Received: by 10.192.165.148 with SMTP id m20csp1348639imm; Thu, 10 May 2018 09:18:29 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpIgqnr0X+Uh+LHre6Wi+EaJhBTVxuZfyAmv5mnYZ2aa8Z3ODLBWLaERkolVeEE0baexFMI X-Received: by 2002:a17:902:1682:: with SMTP id h2-v6mr1964010plh.127.1525969109719; Thu, 10 May 2018 09:18:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525969109; cv=none; d=google.com; s=arc-20160816; b=bkJqEA4oUiPmyhyt+/HHoi+DK92i0IDHuKk50MadeHm2d9DGealwbKDaFrkll3HDO8 OTOvjooorhkFBt8lUJHGjGqFcHrGdgRYGHbXjZ/M7Nf5IZAtJw1RYlWoseY3Gra14iHH tretScOXDWiyl8IjN5iq4YYRVIStpCDjZyBUcRLrcm8E5bu5iivN3iPZnhs9gtGxVFm/ EHJVLJVyogtIiVI8VyDCP05XYbyGj8Xli34XBXOPHuaPp8JauckI3URZ4cyTAsJzLBBD S4WaasXbC56osPa3LijDveXRaanlW3UTXM8fV3mPUy1zjxkMlgsf2+SU1f0sH/34mmL4 kkUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=P0q6ilsYRdRm60PS2gvMsul2MR+hquXlOTOgNoFbqkI=; b=vG2oLByM0n5JCkisYzcLk72ZphAn9RDQeifyiyJmUPNVDhxVBN3Df+Zao6s9hmGErH 3PNNDhQRDDhL5REvL5E3mrbidkgzNQi/LCMxghg2XIuqSRD7TAYD34W4VaigNLPfYhWC SHVBitmsOnwoKIKPwbUH5wWbikgsyLeiXnsATKWbdRZnM0/t6DREbV2ian1+ccxbyoyW uCJYE1zXF8qdPwhbC1xViE7yU2TCWB+uHfBjWuN10pGNX81s4J+5BHqRWZfKTnTCerKs 2A4hG6M4qTTNgXmf3fen9BSTSmgnfJOpY+3ZlVNyZ0jF6aKpMmviB8y384EpG2Ng2ut5 /jbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=cwBApNmN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si1103490plb.204.2018.05.10.09.17.51; Thu, 10 May 2018 09:18:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=cwBApNmN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966346AbeEJQP4 (ORCPT + 99 others); Thu, 10 May 2018 12:15:56 -0400 Received: from mail-lf0-f67.google.com ([209.85.215.67]:46105 "EHLO mail-lf0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966187AbeEJQPy (ORCPT ); Thu, 10 May 2018 12:15:54 -0400 Received: by mail-lf0-f67.google.com with SMTP id x7-v6so3742629lff.13 for ; Thu, 10 May 2018 09:15:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=P0q6ilsYRdRm60PS2gvMsul2MR+hquXlOTOgNoFbqkI=; b=cwBApNmNdOgN8qrqsI7bmec8ukEi3CJPEsNdE/YwRUizLL7FEG43P/qkISEFbXDMiK OAh4HjtsyhR3CgiwN3NLXrzMwpCCDv8Sh/5eAo1099e60cLf0sbJu0WHGT7Yh3FERwRE QvcnCOitwdU9o8L94mBOtisMG2zx4cjKTxIWZWTo4lGE6kLHjvsstikqOgL5fnF2zFEs cS9zvqaG23t+Y+c3r6Q27sEYjZi3BY19QuBuTLmDqCd1qHBjjyrAfC24dNWvQZ+JqkTm otqfE4xllKWRs/xvQnz2Ng38HSn+1m9thWSE9qBV0j4xpdT1TFfCT8lXs5RlOkvg+WTT cXwQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=P0q6ilsYRdRm60PS2gvMsul2MR+hquXlOTOgNoFbqkI=; b=cQOYebksziljbqXoo4PBoi2WyiWabSKHT+kAp6DiiaTX1r4/T9pHZ5uITWQSRUPhLY /+0Sv2AJyvdaV9LdXjTa84C1sTaFH+nz1EwQPtZcTJWfJN78aGsR2tlXvVhwAzpLKjBN urnNp0GKVeTJeD/uKkyyifXN9t0BlPRyhfflF2Pe9zYzNBP7wm96Rrk7K/wP86cjgo3v yRKu0x7S8TnFP5H4PZj1RXEXHkbt3y4SlI0yRlfG4phD3vPSsD5hbSIaHLUWdMafVC3b lr94IiG8oO1rzApmW/LYtE8+aW6cT2AxNlv3GUs1DZJZalOsyDHe4Rgl8UIbVuy3p5YE QWYw== X-Gm-Message-State: ALKqPwehBgEkSvE0W3Sq3YCkrkwP3D/PCElvSXckhZUy1Qnbsj7wLPoR Vve7UFsBwTHwk/7HUeAHteE8o2DssfeaBJJj78Vy X-Received: by 2002:a2e:c41:: with SMTP id o1-v6mr1572072ljd.87.1525968952558; Thu, 10 May 2018 09:15:52 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a19:a947:0:0:0:0:0 with HTTP; Thu, 10 May 2018 09:15:51 -0700 (PDT) X-Originating-IP: [68.177.129.184] In-Reply-To: <799f2558f37c5480d42c03e3465754aa8bb30e70.1525964385.git.joe@perches.com> References: <799f2558f37c5480d42c03e3465754aa8bb30e70.1525964385.git.joe@perches.com> From: Paul Moore Date: Thu, 10 May 2018 12:15:51 -0400 Message-ID: Subject: Re: [PATCH 