rc = security_transition_sid(sid1, sid2, SECCLASS_EVENT, &newsid);
if ( rc )
{
- printk("%s: security_transition_sid failed, rc=%d (domain=%d)\n",
- __FUNCTION__, -rc, d2->domain_id);
+ printk("security_transition_sid failed, rc=%d, Dom%d\n",
+ -rc, d2->domain_id);
return rc;
}
{
if ( c->sid == sid )
break;
- printk("%s: Duplicate pirq %d\n", __FUNCTION__, add->u.pirq);
+ printk("flask: Duplicate pirq %d\n", add->u.pirq);
ret = -EEXIST;
break;
}
c->u.ioport.high_ioport == high && c->sid == sid)
break;
- printk("%s: IO Port overlap with entry %#x - %#x\n",
- __FUNCTION__, c->u.ioport.low_ioport,
- c->u.ioport.high_ioport);
+ printk("flask: IO Port overlap with entry %#x - %#x\n",
+ c->u.ioport.low_ioport, c->u.ioport.high_ioport);
ret = -EEXIST;
break;
}
c->u.iomem.high_iomem == high && c->sid == sid)
break;
- printk("%s: IO Memory overlap with entry %#"PRIx64" - %#"PRIx64"\n",
- __FUNCTION__, c->u.iomem.low_iomem, c->u.iomem.high_iomem);
+ printk("flask: IO Memory overlap with entry %#"PRIx64" - %#"PRIx64"\n",
+ c->u.iomem.low_iomem, c->u.iomem.high_iomem);
ret = -EEXIST;
break;
}
if ( c->sid == sid )
break;
- printk("%s: Duplicate PCI Device %#x\n", __FUNCTION__,
- add->u.device);
+ printk("flask: Duplicate PCI Device %#x\n", add->u.device);
ret = -EEXIST;
break;
}
}
}
- printk("%s: ocontext not found: pirq %ld\n", __FUNCTION__, low);
+ printk("flask: ocontext not found: pirq %ld\n", low);
ret = -ENOENT;
break;
}
}
- printk("%s: ocontext not found: ioport %#lx - %#lx\n",
- __FUNCTION__, low, high);
+ printk("flask: ocontext not found: ioport %#lx - %#lx\n", low, high);
ret = -ENOENT;
break;
}
}
- printk("%s: ocontext not found: iomem %#lx - %#lx\n",
- __FUNCTION__, low, high);
+ printk("flask: ocontext not found: iomem %#lx - %#lx\n", low, high);
ret = -ENOENT;
break;
}
}
- printk("%s: ocontext not found: pcidevice %#lx\n", __FUNCTION__, low);
+ printk("flask: ocontext not found: pcidevice %#lx\n", low);
ret = -ENOENT;
break;
if ( verify(&dummy_xsm_ops) )
{
- printk("%s could not verify "
- "dummy_xsm_ops structure.\n", __FUNCTION__);
+ printk(XENLOG_ERR "Could not verify dummy_xsm_ops structure\n");
return -EIO;
}
if ( ret )
{
bootstrap_map(NULL);
- printk("%s: Error initializing policy.\n", __FUNCTION__);
+ printk(XENLOG_ERR "Error %d initializing XSM policy\n", ret);
return -EINVAL;
}
}
ret = xsm_dt_policy_init(&policy_buffer, &policy_size);
if ( ret )
{
- printk("%s: Error initializing policy (rc = %d).\n",
- __FUNCTION__, ret);
+ printk(XENLOG_ERR "Error %d initializing XSM policy\n", ret);
return -EINVAL;
}
}
{
if ( verify(ops) )
{
- printk("%s could not verify "
- "security_operations structure.\n", __FUNCTION__);
+ printk(XENLOG_ERR "Could not verify xsm_operations structure\n");
return -EINVAL;
}