OSDN Git Service

seccomp: Use pr_fmt
authorKees Cook <keescook@chromium.org>
Tue, 16 Jun 2020 05:02:56 +0000 (22:02 -0700)
committerKees Cook <keescook@chromium.org>
Fri, 10 Jul 2020 23:01:52 +0000 (16:01 -0700)
Avoid open-coding "seccomp: " prefixes for pr_*() calls.

Signed-off-by: Kees Cook <keescook@chromium.org>
kernel/seccomp.c

index ba30bff..5f0e3f3 100644 (file)
@@ -13,6 +13,7 @@
  * Mode 2 allows user-defined system call filters in the form
  *        of Berkeley Packet Filters/Linux Socket Filters.
  */
+#define pr_fmt(fmt) "seccomp: " fmt
 
 #include <linux/refcount.h>
 #include <linux/audit.h>
@@ -1873,7 +1874,7 @@ static int __init seccomp_sysctl_init(void)
 
        hdr = register_sysctl_paths(seccomp_sysctl_path, seccomp_sysctl_table);
        if (!hdr)
-               pr_warn("seccomp: sysctl registration failed\n");
+               pr_warn("sysctl registration failed\n");
        else
                kmemleak_not_leak(hdr);