYTQwDTeSavWeFCe+TA0UvdfdnZHnCjAsyzTWVjuRbfzNwCNkdb4lJsQeZjyjQuJ9jUJ lFXyYmPjZKmckcXtZxsmq/WWzOJKrqlwYakogjIO6NFodLbNhDcnfdYzCBwbzRK2mDVC rjuWDuAxxfGUixej79YjDd+BvEVuNgvlM505kGZwqZW9oLG+HBr/uybcdRZsum/BzcIy waqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pk25si1032940ejb.402.2021.02.24.05.13.36; Wed, 24 Feb 2021 05:14:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234327AbhBXLdy (ORCPT + 99 others); Wed, 24 Feb 2021 06:33:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232806AbhBXLdy (ORCPT ); Wed, 24 Feb 2021 06:33:54 -0500 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A8182C061574 for ; Wed, 24 Feb 2021 03:33:13 -0800 (PST) Received: from dude02.hi.pengutronix.de ([2001:67c:670:100:1d::28]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lEsPn-0008Fg-Jm; Wed, 24 Feb 2021 12:33:11 +0100 Received: from sha by dude02.hi.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1lEsPn-0002GP-48; Wed, 24 Feb 2021 12:33:11 +0100 From: Sascha Hauer To: ecryptfs@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Tyler Hicks , Sascha Hauer Subject: [PATCH] ecryptfs: Fix typo in message Date: Wed, 24 Feb 2021 12:30:59 +0100 Message-Id: <20210224113059.28445-1-s.hauer@pengutronix.de> X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::28 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ecryptfs_decrypt_page() issues a warning "Error encrypting extent". This should be "Error decrypting extent" instead. Signed-off-by: Sascha Hauer --- fs/ecryptfs/crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index a48116aae02c..0fed4ff02f69 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c @@ -535,7 +535,7 @@ int ecryptfs_decrypt_page(struct page *page) rc = crypt_extent(crypt_stat, page, page, extent_offset, DECRYPT); if (rc) { - printk(KERN_ERR "%s: Error encrypting extent; " + printk(KERN_ERR "%s: Error decrypting extent; " "rc = [%d]\n", __func__, rc); goto out; } -- 2.29.2