]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
tree-wide: fix log messages: "Failed VERB" -> "Failed to VERB"
authorYu Watanabe <watanabe.yu+github@gmail.com>
Sat, 19 Jul 2025 00:02:02 +0000 (09:02 +0900)
committerYu Watanabe <watanabe.yu+github@gmail.com>
Mon, 21 Jul 2025 18:05:33 +0000 (03:05 +0900)
40 files changed:
src/boot/secure-boot.c
src/core/dbus.c
src/core/job.c
src/core/socket.c
src/dissect/dissect.c
src/home/homectl-pkcs11.c
src/home/homectl-recovery-key.c
src/home/homectl.c
src/home/homework-cifs.c
src/home/homework-fscrypt.c
src/home/homework-luks.c
src/hostname/hostnamed.c
src/import/import-fs.c
src/import/importd.c
src/libsystemd/sd-journal/journal-vacuum.c
src/libsystemd/sd-journal/test-journal-append.c
src/login/logind.c
src/mountfsd/mountfsd-manager.c
src/network/networkd-dhcp4.c
src/network/networkd-manager.c
src/nspawn/nspawn-mount.c
src/nspawn/nspawn.c
src/nsresourced/nsresourced-manager.c
src/nsresourced/userns-restrict.c
src/portable/portabled.c
src/repart/repart.c
src/resolve/resolved-manager.c
src/shared/creds-util.c
src/shared/dissect-image.c
src/shared/tpm2-util.c
src/sysext/sysext.c
src/sysupdate/sysupdate-resource.c
src/sysupdate/sysupdate-transfer.c
src/sysupdate/sysupdated.c
src/test/test-btrfs.c
src/test/test-loop-block.c
src/timesync/timesyncd-manager.c
src/userdb/userdbctl.c
src/userdb/userdbd-manager.c
src/vmspawn/vmspawn.c

index 84c86fe424901b6aa5684dd2687fb7971dbbb0f1..3a3a7540091089bb0dff98ce2ca500e1bbcebba7 100644 (file)
@@ -120,7 +120,7 @@ EFI_STATUS secure_boot_enroll_at(EFI_FILE *root_dir, const char16_t *path, bool
 
         err = open_directory(root_dir, path, &dir);
         if (err != EFI_SUCCESS)
-                return log_error_status(err, "Failed opening keys directory %ls: %m", path);
+                return log_error_status(err, "Failed to open keys directory %ls: %m", path);
 
         struct {
                 const char16_t *name;
@@ -140,7 +140,7 @@ EFI_STATUS secure_boot_enroll_at(EFI_FILE *root_dir, const char16_t *path, bool
         FOREACH_ELEMENT(sb_var, sb_vars) {
                 err = file_read(dir, sb_var->filename, 0, 0, &sb_var->buffer, &sb_var->size);
                 if (err != EFI_SUCCESS && sb_var->required) {
-                        log_error_status(err, "Failed reading file %ls\\%ls: %m", path, sb_var->filename);
+                        log_error_status(err, "Failed to read file %ls\\%ls: %m", path, sb_var->filename);
                         goto out_deallocate;
                 }
                 if (streq16(sb_var->name, u"PK") && sb_var->size > 20) {
index 1659089dd94d34754fc589e2f18a21afc6578bd4..e29354fd740154163cde0bf2b18cfc4eda7ca78c 100644 (file)
@@ -921,7 +921,7 @@ int bus_init_private(Manager *m) {
                 r = sockaddr_un_set_path(&sa.un, p);
         }
         if (r < 0)
-                return log_error_errno(r, "Failed set socket path for private bus: %m");
+                return log_error_errno(r, "Failed to set socket path for private bus: %m");
         sa_len = r;
 
