mirror of
https://github.com/AuxXxilium/eudev.git
synced 2025-03-09 15:14:01 +07:00
treewide: auto-convert the simple cases to log_*_errno()
As a followup to 086891e5c1 "log: add an "error" parameter to all low-level logging calls and intrdouce log_error_errno() as log calls that take error numbers", use sed to convert the simple cases to use the new macros: find . -name '*.[ch]' | xargs sed -r -i -e \ 's/log_(debug|info|notice|warning|error|emergency)\("(.*)%s"(.*), strerror\(-([a-zA-Z_]+)\)\);/log_\1_errno(-\4, "\2%m"\3);/' Multi-line log_*() invocations are not covered. And we also should add log_unit_*_errno(). Signed-off-by: Anthony G. Basile <blueness@gentoo.org>
This commit is contained in:
parent
e72e57a66f
commit
146b012e50
@ -62,7 +62,7 @@ static int install_force_release(struct udev_device *dev, const unsigned int *re
|
|||||||
log_debug("keyboard: updating force-release list with '%s'", codes);
|
log_debug("keyboard: updating force-release list with '%s'", codes);
|
||||||
ret = udev_device_set_sysattr_value(atkbd, "force_release", codes);
|
ret = udev_device_set_sysattr_value(atkbd, "force_release", codes);
|
||||||
if (ret < 0)
|
if (ret < 0)
|
||||||
log_error("Error writing force-release attribute: %s", strerror(-ret));
|
log_error_errno(-ret, "Error writing force-release attribute: %m");
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -216,7 +216,7 @@ struct udev_ctrl_connection *udev_ctrl_get_connection(struct udev_ctrl *uctrl) {
|
|||||||
/* check peer credential of connection */
|
/* check peer credential of connection */
|
||||||
r = getpeercred(conn->sock, &ucred);
|
r = getpeercred(conn->sock, &ucred);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
log_error("unable to receive credentials of ctrl connection: %s", strerror(-r));
|
log_error_errno(-r, "unable to receive credentials of ctrl connection: %m");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (ucred.uid > 0) {
|
if (ucred.uid > 0) {
|
||||||
|
@ -304,7 +304,7 @@ static int node_permissions_apply(struct udev_device *dev, bool apply,
|
|||||||
|
|
||||||
r = mac_selinux_apply(devnode, label);
|
r = mac_selinux_apply(devnode, label);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
log_error("SECLABEL: failed to set SELinux label '%s': %s", label, strerror(-r));
|
log_error_errno(-r, "SECLABEL: failed to set SELinux label '%s': %m", label);
|
||||||
else
|
else
|
||||||
log_debug("SECLABEL: set SELinux label '%s'", label);
|
log_debug("SECLABEL: set SELinux label '%s'", label);
|
||||||
|
|
||||||
@ -313,7 +313,7 @@ static int node_permissions_apply(struct udev_device *dev, bool apply,
|
|||||||
|
|
||||||
r = mac_smack_apply(devnode, label);
|
r = mac_smack_apply(devnode, label);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
log_error("SECLABEL: failed to set SMACK label '%s': %s", label, strerror(-r));
|
log_error_errno(-r, "SECLABEL: failed to set SMACK label '%s': %m", label);
|
||||||
else
|
else
|
||||||
log_debug("SECLABEL: set SMACK label '%s'", label);
|
log_debug("SECLABEL: set SMACK label '%s'", label);
|
||||||
|
|
||||||
|
@ -1690,7 +1690,7 @@ struct udev_rules *udev_rules_new(struct udev *udev, int resolve_names) {
|
|||||||
|
|
||||||
r = conf_files_list_strv(&files, ".rules", NULL, rules_dirs);
|
r = conf_files_list_strv(&files, ".rules", NULL, rules_dirs);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
log_error("failed to enumerate rules files: %s", strerror(-r));
|
log_error_errno(-r, "failed to enumerate rules files: %m");
|
||||||
return udev_rules_unref(rules);
|
return udev_rules_unref(rules);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2711,7 +2711,7 @@ int udev_rules_apply_static_dev_perms(struct udev_rules *rules) {
|
|||||||
strscpyl(tags_dir, sizeof(tags_dir), "/run/udev/static_node-tags/", *t, "/", NULL);
|
strscpyl(tags_dir, sizeof(tags_dir), "/run/udev/static_node-tags/", *t, "/", NULL);
|
||||||
r = mkdir_p(tags_dir, 0755);
|
r = mkdir_p(tags_dir, 0755);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
log_error("failed to create %s: %s", tags_dir, strerror(-r));
|
log_error_errno(-r, "failed to create %s: %m", tags_dir);
|
||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -615,7 +615,7 @@ static int adm_hwdb(struct udev *udev, int argc, char *argv[]) {
|
|||||||
|
|
||||||
err = conf_files_list_strv(&files, ".hwdb", root, conf_file_dirs);
|
err = conf_files_list_strv(&files, ".hwdb", root, conf_file_dirs);
|
||||||
if (err < 0) {
|
if (err < 0) {
|
||||||
log_error("failed to enumerate hwdb files: %s", strerror(-err));
|
log_error_errno(-err, "failed to enumerate hwdb files: %m");
|
||||||
rc = EXIT_FAILURE;
|
rc = EXIT_FAILURE;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
@ -648,7 +648,7 @@ static int adm_hwdb(struct udev *udev, int argc, char *argv[]) {
|
|||||||
mkdir_parents(hwdb_bin, 0755);
|
mkdir_parents(hwdb_bin, 0755);
|
||||||
err = trie_store(trie, hwdb_bin);
|
err = trie_store(trie, hwdb_bin);
|
||||||
if (err < 0) {
|
if (err < 0) {
|
||||||
log_error("Failure writing database %s: %s", hwdb_bin, strerror(-err));
|
log_error_errno(-err, "Failure writing database %s: %m", hwdb_bin);
|
||||||
rc = EXIT_FAILURE;
|
rc = EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -989,7 +989,7 @@ static void kernel_cmdline_options(struct udev *udev) {
|
|||||||
|
|
||||||
r = proc_cmdline(&line);
|
r = proc_cmdline(&line);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(-r));
|
log_warning_errno(-r, "Failed to read /proc/cmdline, ignoring: %m");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1161,7 +1161,7 @@ int main(int argc, char *argv[]) {
|
|||||||
|
|
||||||
r = mac_selinux_init("/dev");
|
r = mac_selinux_init("/dev");
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
log_error("could not initialize labelling: %s", strerror(-r));
|
log_error_errno(-r, "could not initialize labelling: %m");
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1245,7 +1245,7 @@ int main(int argc, char *argv[]) {
|
|||||||
|
|
||||||
rc = udev_rules_apply_static_dev_perms(rules);
|
rc = udev_rules_apply_static_dev_perms(rules);
|
||||||
if (rc < 0)
|
if (rc < 0)
|
||||||
log_error("failed to apply permissions on static device nodes - %s", strerror(-rc));
|
log_error_errno(-rc, "failed to apply permissions on static device nodes - %m");
|
||||||
|
|
||||||
if (arg_daemonize) {
|
if (arg_daemonize) {
|
||||||
pid_t pid;
|
pid_t pid;
|
||||||
|
Loading…
Reference in New Issue
Block a user