[PATCH 04/13] selinux: Cleanup printk logging in hooks

Paul Moore paul at paul-moore.com
Tue Jun 19 16:44:13 UTC 2018


On Tue, Jun 12, 2018 at 4:09 AM Peter Enderborg
<peter.enderborg at sony.com> wrote:
>
> Replace printk with pr_* to avoid checkpatch warnings.
>
> Signed-off-by: Peter Enderborg <peter.enderborg at sony.com>
> ---
>  security/selinux/hooks.c | 68 +++++++++++++++++++++++-------------------------
>  1 file changed, 33 insertions(+), 35 deletions(-)

Merged, thank you.

> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 4cafe6a19167..3ab9687ac4c8 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -531,7 +531,7 @@ static int sb_finish_set_opts(struct super_block *sb)
>                    the first boot of the SELinux kernel before we have
>                    assigned xattr values to the filesystem. */
>                 if (!(root_inode->i_opflags & IOP_XATTR)) {
> -                       printk(KERN_WARNING "SELinux: (dev %s, type %s) has no "
> +                       pr_warn("SELinux: (dev %s, type %s) has no "
>                                "xattr support\n", sb->s_id, sb->s_type->name);
>                         rc = -EOPNOTSUPP;
>                         goto out;
> @@ -540,11 +540,11 @@ static int sb_finish_set_opts(struct super_block *sb)
>                 rc = __vfs_getxattr(root, root_inode, XATTR_NAME_SELINUX, NULL, 0);
>                 if (rc < 0 && rc != -ENODATA) {
>                         if (rc == -EOPNOTSUPP)
> -                               printk(KERN_WARNING "SELinux: (dev %s, type "
> +                               pr_warn("SELinux: (dev %s, type "
>                                        "%s) has no security xattr handler\n",
>                                        sb->s_id, sb->s_type->name);
>                         else
> -                               printk(KERN_WARNING "SELinux: (dev %s, type "
> +                               pr_warn("SELinux: (dev %s, type "
>                                        "%s) getxattr errno %d\n", sb->s_id,
>                                        sb->s_type->name, -rc);
>                         goto out;
> @@ -743,7 +743,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
>                         goto out;
>                 }
>                 rc = -EINVAL;
> -               printk(KERN_WARNING "SELinux: Unable to set superblock options "
> +               pr_warn("SELinux: Unable to set superblock options "
>                         "before the security server is initialized\n");
>                 goto out;
>         }
> @@ -785,7 +785,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
>                                                  mount_options[i], &sid,
>                                                  GFP_KERNEL);
>                 if (rc) {
> -                       printk(KERN_WARNING "SELinux: security_context_str_to_sid"
> +                       pr_warn("SELinux: security_context_str_to_sid"
>                                "(%s) failed for (dev %s, type %s) errno=%d\n",
>                                mount_options[i], sb->s_id, name, rc);
>                         goto out;
> @@ -861,8 +861,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
>                  */
>                 rc = security_fs_use(&selinux_state, sb);
>                 if (rc) {
> -                       printk(KERN_WARNING
> -                               "%s: security_fs_use(%s) returned %d\n",
> +                       pr_warn("%s: security_fs_use(%s) returned %d\n",
>                                         __func__, sb->s_type->name, rc);
>                         goto out;
>                 }
> @@ -948,7 +947,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
>                 if (sbsec->behavior != SECURITY_FS_USE_XATTR &&
>                         sbsec->behavior != SECURITY_FS_USE_NATIVE) {
>                         rc = -EINVAL;
> -                       printk(KERN_WARNING "SELinux: defcontext option is "
> +                       pr_warn("SELinux: defcontext option is "
>                                "invalid for this filesystem type\n");
>                         goto out;
>                 }
> @@ -970,7 +969,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
>         return rc;
>  out_double_mount:
>         rc = -EINVAL;
> -       printk(KERN_WARNING "SELinux: mount invalid.  Same superblock, different "
> +       pr_warn("SELinux: mount invalid.  Same superblock, different "
>                "security settings for (dev %s, type %s)\n", sb->s_id, name);
>         goto out;
>  }
> @@ -999,7 +998,7 @@ static int selinux_cmp_sb_context(const struct super_block *oldsb,
>         }
>         return 0;
>  mismatch:
> -       printk(KERN_WARNING "SELinux: mount invalid.  Same superblock, "
> +       pr_warn("SELinux: mount invalid.  Same superblock, "
>                             "different security settings for (dev %s, "
>                             "type %s)\n", newsb->s_id, newsb->s_type->name);
