Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp5435308imm; Tue, 19 Jun 2018 10:17:59 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKY5SkHsYqcFLLD63kJXC+gaC8TNK3M/jOH/79hUrXCXAxjMIryCVEBZWvApMDnwEAdls6K X-Received: by 2002:a63:745a:: with SMTP id e26-v6mr15372008pgn.377.1529428679280; Tue, 19 Jun 2018 10:17:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529428679; cv=none; d=google.com; s=arc-20160816; b=NOGf6BKJmVinnJrd1Gh88n3ElRWz/ir2ydozF8fsaf5eS5kUQ7EYYe41Lcr8RtYtEa ecnngEprUMok6acz766RRPzRsQJ6HO4TKnTxd0e9b8sGBPeDw1cmuqZNVwTIZnSI4IDG 9+RG4Zg80k5tTZiJZneM1o/2tlD8iIl3uRx3ujFOnvoP0sm8X9y9C8F40iT4Gjw2B7ll J3fhEP+ZIHjORmNbD2KgFMtefbEXT4XwBu4kCOXMftFNN6zMYvuKAMHmPJN+bL2rIw38 aVOmT3sRGUq1GlY7qAEn+RxdDEuef9ztee125HHZxgVUSu8XEAsiHgBu5cb0AhIF6prP prAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=dVDyg2eFp3a3mAVhkEOCC9c0A3nI5/DCaXcSGKpAQUw=; b=LKC+WyfeNRjYIPqh3cRc7mFTzIEtfsb9NsULewLl+h8cp2TbrxI40SpeLgfrKLUjZU 8IDycY8q8/kBnJXy0ua1zAdyztgqSEGhlVmkojCOgaAhsgjUrodjxB8vftd9biDr7R9D qAT7XHfsmar0kH+WSfoviZJ/tbj6ZMFsDE3EAblz3XMtWakiH5Zk7+42oMq1r8O5i4NU 0wOoAzC0xJ4xjTYrszEyjBYERDA+JN5WF21JvMvc/W4+UWcSvGUBkqad9L2xfvudrKQX BtrH0aC8s4qJd4wyNmBIT4VPuST7TFQXjxQp64exXYiFeS7fE1Kek1uQuZgkTAql4HcG 6tbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=rVw6273E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g4-v6si120166pfm.365.2018.06.19.10.17.45; Tue, 19 Jun 2018 10:17:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=rVw6273E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966999AbeFSRPi (ORCPT + 99 others); Tue, 19 Jun 2018 13:15:38 -0400 Received: from mail-lf0-f49.google.com ([209.85.215.49]:35617 "EHLO mail-lf0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966646AbeFSRPg (ORCPT ); Tue, 19 Jun 2018 13:15:36 -0400 Received: by mail-lf0-f49.google.com with SMTP id i15-v6so668471lfc.2 for ; Tue, 19 Jun 2018 10:15:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dVDyg2eFp3a3mAVhkEOCC9c0A3nI5/DCaXcSGKpAQUw=; b=rVw6273ElqWoXtkRJSm+dQK1XqbvUfdLRM1Y7Sj2srZWNTeLkcAPcX3Vq4b5JYfhb/ l5EYKY5G6liP2ijxXfUrbcvxBPtaLgrHPOhwp6rRiyrNlynN7QqyYaZgiClraRUxIWpD GX7PSRewd2IWmJ7XuKagoo5BL/pegncZBJMeQmWk9qINSBF6FAAoM8daQ9Z0skOHPuWi YO4I8gP8W0qXB+esWIVkRKQN+lg4wqLIqQo29PiLqZ/lsglNrsug9RWeR89uapHXBQXn FOd+FtJ25iYRGhNO5WArj0/r94fIyjyfagS01DQ0l7kPTMPJt+IZ05Ia6rTzPIJSg/MG FrhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dVDyg2eFp3a3mAVhkEOCC9c0A3nI5/DCaXcSGKpAQUw=; b=LjNUHz0/Fh0hTffzf3oN+F3YuJmu04rCUl5i8HKM6vbZhc7l90MRLiTV/BrupElhao ZE1MHPAVSqGil8UCdgfx9jvCWualqly3GyLtuErKR1d425FXf8PoB6HWZ/NF8sucvOWu ejQL5bCMtX5pKC8nEEuKWi9J1Q4J0tzSjfFLUBLFxJpBswC5wOFwK5u1fZ2na13kmUGC 1poOVCu+qdODfkIRUThmNgYpYGNROMUAxhQ7foBTX9BtD1iTwWDs8LC2uI2k1TFRz+CA 