mirror of
https://github.com/systemd/systemd.git
synced 2024-11-23 18:23:32 +08:00
Merge pull request #4133 from keszybz/strerror-removal
Strerror removal and other janitorial cleanups
This commit is contained in:
commit
2d88def959
13
TODO
13
TODO
@ -23,12 +23,11 @@ External:
|
||||
|
||||
Janitorial Clean-ups:
|
||||
|
||||
* code cleanup: retire FOREACH_WORD_QUOTED, port to extract_first_word() loops instead
|
||||
* code cleanup: retire FOREACH_WORD_QUOTED, port to extract_first_word() loops instead.
|
||||
For example, most conf parsing callbacks should use it.
|
||||
|
||||
* replace manual readdir() loops with FOREACH_DIRENT or FOREACH_DIRENT_ALL
|
||||
|
||||
* Get rid of the last strerror() invocations in favour of %m and strerror_r()
|
||||
|
||||
* Rearrange tests so that the various test-xyz.c match a specific src/basic/xyz.c again
|
||||
|
||||
Features:
|
||||
@ -114,8 +113,6 @@ Features:
|
||||
* journald: sigbus API via a signal-handler safe function that people may call
|
||||
from the SIGBUS handler
|
||||
|
||||
* when using UTF8, ellipsize with "…" rather than "...", so that we can show more contents before truncating
|
||||
|
||||
* move specifier expansion from service_spawn() into load-fragment.c
|
||||
|
||||
* optionally, also require WATCHDOG=1 notifications during service start-up and shutdown
|
||||
@ -200,7 +197,7 @@ Features:
|
||||
* synchronize console access with BSD locks:
|
||||
http://lists.freedesktop.org/archives/systemd-devel/2014-October/024582.html
|
||||
|
||||
* as soon as we have kdbus, and sender timestamps, revisit coalescing multiple parallel daemon reloads:
|
||||
* as soon as we have sender timestamps, revisit coalescing multiple parallel daemon reloads:
|
||||
http://lists.freedesktop.org/archives/systemd-devel/2014-December/025862.html
|
||||
|
||||
* in systemctl list-unit-files: show the install value the presets would suggest for a service in a third column
|
||||
@ -240,10 +237,6 @@ Features:
|
||||
|
||||
* timesyncd: add ugly bus calls to set NTP servers per-interface, for usage by NM
|
||||
|
||||
* extract_many_words() should probably be used by a lot of code that
|
||||
currently uses FOREACH_WORD and friends. For example, most conf
|
||||
parsing callbacks should use it.
|
||||
|
||||
* merge ~/.local/share and ~/.local/lib into one similar /usr/lib and /usr/share....
|
||||
|
||||
* systemd.show_status= should probably have a mode where only failed
|
||||
|
@ -160,14 +160,12 @@
|
||||
<refsect1>
|
||||
<title>Negative Trust Anchors</title>
|
||||
|
||||
<para>Negative trust anchors define domains where DNSSEC
|
||||
validation shall be turned off. Negative trust anchor files are
|
||||
found at the same location as positive trust anchor files, and
|
||||
follow the same overriding rules. They are text files with the
|
||||
<filename>.negative</filename> suffix. Empty lines and lines whose
|
||||
first character is <literal>;</literal> are ignored. Each line
|
||||
specifies one domain name where DNSSEC validation shall be
|
||||
disabled on.</para>
|
||||
<para>Negative trust anchors define domains where DNSSEC validation shall be turned
|
||||
off. Negative trust anchor files are found at the same location as positive trust anchor files,
|
||||
and follow the same overriding rules. They are text files with the
|
||||
<filename>.negative</filename> suffix. Empty lines and lines whose first character is
|
||||