         (void) sockaddr_un_unlink(&sa.un);
index bac12542dcaea5c3d0e7dacbafc76c994bfc1c6f..4291d366485754e35d48f6b2435e0f61da5008d5 100644 (file)
@@ -1199,7 +1199,7 @@ void job_add_to_run_queue(Job *j) {
 
         r = prioq_put(j->manager->run_queue, j, &j->run_queue_idx);
         if (r < 0)
-                log_warning_errno(r, "Failed put job in run queue, ignoring: %m");
+                log_warning_errno(r, "Failed to put job in run queue, ignoring: %m");
         else
                 j->in_run_queue = true;
 
index f7c61d2797b9526c7d990053277f92d7083925f6..f648721f0573eca76d0c60b790545bede1c35e5d 100644 (file)
@@ -1578,7 +1578,7 @@ static int socket_address_listen_in_cgroup(
 
         r = unit_setup_exec_runtime(UNIT(s));
         if (r < 0)
-                return log_unit_error_errno(UNIT(s), r, "Failed acquire runtime: %m");
+                return log_unit_error_errno(UNIT(s), r, "Failed to acquire runtime: %m");
 
         if (s->exec_context.network_namespace_path &&
             s->exec_runtime &&
index 8dd8439ab8cf5edf36e64819d5e2974827e950bb..9eef6248616aca449389d59bcda673f09e79d6a4 100644 (file)
@@ -1556,7 +1556,7 @@ static int action_list_or_mtree_or_copy_or_make_archive(DissectedImage *m, LoopD
                  * the mounts are done in a mount namespace there's not going to be a collision here */
                 r = get_common_dissect_directory(&t);
                 if (r < 0)
-                        return log_error_errno(r, "Failed generate private mount directory: %m");
+                        return log_error_errno(r, "Failed to generate private mount directory: %m");
 
                 r = dissected_image_mount_and_warn(
                                 m,
index 38541c51ceb05f751822e30aae23ce14a621ffd9..3a0ae306232426d8e93f5746c7339f739352fae0 100644 (file)
@@ -135,7 +135,7 @@ static int add_pkcs11_encrypted_key(
 
         r = sd_json_variant_append_array(&l, e);
         if (r < 0)
-                return log_error_errno(r, "Failed append PKCS#11 encrypted key: %m");
+                return log_error_errno(r, "Failed to append PKCS#11 encrypted key: %m");
 
         r = sd_json_variant_set_field(&w, "pkcs11EncryptedKey", l);
         if (r < 0)
index c8d6a9b2fa65f60e0a4f381287c02fbb6ad02a23..b71bf99c335474128a6256d84428b7a622b9c873 100644 (file)
@@ -31,7 +31,7 @@ static int add_privileged(sd_json_variant **v, const char *hashed) {
 
         r = sd_json_variant_append_array(&l, e);
         if (r < 0)
-                return log_error_errno(r, "Failed append recovery key: %m");
+                return log_error_errno(r, "Failed to append recovery key: %m");
 
         r = sd_json_variant_set_field(&w, "recoveryKey", l);
         if (r < 0)
index 166e7a71bb8f93b92c8ed3f7501d1a1759105bad..75235e1f40d4aec3b20c9b90a87383f0fa8d35cd 100644 (file)
@@ -2623,7 +2623,7 @@ static int acquire_group_list(char ***ret) {
                         if (r == -ESRCH)
                                 break;
                         if (r < 0)
-                                return log_debug_errno(r, "Failed acquire next group: %m");
+                                return log_debug_errno(r, "Failed to acquire next group: %m");
 
                         if (group_record_disposition(gr) == USER_REGULAR) {
                                 _cleanup_(user_record_unrefp) UserRecord *ur = NULL;
index 1a2195371a7d1d46f3c324b71873b8ce75719c4f..a34f075499930f1f8e73f4ed74d9564ec41c9674 100644 (file)
@@ -49,7 +49,7 @@ int home_setup_cifs(
 
         r = parse_cifs_service(h->cifs_service, &chost, &cservice, &cdir);
         if (r < 0)
-                return log_error_errno(r, "Failed parse CIFS service specification: %m");
+                return log_error_errno(r, "Failed to parse CIFS service specification: %m");
 