0oW4LzYB5KeeFK+IfK+FgTXIX8Cm5q3kN9VpFlEpCzgj9YOUyHH6tZmqOlicA0EoPOmE 01cQ== X-Gm-Message-State: APt69E0k2giOtmTicCEbywRmxzXeLcF2qIc1kxUFsXrg9MBvdve001J+ EtUxzOE02fDj65cj4gQOL1c7lNNN1GanhjL6oPmM X-Received: by 2002:a2e:4d0e:: with SMTP id a14-v6mr12170183ljb.106.1529428534897; Tue, 19 Jun 2018 10:15:34 -0700 (PDT) MIME-Version: 1.0 References: <20180612080912.7827-1-peter.enderborg@sony.com> <20180612080912.7827-8-peter.enderborg@sony.com> In-Reply-To: <20180612080912.7827-8-peter.enderborg@sony.com> From: Paul Moore Date: Tue, 19 Jun 2018 13:15:24 -0400 Message-ID: Subject: Re: [PATCH 07/13] selinux: Cleanup printk logging in selinuxfs To: peter.enderborg@sony.com Cc: Stephen Smalley , Eric Paris , James Morris , danielj@mellanox.com, dledford@redhat.com, selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, serge@hallyn.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 12, 2018 at 4:09 AM Peter Enderborg wrote: > > Replace printk with pr_* to avoid checkpatch warnings. > > Signed-off-by: Peter Enderborg > --- > security/selinux/selinuxfs.c | 10 +++++----- > 1 file changed, 5 insertions(+), 5 deletions(-) Merged, thanks. > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c > index c0cadbc5f85c..2adfade99945 100644 > --- a/security/selinux/selinuxfs.c > +++ b/security/selinux/selinuxfs.c > @@ -620,7 +620,7 @@ static ssize_t sel_write_context(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > + pr_err("SELinux: %s: context size (%u) exceeds " > "payload max\n", __func__, len); > goto out; > } > @@ -956,7 +956,7 @@ static ssize_t sel_write_create(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > + pr_err("SELinux: %s: context size (%u) exceeds " > "payload max\n", __func__, len); > goto out; > } > @@ -1147,7 +1147,7 @@ static ssize_t sel_write_member(struct file *file, char *buf, size_t size) > > length = -ERANGE; > if (len > SIMPLE_TRANSACTION_LIMIT) { > - printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " > + pr_err("SELinux: %s: context size (%u) exceeds " > "payload max\n", __func__, len); > goto out; > } > @@ -1996,7 +1996,7 @@ static int sel_fill_super(struct super_block *sb, void *data, int silent) > goto err; > return 0; > err: > - printk(KERN_ERR "SELinux: %s: failed while creating inodes\n", > + pr_err("SELinux: %s: failed while creating inodes\n", > __func__); > > selinux_fs_info_free(sb); > @@ -2046,7 +2046,7 @@ static int __init init_sel_fs(void) > > selinux_null.mnt = selinuxfs_mount = kern_mount(&sel_fs_type); > if (IS_ERR(selinuxfs_mount)) { > - printk(KERN_ERR "selinuxfs: could not mount!\n"); > + pr_err("selinuxfs: could not mount!\n"); > err = PTR_ERR(selinuxfs_mount); > selinuxfs_mount = NULL; > } > -- > 2.15.1 > -- paul moore www.paul-moore.com