<literal>;</literal> are ignored. Each line specifies one domain name which is the root of a DNS
|
||||
subtree where validation shall be disabled.</para>
|
||||
|
||||
<para>Negative trust anchors are useful to support private DNS
|
||||
subtrees that are not referenced from the Internet DNS hierarchy,
|
||||
|
@ -443,7 +443,7 @@ static char *ascii_ellipsize_mem(const char *s, size_t old_length, size_t new_le
|
||||
if (old_length <= 3 || old_length <= new_length)
|
||||
return strndup(s, old_length);
|
||||
|
||||
r = new0(char, new_length+1);
|
||||
r = new0(char, new_length+3);
|
||||
if (!r)
|
||||
return NULL;
|
||||
|
||||
@ -453,12 +453,12 @@ static char *ascii_ellipsize_mem(const char *s, size_t old_length, size_t new_le
|
||||
x = new_length - 3;
|
||||
|
||||
memcpy(r, s, x);
|
||||
r[x] = '.';
|
||||
r[x+1] = '.';
|
||||
r[x+2] = '.';
|
||||
r[x] = 0xe2; /* tri-dot ellipsis: … */
|
||||
r[x+1] = 0x80;
|
||||
r[x+2] = 0xa6;
|
||||
memcpy(r + x + 3,
|
||||
s + old_length - (new_length - x - 3),
|
||||
new_length - x - 3);
|
||||
s + old_length - (new_length - x - 1),
|
||||
new_length - x - 1);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
@ -451,7 +451,7 @@ static int method_set_hostname(sd_bus_message *m, void *userdata, sd_bus_error *
|
||||
r = context_update_kernel_hostname(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to set host name: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set hostname: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set hostname: %m");
|
||||
}
|
||||
|
||||
log_info("Changed host name to '%s'", strna(c->data[PROP_HOSTNAME]));
|
||||
@ -512,13 +512,13 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_
|
||||
r = context_update_kernel_hostname(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to set host name: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set hostname: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set hostname: %m");
|
||||
}
|
||||
|
||||
r = context_write_data_static_hostname(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to write static host name: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set static hostname: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set static hostname: %m");
|
||||
}
|
||||
|
||||
log_info("Changed static host name to '%s'", strna(c->data[PROP_STATIC_HOSTNAME]));
|
||||
@ -593,7 +593,7 @@ static int set_machine_info(Context *c, sd_bus_message *m, int prop, sd_bus_mess
|
||||
r = context_write_data_machine_info(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to write machine info: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to write machine info: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to write machine info: %m");
|
||||
}
|
||||
|
||||
log_info("Changed %s to '%s'",
|
||||
|
@ -475,20 +475,20 @@ static int request_handler_entries(
|
||||
|
||||
r = open_journal(m);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %m");
|
||||
|
||||
if (request_parse_accept(m, connection) < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Accept header.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Accept header.");
|
||||
|
||||
if (request_parse_range(m, connection) < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Range header.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Range header.");
|
||||
|
||||
if (request_parse_arguments(m, connection) < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse URL arguments.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse URL arguments.");
