diff options
author | Harvey Harrison <harvey.harrison@gmail.com> | 2008-03-05 18:03:59 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-04-18 06:26:07 -0400 |
commit | dd6f953adb5c4deb9cd7b6a5054e7d5eafe4ed71 (patch) | |
tree | 0ed459ca8da43b7e0486c8f0a840845a731920bf /security/selinux/hooks.c | |
parent | b0c636b99997c8594da6a46e166ce4fcf6956fda (diff) |
security: replace remaining __FUNCTION__ occurrences
__FUNCTION__ is gcc-specific, use __func__
Signed-off-by: Harvey Harrison <harvey.harrison@gmail.com>
Cc: James Morris <jmorris@namei.org>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r-- | security/selinux/hooks.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d569cde440e6..74bb74b4db08 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -668,7 +668,7 @@ static int selinux_set_mnt_opts(struct super_block *sb, | |||
668 | rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); | 668 | rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); |
669 | if (rc) { | 669 | if (rc) { |
670 | printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", | 670 | printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", |
671 | __FUNCTION__, sb->s_type->name, rc); | 671 | __func__, sb->s_type->name, rc); |
672 | goto out; | 672 | goto out; |
673 | } | 673 | } |
674 | 674 | ||
@@ -1134,7 +1134,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1134 | } | 1134 | } |
1135 | if (!dentry) { | 1135 | if (!dentry) { |
1136 | printk(KERN_WARNING "%s: no dentry for dev=%s " | 1136 | printk(KERN_WARNING "%s: no dentry for dev=%s " |
1137 | "ino=%ld\n", __FUNCTION__, inode->i_sb->s_id, | 1137 | "ino=%ld\n", __func__, inode->i_sb->s_id, |
1138 | inode->i_ino); | 1138 | inode->i_ino); |
1139 | goto out_unlock; | 1139 | goto out_unlock; |
1140 | } | 1140 | } |
@@ -1172,7 +1172,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1172 | if (rc < 0) { | 1172 | if (rc < 0) { |
1173 | if (rc != -ENODATA) { | 1173 | if (rc != -ENODATA) { |
1174 | printk(KERN_WARNING "%s: getxattr returned " | 1174 | printk(KERN_WARNING "%s: getxattr returned " |
1175 | "%d for dev=%s ino=%ld\n", __FUNCTION__, | 1175 | "%d for dev=%s ino=%ld\n", __func__, |
1176 | -rc, inode->i_sb->s_id, inode->i_ino); | 1176 | -rc, inode->i_sb->s_id, inode->i_ino); |
1177 | kfree(context); | 1177 | kfree(context); |
1178 | goto out_unlock; | 1178 | goto out_unlock; |
@@ -1187,7 +1187,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent | |||
1187 | if (rc) { | 1187 | if (rc) { |
1188 | printk(KERN_WARNING "%s: context_to_sid(%s) " | 1188 | printk(KERN_WARNING "%s: context_to_sid(%s) " |
1189 | "returned %d for dev=%s ino=%ld\n", | 1189 | "returned %d for dev=%s ino=%ld\n", |
1190 | __FUNCTION__, context, -rc, | 1190 | __func__, context, -rc, |
1191 | inode->i_sb->s_id, inode->i_ino); | 1191 | inode->i_sb->s_id, inode->i_ino); |
1192 | kfree(context); | 1192 | kfree(context); |
1193 | /* Leave with the unlabeled SID */ | 1193 | /* Leave with the unlabeled SID */ |
@@ -2437,7 +2437,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir, | |||
2437 | printk(KERN_WARNING "%s: " | 2437 | printk(KERN_WARNING "%s: " |
2438 | "security_transition_sid failed, rc=%d (dev=%s " | 2438 | "security_transition_sid failed, rc=%d (dev=%s " |
2439 | "ino=%ld)\n", | 2439 | "ino=%ld)\n", |
2440 | __FUNCTION__, | 2440 | __func__, |
2441 | -rc, inode->i_sb->s_id, inode->i_ino); | 2441 | -rc, inode->i_sb->s_id, inode->i_ino); |
2442 | return rc; | 2442 | return rc; |
2443 | } | 2443 | } |
@@ -2671,7 +2671,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, char *name, | |||
2671 | rc = security_context_to_sid(value, size, &newsid); | 2671 | rc = security_context_to_sid(value, size, &newsid); |
2672 | if (rc) { | 2672 | if (rc) { |
2673 | printk(KERN_WARNING "%s: unable to obtain SID for context " | 2673 | printk(KERN_WARNING "%s: unable to obtain SID for context " |
2674 | "%s, rc=%d\n", __FUNCTION__, (char*)value, -rc); | 2674 | "%s, rc=%d\n", __func__, (char*)value, -rc); |
2675 | return; | 2675 | return; |
2676 | } | 2676 | } |
2677 | 2677 | ||
@@ -5017,14 +5017,14 @@ static int selinux_register_security (const char *name, struct security_operatio | |||
5017 | { | 5017 | { |
5018 | if (secondary_ops != original_ops) { | 5018 | if (secondary_ops != original_ops) { |
5019 | printk(KERN_ERR "%s: There is already a secondary security " | 5019 | printk(KERN_ERR "%s: There is already a secondary security " |
5020 | "module registered.\n", __FUNCTION__); | 5020 | "module registered.\n", __func__); |
5021 | return -EINVAL; | 5021 | return -EINVAL; |
5022 | } | 5022 | } |
5023 | 5023 | ||
5024 | secondary_ops = ops; | 5024 | secondary_ops = ops; |
5025 | 5025 | ||
5026 | printk(KERN_INFO "%s: Registering secondary module %s\n", | 5026 | printk(KERN_INFO "%s: Registering secondary module %s\n", |
5027 | __FUNCTION__, | 5027 | __func__, |
5028 | name); | 5028 | name); |
5029 | 5029 | ||
5030 | return 0; | 5030 | return 0; |