         /* Just the host and service part, without the directory */
         chost_and_service = strjoin("//", chost, "/", cservice);
index bfcfb6774f0343cc4fa3374285531efc706b4bcd..be61d2b36f8b4c205449df9d3b23e6ca730224a4 100644 (file)
@@ -415,7 +415,7 @@ int home_setup_fscrypt(
                               FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG_SIGTERM|FORK_LOG|FORK_WAIT|FORK_REOPEN_LOG,
                               NULL);
                 if (r < 0)
-                        return log_error_errno(r, "Failed install encryption key in user's keyring: %m");
+                        return log_error_errno(r, "Failed to install encryption key in user's keyring: %m");
                 if (r == 0) {
                         /* Child */
 
index 2d6a549c22532a76f092b8132f495a0ba752eb20..e1b173a5855a0d8adb54d32c4da0dc8eb6e562ea 100644 (file)
@@ -2731,7 +2731,7 @@ static int prepare_resize_partition(
 
         r = sd_id128_from_string(disk_uuid_as_string, &disk_uuid);
         if (r < 0)
-                return log_error_errno(r, "Failed parse disk UUID: %m");
+                return log_error_errno(r, "Failed to parse disk UUID: %m");
 
         r = fdisk_get_partitions(c, &t);
         if (r < 0)
index 326883bbe3635dd1794e4618d0030ea17904d0a6..06fb3f28789b5901fb71be8ea3163c87201c9645 100644 (file)
@@ -636,7 +636,7 @@ static const char* fallback_chassis_by_acpi(Context *c) {
 
         r = device_get_sysattr_unsigned(c->device_acpi, "pm_profile", &t);
         if (r < 0) {
-                log_debug_errno(r, "Failed read/parse ACPI PM profile, ignoring: %m");
+                log_debug_errno(r, "Failed to read/parse ACPI PM profile, ignoring: %m");
                 return NULL;
         }
 
index 22fddaa58bc7eabb3a6db57e4b15af74f4968603..a132ab64f06f17b5a5a6edb52b29a6960c71a775 100644 (file)
@@ -249,7 +249,7 @@ static int import_fs(int argc, char *argv[], void *userdata) {
                          (arg_read_only ? INSTALL_READ_ONLY : 0) |
                          (arg_sync ? INSTALL_SYNCFS : 0));
         if (r < 0)
-                return log_error_errno(r, "Failed install directory as '%s': %m", final_path);
+                return log_error_errno(r, "Failed to install directory as '%s': %m", final_path);
 
         temp_path = mfree(temp_path);
 
index 5289707ec8facfcb34ebe32204ff8253f9fa7820..84cc9ca86ab2dfb763b1aea6af39328f26e428ec 100644 (file)
@@ -713,7 +713,7 @@ static int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_set_watchdog(m->event, true);
         if (r < 0)
index 7301b72e950ca2a21cbfdd356fbef97820c80749..9fcd1b277d087c8881f41eb5b6033ad5d468acd5 100644 (file)
@@ -255,7 +255,7 @@ int journal_directory_vacuum(
 
                 r = journal_file_empty(dirfd(d), p);
                 if (r < 0) {
-                        log_debug_errno(r, "Failed check if %s is empty, ignoring: %m", p);
+                        log_debug_errno(r, "Failed to check if %s is empty, ignoring: %m", p);
                         continue;
                 }
                 if (r > 0) {
index 6530cdae8fa79b1c76c5351edd6b78aaa3a9e126..b155a7fd7ebef22da1cbbe5477948d9aec4a1ee7 100644 (file)
@@ -134,7 +134,7 @@ static int journal_corrupt_and_append(uint64_t start_offset, uint64_t step) {
                 r = journal_append_message(mj, message);
                 if (r < 0) {
                         /* We care only about crashes or sanitizer errors,
-                         * failed write without any crash is a success */
+                         * failing to write without any crash is a success */
                         log_info_errno(r, "Failed to write to the journal: %m");
                         break;
                 }
index c5819101e537f43853b199f73a139838f9214f58..9427bae815a7a568cb022f627578832e86763180 100644 (file)
@@ -99,7 +99,7 @@ static int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         (void) sd_event_set_watchdog(m->event, true);
 