|
||||
|
||||
if (m->discrete) {
|
||||
if (!m->cursor)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Discrete seeks require a cursor specification.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Discrete seeks require a cursor specification.");
|
||||
|
||||
m->n_entries = 1;
|
||||
m->n_entries_set = true;
|
||||
@ -501,7 +501,7 @@ static int request_handler_entries(
|
||||
else if (m->n_skip < 0)
|
||||
r = sd_journal_seek_tail(m->journal);
|
||||
if (r < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to seek in journal.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to seek in journal.");
|
||||
|
||||
response = MHD_create_response_from_callback(MHD_SIZE_UNKNOWN, 4*1024, request_reader_entries, m, NULL);
|
||||
if (!response)
|
||||
@ -633,14 +633,14 @@ static int request_handler_fields(
|
||||
|
||||
r = open_journal(m);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %m");
|
||||
|
||||
if (request_parse_accept(m, connection) < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Accept header.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to parse Accept header.");
|
||||
|
||||
r = sd_journal_query_unique(m->journal, field);
|
||||
if (r < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to query unique fields.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_BAD_REQUEST, "Failed to query unique fields.");
|
||||
|
||||
response = MHD_create_response_from_callback(MHD_SIZE_UNKNOWN, 4*1024, request_reader_fields, m, NULL);
|
||||
if (!response)
|
||||
@ -699,10 +699,10 @@ static int request_handler_file(
|
||||
|
||||
fd = open(path, O_RDONLY|O_CLOEXEC);
|
||||
if (fd < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_NOT_FOUND, "Failed to open file %s: %m\n", path);
|
||||
return mhd_respondf(connection, errno, MHD_HTTP_NOT_FOUND, "Failed to open file %s: %m", path);
|
||||
|
||||
if (fstat(fd, &st) < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to stat file: %m\n");
|
||||
return mhd_respondf(connection, errno, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to stat file: %m");
|
||||
|
||||
response = MHD_create_response_from_fd_at_offset64(st.st_size, fd, 0);
|
||||
if (!response)
|
||||
@ -766,15 +766,15 @@ static int request_handler_machine(
|
||||
|
||||
r = open_journal(m);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to open journal: %m");
|
||||
|
||||
r = sd_id128_get_machine(&mid);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine machine ID: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine machine ID: %m");
|
||||
|
||||
r = sd_id128_get_boot(&bid);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine boot ID: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine boot ID: %m");
|
||||
|
||||
hostname = gethostname_malloc();
|
||||
if (!hostname)
|
||||
@ -782,11 +782,11 @@ static int request_handler_machine(
|
||||
|
||||
r = sd_journal_get_usage(m->journal, &usage);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine disk usage: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine disk usage: %s");
|
||||
|
||||
r = sd_journal_get_cutoff_realtime_usec(m->journal, &cutoff_from, &cutoff_to);
|
||||
if (r < 0)
|
||||
return mhd_respondf(connection, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine disk usage: %s\n", strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "Failed to determine disk usage: %s");
|
||||
|
||||
if (parse_env_file("/etc/os-release", NEWLINE, "PRETTY_NAME", &os_name, NULL) == -ENOENT)
