From: Ye Bin <[email protected]> Fix the broken design based on Jarkko Sakkinen's suggestions as follows:
1. Remove the ad-hoc compilation flag (i.e., CAAM_DEBUG). 2. Substitute pr_info calls with pr_debug calls. Closes: https://patchwork.kernel.org/project/linux-integrity/patch/[email protected]/ Signed-off-by: Ye Bin <[email protected]> --- security/keys/trusted-keys/trusted_caam.c | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/security/keys/trusted-keys/trusted_caam.c b/security/keys/trusted-keys/trusted_caam.c index 601943ce0d60..c903ee7328ca 100644 --- a/security/keys/trusted-keys/trusted_caam.c +++ b/security/keys/trusted-keys/trusted_caam.c @@ -28,16 +28,10 @@ static const match_table_t key_tokens = { {opt_err, NULL} }; -#ifdef CAAM_DEBUG static inline void dump_options(const struct caam_pkey_info *pkey_info) { - pr_info("key encryption algo %d\n", pkey_info->key_enc_algo); + pr_debug("key encryption algo %d\n", pkey_info->key_enc_algo); } -#else -static inline void dump_options(const struct caam_pkey_info *pkey_info) -{ -} -#endif static int get_pkey_options(char *c, struct caam_pkey_info *pkey_info) -- 2.34.1