index 0fe69b78332681225b0c5f07a201af144bd894ca..c81671da32dbda534f8ffd4d74c77abc9c4b130d 100644 (file)
@@ -94,7 +94,7 @@ int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_set_watchdog(m->event, true);
         if (r < 0)
@@ -182,7 +182,7 @@ static int start_one_worker(Manager *m) {
                 }
 
                 r = invoke_callout_binary(SYSTEMD_MOUNTWORK_PATH, STRV_MAKE("systemd-mountwork", "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
-                log_error_errno(r, "Failed start worker process: %m");
+                log_error_errno(r, "Failed to start worker process: %m");
                 _exit(EXIT_FAILURE);
         }
 
index 4b0263ea72a587f5ff5dfc7238a662059997cf24..bade74f3b0930b71fb1f09e9f8950d46761f37dd 100644 (file)
@@ -1693,7 +1693,7 @@ static int dhcp4_configure(Link *link) {
         if (link->network->dhcp_fallback_lease_lifetime_usec > 0) {
                 r = sd_dhcp_client_set_fallback_lease_lifetime(link->dhcp_client, link->network->dhcp_fallback_lease_lifetime_usec);
                 if (r < 0)
-                        return log_link_debug_errno(link, r, "DHCPv4 CLIENT: Failed set to lease lifetime: %m");
+                        return log_link_debug_errno(link, r, "DHCPv4 CLIENT: Failed to set fallback lease lifetime: %m");
         }
 
         return dhcp4_set_client_identifier(link);
index 82aa1337feeae1271737b7ddf1fa3a8d6f6b69fc..e7acf6d126cf8b6a5c6ac1eabef1e0b2eda524bc 100644 (file)
@@ -539,7 +539,7 @@ int manager_setup(Manager *m) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_add_post(m->event, NULL, manager_post_handler, m);
         if (r < 0)
index 05cad27f91d74a5fa9a6891287d27a2af55c341b..0f5df64ab468151379c6e6ed519824bfe6e96a58 100644 (file)
@@ -685,7 +685,7 @@ int mount_all(const char *dest,
 
                                 log_debug_errno(r, "Failed to create directory %s: %m", where);
 
-                                /* If we failed mkdir() or chown() due to the root directory being read only,
+                                /* If mkdir() or chown() failed due to the root directory being read only,
                                  * attempt to mount this fs anyway and let mount_verbose log any errors */
                                 if (r != -EROFS)
                                         continue;
index 0bcf444b3ae505f5532e713060d76fbd1b2840f4..8013aa94c3e056932803c7780dfd7155f3fa2dce 100644 (file)
@@ -1366,7 +1366,7 @@ static int parse_argv(int argc, char *argv[]) {
                         } else {
                                 r = read_full_file(optarg, (char**) &p, &l);
                                 if (r < 0)
-                                        return log_error_errno(r, "Failed parse root hash signature file '%s': %m", optarg);
+                                        return log_error_errno(r, "Failed to parse root hash signature file '%s': %m", optarg);
                         }
 