|
||||
(void) parse_env_file("/usr/lib/os-release", NEWLINE, "PRETTY_NAME", &os_name, NULL);
|
||||
@ -844,8 +844,7 @@ static int request_handler(
|
||||
assert(method);
|
||||
|
||||
if (!streq(method, "GET"))
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_ACCEPTABLE,
|
||||
"Unsupported method.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_ACCEPTABLE, "Unsupported method.");
|
||||
|
||||
|
||||
if (!*connection_cls) {
|
||||
@ -875,7 +874,7 @@ static int request_handler(
|
||||
if (streq(url, "/machine"))
|
||||
return request_handler_machine(connection, *connection_cls);
|
||||
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_FOUND, "Not found.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_FOUND, "Not found.");
|
||||
}
|
||||
|
||||
static void help(void) {
|
||||
|
@ -524,13 +524,12 @@ static int process_http_upload(
|
||||
log_warning("Failed to process data for connection %p", connection);
|
||||
if (r == -E2BIG)
|
||||
return mhd_respondf(connection,
|
||||
MHD_HTTP_REQUEST_ENTITY_TOO_LARGE,
|
||||
"Entry is too large, maximum is %u bytes.\n",
|
||||
DATA_SIZE_MAX);
|
||||
r, MHD_HTTP_REQUEST_ENTITY_TOO_LARGE,
|
||||
"Entry is too large, maximum is " STRINGIFY(DATA_SIZE_MAX) " bytes.");
|
||||
else
|
||||
return mhd_respondf(connection,
|
||||
MHD_HTTP_UNPROCESSABLE_ENTITY,
|
||||
"Processing failed: %s.", strerror(-r));
|
||||
r, MHD_HTTP_UNPROCESSABLE_ENTITY,
|
||||
"Processing failed: %m.");
|
||||
}
|
||||
}
|
||||
|
||||
@ -541,13 +540,14 @@ static int process_http_upload(
|
||||
|
||||
remaining = source_non_empty(source);
|
||||
if (remaining > 0) {
|
||||
log_warning("Premature EOFbyte. %zu bytes lost.", remaining);
|
||||
return mhd_respondf(connection, MHD_HTTP_EXPECTATION_FAILED,
|
||||
log_warning("Premature EOF byte. %zu bytes lost.", remaining);
|
||||
return mhd_respondf(connection,
|
||||
0, MHD_HTTP_EXPECTATION_FAILED,
|
||||
"Premature EOF. %zu bytes of trailing data not processed.",
|
||||
remaining);
|
||||
}
|
||||
|
||||
return mhd_respond(connection, MHD_HTTP_ACCEPTED, "OK.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_ACCEPTED, "OK.");
|
||||
};
|
||||
|
||||
static int request_handler(
|
||||
@ -577,19 +577,16 @@ static int request_handler(
|
||||
*connection_cls);
|
||||
|
||||
if (!streq(method, "POST"))
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_ACCEPTABLE,
|
||||
"Unsupported method.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_ACCEPTABLE, "Unsupported method.");
|
||||
|
||||
if (!streq(url, "/upload"))
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_FOUND,
|
||||
"Not found.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_NOT_FOUND, "Not found.");
|
||||
|
||||
header = MHD_lookup_connection_value(connection,
|
||||
MHD_HEADER_KIND, "Content-Type");
|
||||
if (!header || !streq(header, "application/vnd.fdo.journal"))
|
||||
return mhd_respond(connection, MHD_HTTP_UNSUPPORTED_MEDIA_TYPE,
|
||||
"Content-Type: application/vnd.fdo.journal"
|
||||
" is required.\n");
|
||||
"Content-Type: application/vnd.fdo.journal is required.");
|
||||
|
||||
{
|
||||
const union MHD_ConnectionInfo *ci;
|
||||
@ -599,7 +596,7 @@ static int request_handler(
|
||||
if (!ci) {
|
||||
log_error("MHD_get_connection_info failed: cannot get remote fd");
|
||||
return mhd_respond(connection, MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||
"Cannot check remote address");
|
||||
"Cannot check remote address.");
|
||||
}
|
