aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorHarvey Harrison <harvey.harrison@gmail.com>2008-03-05 18:03:59 -0500
committerJames Morris <jmorris@namei.org>2008-04-18 06:26:07 -0400
commitdd6f953adb5c4deb9cd7b6a5054e7d5eafe4ed71 (patch)
tree0ed459ca8da43b7e0486c8f0a840845a731920bf /security/selinux/hooks.c
parentb0c636b99997c8594da6a46e166ce4fcf6956fda (diff)
security: replace remaining __FUNCTION__ occurrences
__FUNCTION__ is gcc-specific, use __func__ Signed-off-by: Harvey Harrison <harvey.harrison@gmail.com> Cc: James Morris <jmorris@namei.org> Cc: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index d569cde440e6..74bb74b4db08 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -668,7 +668,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
668 rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid); 668 rc = security_fs_use(sb->s_type->name, &sbsec->behavior, &sbsec->sid);
669 if (rc) { 669 if (rc) {
670 printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n", 670 printk(KERN_WARNING "%s: security_fs_use(%s) returned %d\n",
671 __FUNCTION__, sb->s_type->name, rc); 671 __func__, sb->s_type->name, rc);
672 goto out; 672 goto out;
673 } 673 }
674 674
@@ -1134,7 +1134,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
1134 } 1134 }
1135 if (!dentry) { 1135 if (!dentry) {
1136 printk(KERN_WARNING "%s: no dentry for dev=%s " 1136 printk(KERN_WARNING "%s: no dentry for dev=%s "
1137 "ino=%ld\n", __FUNCTION__, inode->i_sb->s_id, 1137 "ino=%ld\n", __func__, inode->i_sb->s_id,
1138 inode->i_ino); 1138 inode->i_ino);
1139 goto out_unlock; 1139 goto out_unlock;
1140 } 1140 }
@@ -1172,7 +1172,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
1172 if (rc < 0) { 1172 if (rc < 0) {
1173 if (rc != -ENODATA) { 1173 if (rc != -ENODATA) {
1174 printk(KERN_WARNING "%s: getxattr returned " 1174 printk(KERN_WARNING "%s: getxattr returned "
1175 "%d for dev=%s ino=%ld\n", __FUNCTION__, 1175 "%d for dev=%s ino=%ld\n", __func__,
1176 -rc, inode->i_sb->s_id, inode->i_ino); 1176 -rc, inode->i_sb->s_id, inode->i_ino);
1177 kfree(context); 1177 kfree(context);
1178 goto out_unlock; 1178 goto out_unlock;
@@ -1187,7 +1187,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
1187 if (rc) { 1187 if (rc) {
1188 printk(KERN_WARNING "%s: context_to_sid(%s) " 1188 printk(KERN_WARNING "%s: context_to_sid(%s) "
1189 "returned %d for dev=%s ino=%ld\n", 1189 "returned %d for dev=%s ino=%ld\n",
1190 __FUNCTION__, context, -rc, 1190 __func__, context, -rc,
1191 inode->i_sb->s_id, inode->i_ino); 1191 inode->i_sb->s_id, inode->i_ino);
1192 kfree(context); 1192 kfree(context);
1193 /* Leave with the unlabeled SID */ 1193 /* Leave with the unlabeled SID */
@@ -2437,7 +2437,7 @@ static int selinux_inode_init_security(struct inode *inode, struct inode *dir,
2437 printk(KERN_WARNING "%s: " 2437 printk(KERN_WARNING "%s: "
2438 "security_transition_sid failed, rc=%d (dev=%s " 2438 "security_transition_sid failed, rc=%d (dev=%s "
2439 "ino=%ld)\n", 2439 "ino=%ld)\n",
2440 __FUNCTION__, 2440 __func__,
2441 -rc, inode->i_sb->s_id, inode->i_ino); 2441 -rc, inode->i_sb->s_id, inode->i_ino);
2442 return rc; 2442 return rc;
2443 } 2443 }
@@ -2671,7 +2671,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, char *name,
2671 rc = security_context_to_sid(value, size, &newsid); 2671 rc = security_context_to_sid(value, size, &newsid);
2672 if (rc) { 2672 if (rc) {
2673 printk(KERN_WARNING "%s: unable to obtain SID for context " 2673 printk(KERN_WARNING "%s: unable to obtain SID for context "
2674 "%s, rc=%d\n", __FUNCTION__, (char*)value, -rc); 2674 "%s, rc=%d\n", __func__, (char*)value, -rc);
2675 return; 2675 return;
2676 } 2676 }
2677 2677
@@ -5017,14 +5017,14 @@ static int selinux_register_security (const char *name, struct security_operatio
5017{ 5017{
5018 if (secondary_ops != original_ops) { 5018 if (secondary_ops != original_ops) {
5019 printk(KERN_ERR "%s: There is already a secondary security " 5019 printk(KERN_ERR "%s: There is already a secondary security "
5020 "module registered.\n", __FUNCTION__); 5020 "module registered.\n", __func__);
5021 return -EINVAL; 5021 return -EINVAL;
5022 } 5022 }
5023 5023
5024 secondary_ops = ops; 5024 secondary_ops = ops;
5025 5025
5026 printk(KERN_INFO "%s: Registering secondary module %s\n", 5026 printk(KERN_INFO "%s: Registering secondary module %s\n",
5027 __FUNCTION__, 5027 __func__,
5028 name); 5028 name);
5029 5029
5030 return 0; 5030 return 0;