>         return -EBUSY;
> @@ -1107,7 +1106,7 @@ static int selinux_parse_opts_str(char *options,
>                 case Opt_context:
>                         if (context || defcontext) {
>                                 rc = -EINVAL;
> -                               printk(KERN_WARNING SEL_MOUNT_FAIL_MSG);
> +                               pr_warn(SEL_MOUNT_FAIL_MSG);
>                                 goto out_err;
>                         }
>                         context = match_strdup(&args[0]);
> @@ -1120,7 +1119,7 @@ static int selinux_parse_opts_str(char *options,
>                 case Opt_fscontext:
>                         if (fscontext) {
>                                 rc = -EINVAL;
> -                               printk(KERN_WARNING SEL_MOUNT_FAIL_MSG);
> +                               pr_warn(SEL_MOUNT_FAIL_MSG);
>                                 goto out_err;
>                         }
>                         fscontext = match_strdup(&args[0]);
> @@ -1133,7 +1132,7 @@ static int selinux_parse_opts_str(char *options,
>                 case Opt_rootcontext:
>                         if (rootcontext) {
>                                 rc = -EINVAL;
> -                               printk(KERN_WARNING SEL_MOUNT_FAIL_MSG);
> +                               pr_warn(SEL_MOUNT_FAIL_MSG);
>                                 goto out_err;
>                         }
>                         rootcontext = match_strdup(&args[0]);
> @@ -1146,7 +1145,7 @@ static int selinux_parse_opts_str(char *options,
>                 case Opt_defcontext:
>                         if (context || defcontext) {
>                                 rc = -EINVAL;
> -                               printk(KERN_WARNING SEL_MOUNT_FAIL_MSG);
> +                               pr_warn(SEL_MOUNT_FAIL_MSG);
>                                 goto out_err;
>                         }
>                         defcontext = match_strdup(&args[0]);
> @@ -1159,7 +1158,7 @@ static int selinux_parse_opts_str(char *options,
>                         break;
>                 default:
>                         rc = -EINVAL;
> -                       printk(KERN_WARNING "SELinux:  unknown mount option\n");
> +                       pr_warn("SELinux:  unknown mount option\n");
>                         goto out_err;
>
>                 }
> @@ -1615,7 +1614,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
>                 dput(dentry);
>                 if (rc < 0) {
>                         if (rc != -ENODATA) {
> -                               printk(KERN_WARNING "SELinux: %s:  getxattr returned "
> +                               pr_warn("SELinux: %s:  getxattr returned "
>                                        "%d for dev=%s ino=%ld\n", __func__,
>                                        -rc, inode->i_sb->s_id, inode->i_ino);
>                                 kfree(context);
> @@ -1635,11 +1634,11 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
>
>                                 if (rc == -EINVAL) {
>                                         if (printk_ratelimit())
> -                                               printk(KERN_NOTICE "SELinux: inode=%lu on dev=%s was found to have an invalid "
> +                                               pr_notice("SELinux: inode=%lu on dev=%s was found to have an invalid "
>                                                         "context=%s.  This indicates you may need to relabel the inode or the "
>                                                         "filesystem in question.\n", ino, dev, context);
>                                 } else {
> -                                       printk(KERN_WARNING "SELinux: %s:  context_to_sid(%s) "
> +                                       pr_warn("SELinux: %s:  context_to_sid(%s) "
>                                                "returned %d for dev=%s ino=%ld\n",
>                                                __func__, context, -rc, dev, ino);
>                                 }
> @@ -1772,8 +1771,7 @@ static int cred_has_capability(const struct cred *cred,
>                 sclass = initns ? SECCLASS_CAPABILITY2 : SECCLASS_CAP2_USERNS;
>                 break;
>         default:
> -               printk(KERN_ERR
> -                      "SELinux:  out of range capability %d\n", cap);
> +               pr_err("SELinux:  out of range capability %d\n", cap);
>                 BUG();
>                 return -EINVAL;
>         }
> @@ -2016,7 +2014,7 @@ static int may_link(struct inode *dir,
>                 av = DIR__RMDIR;
>                 break;
>         default:
> -               printk(KERN_WARNING "SELinux: %s:  unrecognized kind %d\n",
> +               pr_warn("SELinux: %s:  unrecognized kind %d\n",
>                         __func__, kind);
>                 return 0;
>         }
> @@ -2862,7 +2860,7 @@ static int selinux_sb_remount(struct super_block *sb, void *data)