||||
|
||||
fd = ci->connect_fd;
|
||||
@ -614,7 +611,7 @@ static int request_handler(
|
||||
r = getpeername_pretty(fd, false, &hostname);
|
||||
if (r < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||
"Cannot check remote hostname");
|
||||
"Cannot check remote hostname.");
|
||||
}
|
||||
|
||||
assert(hostname);
|
||||
@ -623,8 +620,7 @@ static int request_handler(
|
||||
if (r == -ENOMEM)
|
||||
return respond_oom(connection);
|
||||
else if (r < 0)
|
||||
return mhd_respond(connection, MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||
strerror(-r));
|
||||
return mhd_respondf(connection, r, MHD_HTTP_INTERNAL_SERVER_ERROR, "%m");
|
||||
|
||||
hostname = NULL;
|
||||
return MHD_YES;
|
||||
|
@ -48,7 +48,7 @@ void microhttpd_logger(void *arg, const char *fmt, va_list ap) {
|
||||
|
||||
static int mhd_respond_internal(struct MHD_Connection *connection,
|
||||
enum MHD_RequestTerminationCode code,
|
||||
char *buffer,
|
||||
const char *buffer,
|
||||
size_t size,
|
||||
enum MHD_ResponseMemoryMode mode) {
|
||||
struct MHD_Response *response;
|
||||
@ -56,7 +56,7 @@ static int mhd_respond_internal(struct MHD_Connection *connection,
|
||||
|
||||
assert(connection);
|
||||
|
||||
response = MHD_create_response_from_buffer(size, buffer, mode);
|
||||
response = MHD_create_response_from_buffer(size, (char*) buffer, mode);
|
||||
if (!response)
|
||||
return MHD_NO;
|
||||
|
||||
@ -72,19 +72,25 @@ int mhd_respond(struct MHD_Connection *connection,
|
||||
enum MHD_RequestTerminationCode code,
|
||||
const char *message) {
|
||||
|
||||
const char *fmt;
|
||||
|
||||
fmt = strjoina(message, "\n");
|
||||
|
||||
return mhd_respond_internal(connection, code,
|
||||
(char*) message, strlen(message),
|
||||
fmt, strlen(message) + 1,
|
||||
MHD_RESPMEM_PERSISTENT);
|
||||
}
|
||||
|
||||
int mhd_respond_oom(struct MHD_Connection *connection) {
|
||||
return mhd_respond(connection, MHD_HTTP_SERVICE_UNAVAILABLE, "Out of memory.\n");
|
||||
return mhd_respond(connection, MHD_HTTP_SERVICE_UNAVAILABLE, "Out of memory.");
|
||||
}
|
||||
|
||||
int mhd_respondf(struct MHD_Connection *connection,
|
||||
int error,
|
||||
enum MHD_RequestTerminationCode code,
|
||||
const char *format, ...) {
|
||||
|
||||
const char *fmt;
|
||||
char *m;
|
||||
int r;
|
||||
va_list ap;
|
||||
@ -92,8 +98,12 @@ int mhd_respondf(struct MHD_Connection *connection,
|
||||
assert(connection);
|
||||
assert(format);
|
||||
|
||||
if (error < 0)
|
||||
error = -error;
|
||||
errno = -error;
|
||||
fmt = strjoina(format, "\n");
|
||||
va_start(ap, format);
|
||||
r = vasprintf(&m, format, ap);
|
||||
r = vasprintf(&m, fmt, ap);
|
||||
va_end(ap);
|
||||
|
||||
if (r < 0)
|
||||
|
@ -39,8 +39,9 @@ void microhttpd_logger(void *arg, const char *fmt, va_list ap) _printf_(2, 0);
|
||||
#define respond_oom(connection) log_oom(), mhd_respond_oom(connection)
|
||||
|
||||
int mhd_respondf(struct MHD_Connection *connection,
|
||||
int error,
|
||||
unsigned code,
|
||||
const char *format, ...) _printf_(3,4);
|
||||
const char *format, ...) _printf_(4,5);
|
||||
|
||||
int mhd_respond(struct MHD_Connection *connection,
|
||||
unsigned code,
|
||||
|
@ -118,6 +118,11 @@ static void flush_progress(void) {
|
||||
log_error(OFSfmt": " _fmt, (uint64_t)_offset, ##__VA_ARGS__); \
|
||||
} while (0)
|
||||
|
||||
#define error_errno(_offset, error, _fmt, ...) do { \
|
||||
flush_progress(); \
|
||||
log_error_errno(error, OFSfmt": " _fmt, (uint64_t)_offset, ##__VA_ARGS__); \