                         free_and_replace(arg_verity_settings.root_hash_sig, p);
@@ -5583,7 +5583,7 @@ static int run_container(
 
         r = sd_event_add_memory_pressure(event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         /* Exit when the child exits */
         (void) sd_event_add_signal(event, NULL, SIGCHLD, on_sigchld, pid);
index a3a8e0b5443df4382afa4282c0dd6ac0c1127219..d58d88c7afd2fc868de55f7eb39586d4d9e0ee11 100644 (file)
@@ -114,7 +114,7 @@ int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_set_watchdog(m->event, true);
         if (r < 0)
@@ -230,7 +230,7 @@ static int start_one_worker(Manager *m) {
                 }
 
                 r = invoke_callout_binary(SYSTEMD_NSRESOURCEWORK_PATH, STRV_MAKE("systemd-nsresourcework", "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
-                log_error_errno(r, "Failed start worker process: %m");
+                log_error_errno(r, "Failed to start worker process: %m");
                 _exit(EXIT_FAILURE);
         }
 
index f85119a2657a769806b9c6dfa3c12d52f4f20ed7..4c2ee6f20fe8416cc0198829ee60d190034f31c2 100644 (file)
@@ -40,7 +40,7 @@ static int make_inner_hash_map(void) {
                         MOUNTS_MAX,
                         NULL);
         if (fd < 0)
-                return log_debug_errno(errno, "Failed allocate inner BPF map: %m");
+                return log_debug_errno(errno, "Failed to allocate inner BPF map: %m");
 
         return fd;
 }
index 6963e9b97710c56c0d5595e0621cdea123957c7b..65ceaf40b6d165e92323b896475916c495b3fcce 100644 (file)
@@ -50,7 +50,7 @@ static int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         (void) sd_event_set_watchdog(m->event, true);
 
index 181555ce3871b389fb56ef029b021f6f66edbbe9..961d5d0e334c374db16c3ae71a5b1d8dc661ea7e 100644 (file)
@@ -7601,7 +7601,7 @@ static int resolve_copy_blocks_auto(
                         }
                 }
         } else if (errno != ENOENT)
-                return log_error_errno(errno, "Failed open %s: %m", p);
+                return log_error_errno(errno, "Failed to open %s: %m", p);
         else {
                 r = resolve_copy_blocks_auto_candidate(devno, type, restrict_devno, &found_uuid);
                 if (r < 0)
index b2fa0e3364bc6b8fcffbb1c9682c1ce37f3fa809..66bd7982f5dbca8f4ba79eb2b60ed06afd2fe872 100644 (file)
@@ -229,7 +229,7 @@ static int manager_process_route(sd_netlink *rtnl, sd_netlink_message *mm, void
 
         r = sd_netlink_message_get_type(mm, &type);
         if (r < 0) {
-                log_warning_errno(r, "Failed not get message type, ignoring: %m");
+                log_warning_errno(r, "Failed to get rtnl message type, ignoring: %m");
                 return 0;
         }
 
@@ -785,23 +785,23 @@ int manager_new(Manager **ret) {
 
         r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGHUP | SD_EVENT_SIGNAL_PROCMASK, manager_dispatch_reload_signal, m);
         if (r < 0)
-                return log_debug_errno(r, "Failed install SIGHUP handler: %m");
+                return log_debug_errno(r, "Failed to install SIGHUP handler: %m");
 
         r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGUSR1 | SD_EVENT_SIGNAL_PROCMASK, manager_sigusr1, m);
         if (r < 0)
-                return log_debug_errno(r, "Failed install SIGUSR1 handler: %m");
+                return log_debug_errno(r, "Failed to install SIGUSR1 handler: %m");
 
         r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGUSR2 | SD_EVENT_SIGNAL_PROCMASK, manager_sigusr2, m);
         if (r < 0)
-                return log_debug_errno(r, "Failed install SIGUSR2 handler: %m");
+                return log_debug_errno(r, "Failed to install SIGUSR2 handler: %m");
 
         r = sd_event_add_signal(m->event, /* ret= */ NULL, (SIGRTMIN+1) | SD_EVENT_SIGNAL_PROCMASK, manager_sigrtmin1, m);
         if (r < 0)
-                return log_debug_errno(r, "Failed install SIGRTMIN+1 handler: %m");
+                return log_debug_errno(r, "Failed to install SIGRTMIN+1 handler: %m");
 
