@@ -1053,7 +1053,7 @@ int seccomp_load_syscall_filter_set(uint32_t default_action, const SyscallFilter
10531053 SECCOMP_FOREACH_LOCAL_ARCH (arch ) {
10541054 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
10551055
1056- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1056+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
10571057
10581058 r = seccomp_init_for_arch (& seccomp , arch , default_action );
10591059 if (r < 0 )
@@ -1087,7 +1087,7 @@ int seccomp_load_syscall_filter_set_raw(uint32_t default_action, Hashmap* filter
10871087 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
10881088 void * syscall_id , * val ;
10891089
1090- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1090+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
10911091
10921092 r = seccomp_init_for_arch (& seccomp , arch , default_action );
10931093 if (r < 0 )
@@ -1229,7 +1229,7 @@ int seccomp_restrict_namespaces(unsigned long retain) {
12291229 SECCOMP_FOREACH_LOCAL_ARCH (arch ) {
12301230 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
12311231
1232- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1232+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
12331233
12341234 r = seccomp_init_for_arch (& seccomp , arch , SCMP_ACT_ALLOW );
12351235 if (r < 0 )
@@ -1281,7 +1281,7 @@ int seccomp_restrict_namespaces(unsigned long retain) {
12811281 continue ;
12821282 }
12831283
1284- log_debug ("Blocking %s." , namespace_flag_map [i ].name );
1284+ log_trace ("Blocking %s." , namespace_flag_map [i ].name );
12851285
12861286 r = seccomp_rule_add_exact (
12871287 seccomp ,
@@ -1347,7 +1347,7 @@ int seccomp_protect_sysctl(void) {
13471347 SECCOMP_FOREACH_LOCAL_ARCH (arch ) {
13481348 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
13491349
1350- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1350+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
13511351
13521352 if (IN_SET (arch ,
13531353 SCMP_ARCH_AARCH64 ,
@@ -1423,7 +1423,7 @@ int seccomp_restrict_address_families(Set *address_families, bool allow_list) {
14231423 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
14241424 bool supported ;
14251425
1426- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1426+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
14271427
14281428 switch (arch ) {
14291429
@@ -1601,7 +1601,7 @@ int seccomp_restrict_realtime_full(int error_code) {
16011601 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
16021602 int p ;
16031603
1604- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1604+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
16051605
16061606 r = seccomp_init_for_arch (& seccomp , arch , SCMP_ACT_ALLOW );
16071607 if (r < 0 )
@@ -1693,7 +1693,7 @@ int seccomp_memory_deny_write_execute(void) {
16931693 _cleanup_ (seccomp_releasep ) scmp_filter_ctx seccomp = NULL ;
16941694 int filter_syscall = 0 , block_syscall = 0 , shmat_syscall = 0 , r ;
16951695
1696- log_debug ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
1696+ log_trace ("Operating on architecture: %s" , seccomp_arch_to_string (arch ));
16971697
16981698 switch (arch ) {
16991699
0 commit comments