>                                                  mount_options[i], &sid,
>                                                  GFP_KERNEL);
>                 if (rc) {
> -                       printk(KERN_WARNING "SELinux: security_context_str_to_sid"
> +                       pr_warn("SELinux: security_context_str_to_sid"
>                                "(%s) failed for (dev %s, type %s) errno=%d\n",
>                                mount_options[i], sb->s_id, sb->s_type->name, rc);
>                         goto out_free_opts;
> @@ -2901,7 +2899,7 @@ static int selinux_sb_remount(struct super_block *sb, void *data)
>         free_secdata(secdata);
>         return rc;
>  out_bad_option:
> -       printk(KERN_WARNING "SELinux: unable to change security options "
> +       pr_warn("SELinux: unable to change security options "
>                "during remount (dev %s, type=%s)\n", sb->s_id,
>                sb->s_type->name);
>         goto out_free_opts;
> @@ -3343,7 +3341,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
>         rc = security_context_to_sid_force(&selinux_state, value, size,
>                                            &newsid);
>         if (rc) {
> -               printk(KERN_ERR "SELinux:  unable to map context to SID"
> +               pr_err("SELinux:  unable to map context to SID"
>                        "for (%s, %lu), rc=%d\n",
>                        inode->i_sb->s_id, inode->i_ino, -rc);
>                 return;
> @@ -4406,7 +4404,7 @@ static int selinux_parse_skb(struct sk_buff *skb, struct common_audit_data *ad,
>         }
>
>  parse_error:
> -       printk(KERN_WARNING
> +       pr_warn(
>                "SELinux: failure in selinux_parse_skb(),"
>                " unable to parse packet\n");
>         return ret;
> @@ -4449,7 +4447,7 @@ static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid)
>         err = security_net_peersid_resolve(&selinux_state, nlbl_sid,
>                                            nlbl_type, xfrm_sid, sid);
>         if (unlikely(err)) {
> -               printk(KERN_WARNING
> +               pr_warn(
>                        "SELinux: failure in selinux_skb_peerlbl_sid(),"
>                        " unable to determine packet's peer label\n");
>                 return -EACCES;
> @@ -7091,11 +7089,11 @@ static __init int selinux_init(void)
>         }
>
>         if (!selinux_enabled) {
> -               printk(KERN_INFO "SELinux:  Disabled at boot.\n");
> +               pr_info("SELinux:  Disabled at boot.\n");
>                 return 0;
>         }
>
> -       printk(KERN_INFO "SELinux:  Initializing.\n");
> +       pr_info("SELinux:  Initializing.\n");
>
>         memset(&selinux_state, 0, sizeof(selinux_state));
>         enforcing_set(&selinux_state, selinux_enforcing_boot);
> @@ -7131,9 +7129,9 @@ static __init int selinux_init(void)
>                 panic("SELinux: Unable to register AVC LSM notifier callback\n");
>
>         if (selinux_enforcing_boot)
> -               printk(KERN_DEBUG "SELinux:  Starting in enforcing mode\n");
> +               pr_debug("SELinux:  Starting in enforcing mode\n");
>         else
> -               printk(KERN_DEBUG "SELinux:  Starting in permissive mode\n");
> +               pr_debug("SELinux:  Starting in permissive mode\n");
>
>         return 0;
>  }
> @@ -7145,10 +7143,10 @@ static void delayed_superblock_init(struct super_block *sb, void *unused)
>
>  void selinux_complete_init(void)
>  {
> -       printk(KERN_DEBUG "SELinux:  Completing initialization.\n");
> +       pr_debug("SELinux:  Completing initialization.\n");
>
>         /* Set up any superblocks initialized prior to the policy load. */
> -       printk(KERN_DEBUG "SELinux:  Setting up existing superblocks.\n");
> +       pr_debug("SELinux:  Setting up existing superblocks.\n");
>         iterate_supers(delayed_superblock_init, NULL);
>  }
>
> @@ -7223,7 +7221,7 @@ static int __init selinux_nf_ip_init(void)
>         if (!selinux_enabled)
>                 return 0;
>
> -       printk(KERN_DEBUG "SELinux:  Registering netfilter hooks\n");
> +       pr_debug("SELinux:  Registering netfilter hooks\n");
>
>         err = register_pernet_subsys(&selinux_net_ops);
>         if (err)
> @@ -7236,7 +7234,7 @@ __initcall(selinux_nf_ip_init);
>  #ifdef CONFIG_SECURITY_SELINUX_DISABLE
>  static void selinux_nf_ip_exit(void)
>  {
> -       printk(KERN_DEBUG "SELinux:  Unregistering netfilter hooks\n");
> +       pr_debug("SELinux:  Unregistering netfilter hooks\n");
>
>         unregister_pernet_subsys(&selinux_net_ops);
>  }
> @@ -7265,7 +7263,7 @@ int selinux_disable(struct selinux_state *state)
>
>         state->disabled = 1;
>
> -       printk(KERN_INFO "SELinux:  Disabled at runtime.\n");
> +       pr_info("SELinux:  Disabled at runtime.\n");
>
>         selinux_enabled = 0;
>
> --
> 2.15.1
>


-- 
paul moore
www.paul-moore.com
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list