seccomp: Use pr_fmt
Avoid open-coding "seccomp: " prefixes for pr_*() calls. Signed-off-by: Kees Cook <keescook@chromium.org>
This commit is contained in:
parent
81a0c8bc82
commit
e68f9d49dd
|
@ -13,6 +13,7 @@
|
||||||
* Mode 2 allows user-defined system call filters in the form
|
* Mode 2 allows user-defined system call filters in the form
|
||||||
* of Berkeley Packet Filters/Linux Socket Filters.
|
* of Berkeley Packet Filters/Linux Socket Filters.
|
||||||
*/
|
*/
|
||||||
|
#define pr_fmt(fmt) "seccomp: " fmt
|
||||||
|
|
||||||
#include <linux/refcount.h>
|
#include <linux/refcount.h>
|
||||||
#include <linux/audit.h>
|
#include <linux/audit.h>
|
||||||
|
@ -1873,7 +1874,7 @@ static int __init seccomp_sysctl_init(void)
|
||||||
|
|
||||||
hdr = register_sysctl_paths(seccomp_sysctl_path, seccomp_sysctl_table);
|
hdr = register_sysctl_paths(seccomp_sysctl_path, seccomp_sysctl_table);
|
||||||
if (!hdr)
|
if (!hdr)
|
||||||
pr_warn("seccomp: sysctl registration failed\n");
|
pr_warn("sysctl registration failed\n");
|
||||||
else
|
else
|
||||||
kmemleak_not_leak(hdr);
|
kmemleak_not_leak(hdr);
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue