Loading fs/ecryptfs/debug.c +3 −19 Original line number Diff line number Diff line Loading @@ -97,25 +97,9 @@ void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok) */ void ecryptfs_dump_hex(char *data, int bytes) { int i = 0; int add_newline = 1; if (ecryptfs_verbosity < 1) return; if (bytes != 0) { printk(KERN_DEBUG "0x%.2x.", (unsigned char)data[i]); i++; } while (i < bytes) { printk("0x%.2x.", (unsigned char)data[i]); i++; if (i % 16 == 0) { printk("\n"); add_newline = 0; } else add_newline = 1; } if (add_newline) printk("\n"); } print_hex_dump(KERN_DEBUG, "ecryptfs: ", DUMP_PREFIX_OFFSET, 16, 1, data, bytes, false); } Loading
fs/ecryptfs/debug.c +3 −19 Original line number Diff line number Diff line Loading @@ -97,25 +97,9 @@ void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok) */ void ecryptfs_dump_hex(char *data, int bytes) { int i = 0; int add_newline = 1; if (ecryptfs_verbosity < 1) return; if (bytes != 0) { printk(KERN_DEBUG "0x%.2x.", (unsigned char)data[i]); i++; } while (i < bytes) { printk("0x%.2x.", (unsigned char)data[i]); i++; if (i % 16 == 0) { printk("\n"); add_newline = 0; } else add_newline = 1; } if (add_newline) printk("\n"); } print_hex_dump(KERN_DEBUG, "ecryptfs: ", DUMP_PREFIX_OFFSET, 16, 1, data, bytes, false); }