15/18] security: Remove pr_fmt duplicate logging prefixes To: Joe Perches Cc: Stephen Smalley , Eric Paris , James Morris , "Serge E. Hallyn" , selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 10, 2018 at 11:45 AM, Joe Perches wrote: > Converting pr_fmt from a simple define to use KBUILD_MODNAME added > some duplicate logging prefixes to existing uses. > > Remove them. > > Signed-off-by: Joe Perches > --- > security/selinux/selinuxfs.c | 29 ++++++++++++++--------------- > 1 file changed, 14 insertions(+), 15 deletions(-) Acked-by: Paul Moore > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c > index c0cadbc5f85c..be8f186a6256 100644 > --- a/security/selinux/selinuxfs.c > +++ b/security/selinux/selinuxfs.c > @@ -515,19 +515,19 @@ static int sel_make_policy_nodes(struct selinux_fs_info *fsi) > > ret = sel_make_bools(fsi); > if (ret) { > - pr_err("SELinux: failed to load policy booleans\n"); > + pr_err("failed to load policy booleans\n"); > return ret; > } > > ret = sel_make_classes(fsi); > if (ret) { > - pr_err("SELinux: failed to load policy classes\n"); > + pr_err("failed to load policy classes\n"); > return ret; > } > > ret = sel_make_policycap(fsi); > if (ret) { > - pr_err("SELinux: failed to load policy capabilities\n"); > + pr_err("failed to load policy capabilities\n"); > return ret; > } > > @@ -570,7 +570,7 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf, > > length = security_load_policy(fsi->state, data, count); > if (length) { > - pr_warn_ratelimited("SELinux: failed to load policy\n"); > + pr_warn_ratelimited("failed to load policy\n"); > goto out; > } > > @@ -620,8 +620,8 @@ static ssize_t sel_write_context(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > - "payload max\n", __func__, len); > + pr_err("%s: context size (%u) exceeds payload max\n", > + __func__, len); > goto out; > } > > @@ -956,8 +956,8 @@ static ssize_t sel_write_create(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > - "payload max\n", __func__, len); > + pr_err("%s: context size (%u) exceeds payload max\n", > + __func__, len); > goto out; > } > > @@ -1147,8 +1147,8 @@ static ssize_t sel_write_member(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > - "payload max\n", __func__, len); > + pr_err("%s: context size (%u) exceeds payload max\n", > + __func__, len); > goto out; > } > > @@ -1389,8 +1389,8 @@ static int sel_make_bools(struct selinux_fs_info *fsi) > ret = security_genfs_sid(fsi->state, "selinuxfs", page, > SECCLASS_FILE, &sid); > if (ret) { > - pr_warn_ratelimited("SELinux: no sid found, defaulting to security isid for %s\n", > - page); > + pr_warn_ratelimited("no sid found, defaulting to security isid for %s\n", > + page); > sid = SECINITSID_SECURITY; > } > > @@ -1996,8 +1996,7 @@ static int sel_fill_super(struct super_block *sb, void *data, int silent) > goto err; > return 0; > err: > - printk(KERN_ERR "SELinux: %s: failed while creating inodes\n", > - __func__); > + pr_err("%s: failed while creating inodes\n", __func__); > > selinux_fs_info_free(sb); > > @@ -2046,7 +2045,7 @@ static int __init init_sel_fs(void) > > selinux_null.mnt = selinuxfs_mount = kern_mount(&sel_fs_type); > if (IS_ERR(selinuxfs_mount)) { > - printk(KERN_ERR "selinuxfs: could not mount!\n"); > + pr_err("selinuxfs: could not mount!\n"); > err = PTR_ERR(selinuxfs_mount); > selinuxfs_mount = NULL; > } > -- > 2.15.0 > -- paul moore www.paul-moore.com