"(unit-shell-ns)",
"(unit-shell)",
/* except_fds= */ NULL,
- /* n_except_fds */ 0,
+ /* n_except_fds= */ 0,
FORK_RESET_SIGNALS|FORK_DEATHSIG_SIGKILL,
pidns_fd,
mntns_fd,
n_section_table,
section_names,
validate_base,
- /* device_base */ NULL,
- /* device */ NULL,
+ /* device_table = */ NULL,
+ /* device = */ NULL,
sections);
/* It doesn't make sense not to provide validate_base here */
n_section_table,
hwid_section_names,
validate_base,
- /* device_table */ NULL,
- /* device */ NULL,
+ /* device_table = */ NULL,
+ /* device = */ NULL,
hwids_section);
if (PE_SECTION_VECTOR_IS_SET(hwids_section)) {
}
if (need_custom_mode && !custom_mode_enabled()) {
- err = set_custom_mode(/* enable */ true);
+ err = set_custom_mode(/* enable = */ true);
if (err != EFI_SUCCESS) {
log_error_status(err, "Failed to enable custom mode: %m");
goto out_deallocate;
}
}
- if (support_end && os_release_support_ended(support_end, /* quiet */ false, NULL) > 0)
+ if (support_end && os_release_support_ended(support_end, /* quiet = */ false, /* ret_eol = */ NULL) > 0)
/* pretty_name may include the version already, so we'll print the version only if we
* have it and we're not using pretty_name. */
status_printf(ANSI_HIGHLIGHT_RED " !! " ANSI_NORMAL, 0,
}
}
- r = check_password_quality(new_password, /* old */ NULL, /* user */ NULL, &error);
+ r = check_password_quality(new_password, /* old = */ NULL, /* user = */ NULL, &error);
if (ERRNO_IS_NEG_NOT_SUPPORTED(r))
log_warning("Password quality check is not supported, proceeding anyway.");
else if (r < 0)
break;
}
- r = check_password_quality(*a, /* old */ NULL, "root", &error);
+ r = check_password_quality(*a, /* old = */ NULL, "root", &error);
if (ERRNO_IS_NEG_NOT_SUPPORTED(r))
log_warning("Password quality check is not supported, proceeding anyway.");
else if (r < 0)
continue;
/* If there are no old passwords, let's call check_password_quality() without any. */
- r = check_password_quality(*pp, /* old */ NULL, hr->user_name, &auxerror);
+ r = check_password_quality(*pp, /* old = */ NULL, hr->user_name, &auxerror);
if (r <= 0)
goto error;
}
{ "Upload", "TrustedCertificateFile", config_parse_path_or_ignore, 0, &arg_trust },
{ "Upload", "NetworkTimeoutSec", config_parse_sec, 0, &arg_network_timeout_usec },
{ "Upload", "Header", config_parse_header, 0, &arg_headers },
- { "Upload", "Compression", config_parse_compression, /* with_level */ true, &arg_compression },
+ { "Upload", "Compression", config_parse_compression, /* with_level = */ true, &arg_compression },
{ "Upload", "ForceCompression", config_parse_bool, 0, &arg_force_compression },
{}
};
manager_reopen_journals(m, &old);
log_info("Config file reloaded.");
- (void) sd_notify(/* unset_environment */ false, NOTIFY_READY_MESSAGE);
+ (void) sd_notify(/* unset_environment = */ false, NOTIFY_READY_MESSAGE);
return 0;
}
log_debug("Relinquishing %s...", m->system_storage.path);
- (void) manager_system_journal_open(m, /* flush_requested */ false, /* relinquish_requested=*/ true);
+ (void) manager_system_journal_open(m, /* flush_requested = */ false, /* relinquish_requested = */ true);
m->system_journal = journal_file_offline_close(m->system_journal);
ordered_hashmap_clear(m->user_journals);
(void) manager_system_journal_open(m, /* flush_requested = */ false, /* relinquish_requested = */ false);
/* To make the storage related settings applied, vacuum the storage. */
- manager_vacuum(m, /* verbose */ false);
+ manager_vacuum(m, /* verbose = */ false);
}
int manager_new(Manager **ret) {
* again. */
assert(s->ratelimited);
- r = event_source_leave_ratelimit(s, /* run_callback */ true);
+ r = event_source_leave_ratelimit(s, /* run_callback = */ true);
if (r < 0)
return r;
else if (r == 1)
/* When ratelimiting is configured we'll always reset the rate limit state first and start fresh,
* non-ratelimited. */
- r = event_source_leave_ratelimit(s, /* run_callback */ false);
+ r = event_source_leave_ratelimit(s, /* run_callback = */ false);
if (r < 0)
return r;
if (!s->ratelimited)
return 0;
- r = event_source_leave_ratelimit(s, /* run_callback */ false);
+ r = event_source_leave_ratelimit(s, /* run_callback = */ false);
if (r < 0)
return r;
if (idle) {
log_info("Session \"%s\" of user \"%s\" is idle, stopping.", s->id, s->user->user_record->user_name);
- return session_stop(s, /* force */ true);
+ return session_stop(s, /* force = */ true);
}
r = sd_event_source_set_time(
/* desktop= */ NULL,
/* area= */ NULL,
&debug,
- /* default_capability_bounding_set */ NULL,
+ /* default_capability_bounding_set= */ NULL,
/* default_capability_ambient_set= */ NULL) < 0)
return PAM_SESSION_ERR;
check_reason = sym_passwdqc_check(¶ms->qc, password, old, &pw);
} else
- check_reason = sym_passwdqc_check(¶ms->qc, password, old, /* pw */ NULL);
+ check_reason = sym_passwdqc_check(¶ms->qc, password, old, /* pw = */ NULL);
if (check_reason) {
if (ret_error) {
const char *extension_reload_manager = NULL;
int b;
- r = load_extension_release_pairs(arg_root, image_class, *extension, /* relax_extension_release_check */ true, &extension_release);
+ r = load_extension_release_pairs(arg_root, image_class, *extension, /* relax_extension_release_check = */ true, &extension_release);
if (r < 0) {
log_debug_errno(r, "Failed to parse extension-release metadata of %s, ignoring: %m", *extension);
continue;
if (is_case_insensitive)
return log_line_invalid_prefix(rule_line, key);
- r = rule_line_add_token(rule_line, TK_M_PROGRAM, op, value, NULL, /* is_case_insensitive */ false, token_str);
+ r = rule_line_add_token(rule_line, TK_M_PROGRAM, op, value, NULL, /* is_case_insensitive = */ false, token_str);
} else if (streq(key, "IMPORT")) {
if (isempty(attr))
return log_line_invalid_attr(rule_line, key);