selinux: Cleanup printk logging in sidtab
authorpeter enderborg <peter.enderborg@sony.com>
Tue, 12 Jun 2018 08:09:08 +0000 (10:09 +0200)
committerPaul Moore <paul@paul-moore.com>
Tue, 19 Jun 2018 17:37:58 +0000 (13:37 -0400)
Replace printk with pr_* to avoid checkpatch warnings.

Signed-off-by: Peter Enderborg <peter.enderborg@sony.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
security/selinux/ss/sidtab.c

index 5be31b7af2252fa184a59b2e11750a1ae179b5f8..fd75a12fa8fca109b1dbe15d741aa894e69b1a1c 100644 (file)
@@ -214,8 +214,7 @@ int sidtab_context_to_sid(struct sidtab *s,
                }
                sid = s->next_sid++;
                if (context->len)
-                       printk(KERN_INFO
-                      "SELinux:  Context %s is not valid (left unmapped).\n",
+                       pr_info("SELinux:  Context %s is not valid (left unmapped).\n",
                               context->str);
                ret = sidtab_insert(s, sid, context);
                if (ret)
@@ -253,7 +252,7 @@ void sidtab_hash_eval(struct sidtab *h, char *tag)
                }
        }
 
-       printk(KERN_DEBUG "%s:  %d entries and %d/%d buckets used, longest "
+       pr_debug("%s:  %d entries and %d/%d buckets used, longest "
               "chain length %d\n", tag, h->nel, slots_used, SIDTAB_SIZE,
               max_chain_len);
 }