|
||||
} while (0)
|
||||
|
||||
static int journal_file_object_verify(JournalFile *f, uint64_t offset, Object *o) {
|
||||
uint64_t i;
|
||||
|
||||
@ -168,8 +173,8 @@ static int journal_file_object_verify(JournalFile *f, uint64_t offset, Object *o
|
||||
le64toh(o->object.size) - offsetof(Object, data.payload),
|
||||
&b, &alloc, &b_size, 0);
|
||||
if (r < 0) {
|
||||
error(offset, "%s decompression failed: %s",
|
||||
object_compressed_to_string(compression), strerror(-r));
|
||||
error_errno(offset, r, "%s decompression failed: %m",
|
||||
object_compressed_to_string(compression));
|
||||
return r;
|
||||
}
|
||||
|
||||
@ -912,7 +917,7 @@ int journal_file_verify(
|
||||
|
||||
r = journal_file_object_verify(f, p, o);
|
||||
if (r < 0) {
|
||||
error(p, "Invalid object contents: %s", strerror(-r));
|
||||
error_errno(p, r, "Invalid object contents: %m");
|
||||
goto fail;
|
||||
}
|
||||
|
||||
|
@ -36,10 +36,9 @@
|
||||
|
||||
static bool arg_keep = false;
|
||||
|
||||
noreturn static void log_assert_errno(const char *text, int eno, const char *file, int line, const char *func) {
|
||||
log_internal(LOG_CRIT, 0, file, line, func,
|
||||
"'%s' failed at %s:%u (%s): %s.",
|
||||
text, file, line, func, strerror(eno));
|
||||
noreturn static void log_assert_errno(const char *text, int error, const char *file, int line, const char *func) {
|
||||
log_internal(LOG_CRIT, error, file, line, func,
|
||||
"'%s' failed at %s:%u (%s): %m", text, file, line, func);
|
||||
abort();
|
||||
}
|
||||
|
||||
|
@ -351,7 +351,7 @@ finish:
|
||||
static int quit_callback(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
|
||||
bool *x = userdata;
|
||||
|
||||
log_error("Quit callback: %s", strerror(sd_bus_message_get_errno(m)));
|
||||
log_error_errno(sd_bus_message_get_errno(m), "Quit callback: %m");
|
||||
|
||||
*x = 1;
|
||||
return 1;
|
||||
|
@ -334,7 +334,7 @@ static int method_set_locale(sd_bus_message *m, void *userdata, sd_bus_error *er
|
||||
r = locale_write_data(c, &settings);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to set locale: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set locale: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set locale: %m");
|
||||
}
|
||||
|
||||
locale_update_system_manager(c, sd_bus_message_get_bus(m));
|
||||
@ -403,7 +403,7 @@ static int method_set_vc_keyboard(sd_bus_message *m, void *userdata, sd_bus_erro
|
||||
r = vconsole_write_data(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to set virtual console keymap: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set virtual console keymap: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set virtual console keymap: %m");
|
||||
}
|
||||
|
||||
log_info("Changed virtual console keymap to '%s' toggle '%s'",
|
||||
@ -592,7 +592,7 @@ static int method_set_x11_keyboard(sd_bus_message *m, void *userdata, sd_bus_err
|
||||
r = x11_write_data(c);
|
||||
if (r < 0) {
|
||||
log_error_errno(r, "Failed to set X11 keyboard layout: %m");
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set X11 keyboard layout: %s", strerror(-r));
|
||||
return sd_bus_error_set_errnof(error, r, "Failed to set X11 keyboard layout: %m");
|
||||
}
|
||||
|
||||
log_info("Changed X11 keyboard layout to '%s' model '%s' variant '%s' options '%s'",
|
||||
|
@ -444,7 +444,9 @@ static int method_register_machine_internal(sd_bus_message *message, bool read_n
|
||||
|
||||
r = cg_pid_get_unit(m->leader, &m->unit);
