|
@@ -653,11 +653,11 @@ static int superblock_doinit(struct super_block *sb, void *data)
|
|
sbsec->initialized = 1;
|
|
sbsec->initialized = 1;
|
|
|
|
|
|
if (sbsec->behavior > ARRAY_SIZE(labeling_behaviors)) {
|
|
if (sbsec->behavior > ARRAY_SIZE(labeling_behaviors)) {
|
|
- printk(KERN_INFO "SELinux: initialized (dev %s, type %s), unknown behavior\n",
|
|
|
|
|
|
+ printk(KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n",
|
|
sb->s_id, sb->s_type->name);
|
|
sb->s_id, sb->s_type->name);
|
|
}
|
|
}
|
|
else {
|
|
else {
|
|
- printk(KERN_INFO "SELinux: initialized (dev %s, type %s), %s\n",
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: initialized (dev %s, type %s), %s\n",
|
|
sb->s_id, sb->s_type->name,
|
|
sb->s_id, sb->s_type->name,
|
|
labeling_behaviors[sbsec->behavior-1]);
|
|
labeling_behaviors[sbsec->behavior-1]);
|
|
}
|
|
}
|
|
@@ -4434,7 +4434,7 @@ static int selinux_ipc_permission(struct kern_ipc_perm *ipcp, short flag)
|
|
static int selinux_register_security (const char *name, struct security_operations *ops)
|
|
static int selinux_register_security (const char *name, struct security_operations *ops)
|
|
{
|
|
{
|
|
if (secondary_ops != original_ops) {
|
|
if (secondary_ops != original_ops) {
|
|
- printk(KERN_INFO "%s: There is already a secondary security "
|
|
|
|
|
|
+ printk(KERN_ERR "%s: There is already a secondary security "
|
|
"module registered.\n", __FUNCTION__);
|
|
"module registered.\n", __FUNCTION__);
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
@@ -4451,7 +4451,7 @@ static int selinux_register_security (const char *name, struct security_operatio
|
|
static int selinux_unregister_security (const char *name, struct security_operations *ops)
|
|
static int selinux_unregister_security (const char *name, struct security_operations *ops)
|
|
{
|
|
{
|
|
if (ops != secondary_ops) {
|
|
if (ops != secondary_ops) {
|
|
- printk (KERN_INFO "%s: trying to unregister a security module "
|
|
|
|
|
|
+ printk(KERN_ERR "%s: trying to unregister a security module "
|
|
"that is not registered.\n", __FUNCTION__);
|
|
"that is not registered.\n", __FUNCTION__);
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
@@ -4889,9 +4889,9 @@ static __init int selinux_init(void)
|
|
panic("SELinux: Unable to register with kernel.\n");
|
|
panic("SELinux: Unable to register with kernel.\n");
|
|
|
|
|
|
if (selinux_enforcing) {
|
|
if (selinux_enforcing) {
|
|
- printk(KERN_INFO "SELinux: Starting in enforcing mode\n");
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Starting in enforcing mode\n");
|
|
} else {
|
|
} else {
|
|
- printk(KERN_INFO "SELinux: Starting in permissive mode\n");
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Starting in permissive mode\n");
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_KEYS
|
|
#ifdef CONFIG_KEYS
|
|
@@ -4907,10 +4907,10 @@ static __init int selinux_init(void)
|
|
|
|
|
|
void selinux_complete_init(void)
|
|
void selinux_complete_init(void)
|
|
{
|
|
{
|
|
- printk(KERN_INFO "SELinux: Completing initialization.\n");
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Completing initialization.\n");
|
|
|
|
|
|
/* Set up any superblocks initialized prior to the policy load. */
|
|
/* Set up any superblocks initialized prior to the policy load. */
|
|
- printk(KERN_INFO "SELinux: Setting up existing superblocks.\n");
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Setting up existing superblocks.\n");
|
|
spin_lock(&sb_lock);
|
|
spin_lock(&sb_lock);
|
|
spin_lock(&sb_security_lock);
|
|
spin_lock(&sb_security_lock);
|
|
next_sb:
|
|
next_sb:
|
|
@@ -4968,9 +4968,9 @@ static int __init selinux_nf_ip_init(void)
|
|
|
|
|
|
if (!selinux_enabled)
|
|
if (!selinux_enabled)
|
|
goto out;
|
|
goto out;
|
|
-
|
|
|
|
- printk(KERN_INFO "SELinux: Registering netfilter hooks\n");
|
|
|
|
-
|
|
|
|
|
|
+
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Registering netfilter hooks\n");
|
|
|
|
+
|
|
err = nf_register_hook(&selinux_ipv4_op);
|
|
err = nf_register_hook(&selinux_ipv4_op);
|
|
if (err)
|
|
if (err)
|
|
panic("SELinux: nf_register_hook for IPv4: error %d\n", err);
|
|
panic("SELinux: nf_register_hook for IPv4: error %d\n", err);
|
|
@@ -4992,7 +4992,7 @@ __initcall(selinux_nf_ip_init);
|
|
#ifdef CONFIG_SECURITY_SELINUX_DISABLE
|
|
#ifdef CONFIG_SECURITY_SELINUX_DISABLE
|
|
static void selinux_nf_ip_exit(void)
|
|
static void selinux_nf_ip_exit(void)
|
|
{
|
|
{
|
|
- printk(KERN_INFO "SELinux: Unregistering netfilter hooks\n");
|
|
|
|
|
|
+ printk(KERN_DEBUG "SELinux: Unregistering netfilter hooks\n");
|
|
|
|
|
|
nf_unregister_hook(&selinux_ipv4_op);
|
|
nf_unregister_hook(&selinux_ipv4_op);
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|