         r = sd_event_add_signal(m->event, /* ret= */ NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK, sigrtmin18_handler, &m->sigrtmin18_info);
         if (r < 0)
-                return log_debug_errno(r, "Failed install SIGRTMIN+18 handler: %m");
+                return log_debug_errno(r, "Failed to install SIGRTMIN+18 handler: %m");
 
         manager_cleanup_saved_user(m);
 
index 384b19293a3df77df2ae7c682034927ede22263c..c54349b9f7d22e87e7f7f030dd3fd5ff02e5907e 100644 (file)
@@ -178,7 +178,7 @@ int read_credential_with_decryption(const char *name, void **ret, size_t *ret_si
         if (r >= 0)
                 return 1; /* found */
         if (!IN_SET(r, -ENXIO, -ENOENT))
-                return log_error_errno(r, "Failed read unencrypted credential '%s': %m", name);
+                return log_error_errno(r, "Failed to read unencrypted credential '%s': %m", name);
 
         r = get_encrypted_credentials_dir(&d);
         if (r == -ENXIO)
@@ -920,7 +920,7 @@ int encrypt_credential_and_warn(
                         r = tpm2_load_pcr_public_key(tpm2_pubkey_path, &pubkey.iov_base, &pubkey.iov_len);
                         if (r < 0) {
                                 if (tpm2_pubkey_path || r != -ENOENT || !sd_id128_in_set(with_key, _CRED_AUTO, _CRED_AUTO_INITRD, _CRED_AUTO_SCOPED))
-                                        return log_error_errno(r, "Failed read TPM PCR public key: %m");
+                                        return log_error_errno(r, "Failed to read TPM PCR public key: %m");
 
                                 log_debug_errno(r, "Failed to read TPM2 PCR public key, proceeding without: %m");
                         }
index 72165910f1a48751644141c5d9fb0d922e6dcafd..024e16d68bff8359b45a80c13dda35a6c7f82fea 100644 (file)
@@ -4584,7 +4584,7 @@ int mountfsd_mount_image(
         if (image_policy) {
                 r = image_policy_to_string(image_policy, /* simplify= */ false, &ps);
                 if (r < 0)
-                        return log_error_errno(r, "Failed format image policy to string: %m");
+                        return log_error_errno(r, "Failed to format image policy to string: %m");
         }
 
         sd_json_variant *reply = NULL;
index d5106dbb547d4e29ab226b1ef57aa39a38bd3d82..20d34631003d3e59bf99e77d65eb7c571764f612 100644 (file)
@@ -1141,7 +1141,7 @@ static int tpm2_credit_random(Tpm2Context *c) {
 
                 r = random_write_entropy(-1, buffer->buffer, buffer->size, /* credit= */ false);
                 if (r < 0)
-                        return log_debug_errno(r, "Failed wo write entropy to kernel: %m");
+                        return log_debug_errno(r, "Failed to write entropy to kernel: %m");
 
                 done += buffer->size;
                 rps = LESS_BY(rps, buffer->size);
index 97a835b8c851175ab94acccc921423b1e6de2478..f5f5718032835014e0d91d8ebfc5d37001eff3a4 100644 (file)
@@ -1547,7 +1547,7 @@ static int store_info_in_meta(
 
         /* Make sure the top-level dir has an mtime marking the point we established the merge */
         if (utimensat(AT_FDCWD, meta_path, NULL, AT_SYMLINK_NOFOLLOW) < 0)
-                return log_error_errno(r, "Failed fix mtime of '%s': %m", meta_path);
+                return log_error_errno(r, "Failed to fix mtime of '%s': %m", meta_path);
 
         return 0;
 }
index cb2b05b901aecba59aaee641be3a6f64b51a8c8e..4060deeddf5287f6c2e61bb659c0ce8039ef0906 100644 (file)
@@ -327,7 +327,7 @@ static int download_manifest(
 
         manifest = fdopen(pfd[0], "r");
         if (!manifest)
-                return log_error_errno(errno, "Failed allocate FILE object for manifest file: %m");
+                return log_error_errno(errno, "Failed to allocate FILE object for manifest file: %m");
 