|
||||
if (r < 0) {
|
||||
r = sd_bus_error_set_errnof(error, r, "Failed to determine unit of process "PID_FMT" : %s", m->leader, strerror(-r));
|
||||
r = sd_bus_error_set_errnof(error, r,
|
||||
"Failed to determine unit of process "PID_FMT" : %m",
|
||||
m->leader);
|
||||
goto fail;
|
||||
}
|
||||
|
||||
|
@ -43,7 +43,7 @@ int main(int argc, char *argv[]) {
|
||||
assert_se(set_unit_path(TEST_DIR) >= 0);
|
||||
r = manager_new(UNIT_FILE_USER, true, &m);
|
||||
if (MANAGER_SKIP_TEST(r)) {
|
||||
printf("Skipping test: manager_new: %s\n", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: manager_new: %m");
|
||||
return EXIT_TEST_SKIP;
|
||||
}
|
||||
assert_se(r >= 0);
|
||||
|
@ -324,7 +324,7 @@ static int run_tests(UnitFileScope scope, test_function_t *tests) {
|
||||
|
||||
r = manager_new(scope, true, &m);
|
||||
if (MANAGER_SKIP_TEST(r)) {
|
||||
printf("Skipping test: manager_new: %s\n", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: manager_new: %n");
|
||||
return EXIT_TEST_SKIP;
|
||||
}
|
||||
assert_se(r >= 0);
|
||||
|
@ -47,7 +47,7 @@ static int setup_test(Manager **m) {
|
||||
|
||||
r = manager_new(UNIT_FILE_USER, true, &tmp);
|
||||
if (MANAGER_SKIP_TEST(r)) {
|
||||
printf("Skipping test: manager_new: %s\n", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: manager_new: %m");
|
||||
return -EXIT_TEST_SKIP;
|
||||
}
|
||||
assert_se(r >= 0);
|
||||
|
@ -40,7 +40,7 @@ int main(int argc, char *argv[]) {
|
||||
assert_se(set_unit_path(TEST_DIR) >= 0);
|
||||
r = manager_new(UNIT_FILE_USER, true, &m);
|
||||
if (MANAGER_SKIP_TEST(r)) {
|
||||
printf("Skipping test: manager_new: %s\n", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: manager_new: %m");
|
||||
return EXIT_TEST_SKIP;
|
||||
}
|
||||
assert_se(r >= 0);
|
||||
|
@ -56,12 +56,12 @@ static int test_unit_file_get_set(void) {
|
||||
r = unit_file_get_list(UNIT_FILE_SYSTEM, NULL, h, NULL, NULL);
|
||||
|
||||
if (r == -EPERM || r == -EACCES) {
|
||||
printf("Skipping test: unit_file_get_list: %s", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: unit_file_get_list: %m");
|
||||
return EXIT_TEST_SKIP;
|
||||
}
|
||||
|
||||
log_full(r == 0 ? LOG_INFO : LOG_ERR,
|
||||
"unit_file_get_list: %s", strerror(-r));
|
||||
log_full_errno(r == 0 ? LOG_INFO : LOG_ERR, r,
|
||||
"unit_file_get_list: %m");
|
||||
if (r < 0)
|
||||
return EXIT_FAILURE;
|
||||
|
||||
@ -117,7 +117,7 @@ static void test_config_parse_exec(void) {
|
||||
|
||||
r = manager_new(UNIT_FILE_USER, true, &m);
|
||||
if (MANAGER_SKIP_TEST(r)) {
|
||||
printf("Skipping test: manager_new: %s\n", strerror(-r));
|
||||
log_notice_errno(r, "Skipping test: manager_new: %m");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -191,20 +191,12 @@ static int load_link(link_config_ctx *ctx, const char *filename) {
|
||||
}
|
||||
|
||||
static bool enable_name_policy(void) {
|
||||
_cleanup_free_ char *line = NULL;
|
||||
const char *word, *state;
|
||||
_cleanup_free_ char *value = NULL;
|
||||
int r;
|
||||
size_t l;
|
||||
|
||||
r = proc_cmdline(&line);
|
||||
if (r < 0) {
|
||||
log_warning_errno(r, "Failed to read /proc/cmdline, ignoring: %m");
|
||||
return true;
|
||||
}
|
||||
|
||||
FOREACH_WORD_QUOTED(word, l, line, state)
|
||||
if (strneq(word, "net.ifnames=0", l))
|
||||
return false;
|
||||
r = get_proc_cmdline_key("net.ifnames=", &value);
|
||||
if (r > 0 && streq(value, "0"))
|
||||
return false;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user