On Mon, 2014-02-24 at 14:16 -0800, Casey Schaufler wrote: > On 2/24/2014 1:59 PM, Joe Perches wrote: > > Convert printks to pr_<level> > > Add pr_fmt.
> > diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c [] > > +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > > + > > What is pr_fmt() for? Prefixing "smack: " to the pr_<level> uses. > > @@ -2106,8 +2108,7 @@ static int smack_inode_setsecurity(struct inode > > *inode, const char *name, > > if (sock->sk->sk_family == PF_INET) { > > rc = smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET); > > if (rc != 0) > > - printk(KERN_WARNING > > - "Smack: \"%s\" netlbl error %d.\n", > > + pr_warn("\"%s\" netlbl error %d\n", > > __func__, -rc); This will be now be emitted as <4>smack: "smack_inode_setsecurity" netlbl error -<d> instead of <4>Smack: "smack_inode_setsecurity" netlbl error -<d> Though it'd be a lot more common to use: pr_warn("%s: netlbl error: %d\n", __func__, -rc); so the output would be: <4>smack: smack_inode_setsecurity: netlbl error: -<d> -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/