         TAKE_FD(pfd[0]);
 
index d3e71bb21ed7290db3991228692c90c58712e179..82fd931dab75f311846a1f21f5ab268670eaa3f9 100644 (file)
@@ -409,7 +409,7 @@ static int config_parse_resource_ptype(
         r = gpt_partition_type_from_string(rvalue, &rr->partition_type);
         if (r < 0) {
                 log_syntax(unit, LOG_WARNING, filename, line, r,
-                           "Failed parse partition type, ignoring: %s", rvalue);
+                           "Failed to parse partition type, ignoring: %s", rvalue);
                 return 0;
         }
 
@@ -437,7 +437,7 @@ static int config_parse_partition_uuid(
         r = sd_id128_from_string(rvalue, &t->partition_uuid);
         if (r < 0) {
                 log_syntax(unit, LOG_WARNING, filename, line, r,
-                           "Failed parse partition UUID, ignoring: %s", rvalue);
+                           "Failed to parse partition UUID, ignoring: %s", rvalue);
                 return 0;
         }
 
@@ -465,7 +465,7 @@ static int config_parse_partition_flags(
         r = safe_atou64(rvalue, &t->partition_flags);
         if (r < 0) {
                 log_syntax(unit, LOG_WARNING, filename, line, r,
-                           "Failed parse partition flags, ignoring: %s", rvalue);
+                           "Failed to parse partition flags, ignoring: %s", rvalue);
                 return 0;
         }
 
index a46e4fdafcc6e9151832166f7af7db41e6f3568e..cc45ca0657f7990a8920f17cc38f404e49990372 100644 (file)
@@ -1738,7 +1738,7 @@ static int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_bus_default_system(&m->bus);
         if (r < 0)
index d81c129d65e6152709170f87e138023202fc7732..b3fcf8068ec4637f09b8fc54cd3ba350bdc2cd83 100644 (file)
@@ -192,11 +192,11 @@ int main(int argc, char *argv[]) {
 
         r = btrfs_subvol_remove("/xxxquotatest", BTRFS_REMOVE_QUOTA|BTRFS_REMOVE_RECURSIVE);
         if (r < 0)
-                log_error_errno(r, "Failed remove subvolume: %m");
+                log_error_errno(r, "Failed to remove subvolume: %m");
 
         r = btrfs_subvol_remove("/xxxquotatest2", BTRFS_REMOVE_QUOTA|BTRFS_REMOVE_RECURSIVE);
         if (r < 0)
-                log_error_errno(r, "Failed remove subvolume: %m");
+                log_error_errno(r, "Failed to remove subvolume: %m");
 
         return 0;
 }
index a1fdac63e576804a4479bea8141029b972b61522..4651998ef1c6b3b101d515b85288e9da5adbbf23 100644 (file)
@@ -90,7 +90,7 @@ static void* thread_func(void *ptr) {
                                 DISSECT_IMAGE_READ_ONLY|DISSECT_IMAGE_ADD_PARTITION_DEVICES|DISSECT_IMAGE_PIN_PARTITION_DEVICES,
                                 &dissected);
                 if (r < 0)
-                        log_error_errno(r, "Failed dissect loopback device %s: %m", loop->node);
+                        log_error_errno(r, "Failed to dissect loopback device %s: %m", loop->node);
                 assert_se(r >= 0);
 
                 log_info("Dissected loop device %s", loop->node);
index 012b61d5130549166975f9bb988532551add73a0..6351179a62e6d499405344d494f9c25faf22dbdb 100644 (file)
@@ -1143,7 +1143,7 @@ int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_set_watchdog(m->event, true);
         if (r < 0)
index 0c3667141743cc3edcc200bcb1364362466682f6..f16d835f8a7c9ea70b21baa3d0e1c1fffd2aa6be 100644 (file)
@@ -490,7 +490,7 @@ static int display_user(int argc, char *argv[], void *userdata) {
                                 if (r == -EHOSTDOWN)
                                         return log_error_errno(r, "Selected user database service is not available for this request.");
                                 if (r < 0)
-                                        return log_error_errno(r, "Failed acquire next user: %m");
+                                        return log_error_errno(r, "Failed to acquire next user: %m");
 
