diff options
author | James Morris <jmorris@namei.org> | 2008-02-26 04:42:02 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-04-18 06:26:05 -0400 |
commit | 454d972c24e6efce3d7b07a97f1ad18b14845de9 (patch) | |
tree | 05cd06c8389ca0cdc2f493d7fb680678a0691d27 /security/selinux/ss/ebitmap.c | |
parent | 98e9894650455426f67c2157db4f39bd14fac2f6 (diff) |
SELinux: unify printk messages
Replace "security:" prefixes in printk messages with "SELinux"
to help users identify the source of the messages. Also fix a
couple of minor formatting issues.
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/ss/ebitmap.c')
-rw-r--r-- | security/selinux/ss/ebitmap.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/security/selinux/ss/ebitmap.c b/security/selinux/ss/ebitmap.c index 920b5e36a1af..e499af474b35 100644 --- a/security/selinux/ss/ebitmap.c +++ b/security/selinux/ss/ebitmap.c | |||
@@ -364,7 +364,7 @@ int ebitmap_read(struct ebitmap *e, void *fp) | |||
364 | count = le32_to_cpu(buf[2]); | 364 | count = le32_to_cpu(buf[2]); |
365 | 365 | ||
366 | if (mapunit != sizeof(u64) * 8) { | 366 | if (mapunit != sizeof(u64) * 8) { |
367 | printk(KERN_ERR "security: ebitmap: map size %u does not " | 367 | printk(KERN_ERR "SELinux: ebitmap: map size %u does not " |
368 | "match my size %Zd (high bit was %d)\n", | 368 | "match my size %Zd (high bit was %d)\n", |
369 | mapunit, sizeof(u64) * 8, e->highbit); | 369 | mapunit, sizeof(u64) * 8, e->highbit); |
370 | goto bad; | 370 | goto bad; |
@@ -382,19 +382,19 @@ int ebitmap_read(struct ebitmap *e, void *fp) | |||
382 | for (i = 0; i < count; i++) { | 382 | for (i = 0; i < count; i++) { |
383 | rc = next_entry(&startbit, fp, sizeof(u32)); | 383 | rc = next_entry(&startbit, fp, sizeof(u32)); |
384 | if (rc < 0) { | 384 | if (rc < 0) { |
385 | printk(KERN_ERR "security: ebitmap: truncated map\n"); | 385 | printk(KERN_ERR "SELinux: ebitmap: truncated map\n"); |
386 | goto bad; | 386 | goto bad; |
387 | } | 387 | } |
388 | startbit = le32_to_cpu(startbit); | 388 | startbit = le32_to_cpu(startbit); |
389 | 389 | ||
390 | if (startbit & (mapunit - 1)) { | 390 | if (startbit & (mapunit - 1)) { |
391 | printk(KERN_ERR "security: ebitmap start bit (%d) is " | 391 | printk(KERN_ERR "SELinux: ebitmap start bit (%d) is " |
392 | "not a multiple of the map unit size (%u)\n", | 392 | "not a multiple of the map unit size (%u)\n", |
393 | startbit, mapunit); | 393 | startbit, mapunit); |
394 | goto bad; | 394 | goto bad; |
395 | } | 395 | } |
396 | if (startbit > e->highbit - mapunit) { | 396 | if (startbit > e->highbit - mapunit) { |
397 | printk(KERN_ERR "security: ebitmap start bit (%d) is " | 397 | printk(KERN_ERR "SELinux: ebitmap start bit (%d) is " |
398 | "beyond the end of the bitmap (%u)\n", | 398 | "beyond the end of the bitmap (%u)\n", |
399 | startbit, (e->highbit - mapunit)); | 399 | startbit, (e->highbit - mapunit)); |
400 | goto bad; | 400 | goto bad; |
@@ -405,7 +405,7 @@ int ebitmap_read(struct ebitmap *e, void *fp) | |||
405 | tmp = kzalloc(sizeof(*tmp), GFP_KERNEL); | 405 | tmp = kzalloc(sizeof(*tmp), GFP_KERNEL); |
406 | if (!tmp) { | 406 | if (!tmp) { |
407 | printk(KERN_ERR | 407 | printk(KERN_ERR |
408 | "security: ebitmap: out of memory\n"); | 408 | "SELinux: ebitmap: out of memory\n"); |
409 | rc = -ENOMEM; | 409 | rc = -ENOMEM; |
410 | goto bad; | 410 | goto bad; |
411 | } | 411 | } |
@@ -418,7 +418,7 @@ int ebitmap_read(struct ebitmap *e, void *fp) | |||
418 | } | 418 | } |
419 | n = tmp; | 419 | n = tmp; |
420 | } else if (startbit <= n->startbit) { | 420 | } else if (startbit <= n->startbit) { |
421 | printk(KERN_ERR "security: ebitmap: start bit %d" | 421 | printk(KERN_ERR "SELinux: ebitmap: start bit %d" |
422 | " comes after start bit %d\n", | 422 | " comes after start bit %d\n", |
423 | startbit, n->startbit); | 423 | startbit, n->startbit); |
424 | goto bad; | 424 | goto bad; |
@@ -426,7 +426,7 @@ int ebitmap_read(struct ebitmap *e, void *fp) | |||
426 | 426 | ||
427 | rc = next_entry(&map, fp, sizeof(u64)); | 427 | rc = next_entry(&map, fp, sizeof(u64)); |
428 | if (rc < 0) { | 428 | if (rc < 0) { |
429 | printk(KERN_ERR "security: ebitmap: truncated map\n"); | 429 | printk(KERN_ERR "SELinux: ebitmap: truncated map\n"); |
430 | goto bad; | 430 | goto bad; |
431 | } | 431 | } |
432 | map = le64_to_cpu(map); | 432 | map = le64_to_cpu(map); |