                                 if (draw_separator && arg_output == OUTPUT_FRIENDLY)
                                         putchar('\n');
@@ -830,7 +830,7 @@ static int display_group(int argc, char *argv[], void *userdata) {
                                 if (r == -EHOSTDOWN)
                                         return log_error_errno(r, "Selected group database service is not available for this request.");
                                 if (r < 0)
-                                        return log_error_errno(r, "Failed acquire next group: %m");
+                                        return log_error_errno(r, "Failed to acquire next group: %m");
 
                                 if (draw_separator && arg_output == OUTPUT_FRIENDLY)
                                         putchar('\n');
@@ -977,7 +977,7 @@ static int display_memberships(int argc, char *argv[], void *userdata) {
                                 if (r == -EHOSTDOWN)
                                         return log_error_errno(r, "Selected membership database service is not available for this request.");
                                 if (r < 0)
-                                        return log_error_errno(r, "Failed acquire next membership: %m");
+                                        return log_error_errno(r, "Failed to acquire next membership: %m");
 
                                 r = show_membership(user, group, table);
                                 if (r < 0)
@@ -1004,7 +1004,7 @@ static int display_memberships(int argc, char *argv[], void *userdata) {
                                 if (r == -EHOSTDOWN)
                                         return log_error_errno(r, "Selected membership database service is not available for this request.");
                                 if (r < 0)
-                                        return log_error_errno(r, "Failed acquire next membership: %m");
+                                        return log_error_errno(r, "Failed to acquire next membership: %m");
 
                                 r = show_membership(user, group, table);
                                 if (r < 0)
index 6e0d5e4a2a0ab026c229e266ffdfb29bd90224f3..1c62bb1697b0c1c7b08c64fe8a7fe4e9c9dce0d9 100644 (file)
@@ -103,7 +103,7 @@ int manager_new(Manager **ret) {
 
         r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         r = sd_event_set_watchdog(m->event, true);
         if (r < 0)
@@ -198,7 +198,7 @@ static int start_one_worker(Manager *m) {
                 }
 
                 r = invoke_callout_binary(SYSTEMD_USERWORK_PATH, STRV_MAKE(SYSTEMD_USERWORK_PATH, "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
-                log_error_errno(r, "Failed start worker process: %m");
+                log_error_errno(r, "Failed to start worker process: %m");
                 _exit(EXIT_FAILURE);
         }
 
index 29276e556a0fb778f57a6d2a689c8886e1fc931d..e3e7a7c40c724cdea3906919d5522610976f62ba 100644 (file)
@@ -1616,7 +1616,7 @@ static int grow_image(const char *path, uint64_t size) {
         }
 
         if (ftruncate(fd, size) < 0)
-                return log_error_errno(errno, "Failed grow image file '%s' from %s to %s: %m", path,
+                return log_error_errno(errno, "Failed to grow image file '%s' from %s to %s: %m", path,
                                        FORMAT_BYTES(st.st_size), FORMAT_BYTES(size));
 
         r = fsync_full(fd);
@@ -2691,7 +2691,7 @@ static int run_virtual_machine(int kvm_device_fd, int vhost_device_fd) {
 
         r = sd_event_add_memory_pressure(event, NULL, NULL, NULL);
         if (r < 0)
-                log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
 
         /* Exit when the child exits */
         r = event_add_child_pidref(event, /* ret= */ NULL, &child_pidref, WEXITED, on_child_exit, /* userdata= */ NULL);