err = open_directory(root_dir, path, &dir);
if (err != EFI_SUCCESS)
- return log_error_status(err, "Failed opening keys directory %ls: %m", path);
+ return log_error_status(err, "Failed to open keys directory %ls: %m", path);
struct {
const char16_t *name;
FOREACH_ELEMENT(sb_var, sb_vars) {
err = file_read(dir, sb_var->filename, 0, 0, &sb_var->buffer, &sb_var->size);
if (err != EFI_SUCCESS && sb_var->required) {
- log_error_status(err, "Failed reading file %ls\\%ls: %m", path, sb_var->filename);
+ log_error_status(err, "Failed to read file %ls\\%ls: %m", path, sb_var->filename);
goto out_deallocate;
}
if (streq16(sb_var->name, u"PK") && sb_var->size > 20) {
r = sockaddr_un_set_path(&sa.un, p);
}
if (r < 0)
- return log_error_errno(r, "Failed set socket path for private bus: %m");
+ return log_error_errno(r, "Failed to set socket path for private bus: %m");
sa_len = r;
(void) sockaddr_un_unlink(&sa.un);
r = prioq_put(j->manager->run_queue, j, &j->run_queue_idx);
if (r < 0)
- log_warning_errno(r, "Failed put job in run queue, ignoring: %m");
+ log_warning_errno(r, "Failed to put job in run queue, ignoring: %m");
else
j->in_run_queue = true;
r = unit_setup_exec_runtime(UNIT(s));
if (r < 0)
- return log_unit_error_errno(UNIT(s), r, "Failed acquire runtime: %m");
+ return log_unit_error_errno(UNIT(s), r, "Failed to acquire runtime: %m");
if (s->exec_context.network_namespace_path &&
s->exec_runtime &&
* the mounts are done in a mount namespace there's not going to be a collision here */
r = get_common_dissect_directory(&t);
if (r < 0)
- return log_error_errno(r, "Failed generate private mount directory: %m");
+ return log_error_errno(r, "Failed to generate private mount directory: %m");
r = dissected_image_mount_and_warn(
m,
r = sd_json_variant_append_array(&l, e);
if (r < 0)
- return log_error_errno(r, "Failed append PKCS#11 encrypted key: %m");
+ return log_error_errno(r, "Failed to append PKCS#11 encrypted key: %m");
r = sd_json_variant_set_field(&w, "pkcs11EncryptedKey", l);
if (r < 0)
r = sd_json_variant_append_array(&l, e);
if (r < 0)
- return log_error_errno(r, "Failed append recovery key: %m");
+ return log_error_errno(r, "Failed to append recovery key: %m");
r = sd_json_variant_set_field(&w, "recoveryKey", l);
if (r < 0)
if (r == -ESRCH)
break;
if (r < 0)
- return log_debug_errno(r, "Failed acquire next group: %m");
+ return log_debug_errno(r, "Failed to acquire next group: %m");
if (group_record_disposition(gr) == USER_REGULAR) {
_cleanup_(user_record_unrefp) UserRecord *ur = NULL;
r = parse_cifs_service(h->cifs_service, &chost, &cservice, &cdir);
if (r < 0)
- return log_error_errno(r, "Failed parse CIFS service specification: %m");
+ return log_error_errno(r, "Failed to parse CIFS service specification: %m");
/* Just the host and service part, without the directory */
chost_and_service = strjoin("//", chost, "/", cservice);
FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG_SIGTERM|FORK_LOG|FORK_WAIT|FORK_REOPEN_LOG,
NULL);
if (r < 0)
- return log_error_errno(r, "Failed install encryption key in user's keyring: %m");
+ return log_error_errno(r, "Failed to install encryption key in user's keyring: %m");
if (r == 0) {
/* Child */
r = sd_id128_from_string(disk_uuid_as_string, &disk_uuid);
if (r < 0)
- return log_error_errno(r, "Failed parse disk UUID: %m");
+ return log_error_errno(r, "Failed to parse disk UUID: %m");
r = fdisk_get_partitions(c, &t);
if (r < 0)
r = device_get_sysattr_unsigned(c->device_acpi, "pm_profile", &t);
if (r < 0) {
- log_debug_errno(r, "Failed read/parse ACPI PM profile, ignoring: %m");
+ log_debug_errno(r, "Failed to read/parse ACPI PM profile, ignoring: %m");
return NULL;
}
(arg_read_only ? INSTALL_READ_ONLY : 0) |
(arg_sync ? INSTALL_SYNCFS : 0));
if (r < 0)
- return log_error_errno(r, "Failed install directory as '%s': %m", final_path);
+ return log_error_errno(r, "Failed to install directory as '%s': %m", final_path);
temp_path = mfree(temp_path);
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_set_watchdog(m->event, true);
if (r < 0)
r = journal_file_empty(dirfd(d), p);
if (r < 0) {
- log_debug_errno(r, "Failed check if %s is empty, ignoring: %m", p);
+ log_debug_errno(r, "Failed to check if %s is empty, ignoring: %m", p);
continue;
}
if (r > 0) {
r = journal_append_message(mj, message);
if (r < 0) {
/* We care only about crashes or sanitizer errors,
- * failed write without any crash is a success */
+ * failing to write without any crash is a success */
log_info_errno(r, "Failed to write to the journal: %m");
break;
}
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
(void) sd_event_set_watchdog(m->event, true);
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_set_watchdog(m->event, true);
if (r < 0)
}
r = invoke_callout_binary(SYSTEMD_MOUNTWORK_PATH, STRV_MAKE("systemd-mountwork", "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
- log_error_errno(r, "Failed start worker process: %m");
+ log_error_errno(r, "Failed to start worker process: %m");
_exit(EXIT_FAILURE);
}
if (link->network->dhcp_fallback_lease_lifetime_usec > 0) {
r = sd_dhcp_client_set_fallback_lease_lifetime(link->dhcp_client, link->network->dhcp_fallback_lease_lifetime_usec);
if (r < 0)
- return log_link_debug_errno(link, r, "DHCPv4 CLIENT: Failed set to lease lifetime: %m");
+ return log_link_debug_errno(link, r, "DHCPv4 CLIENT: Failed to set fallback lease lifetime: %m");
}
return dhcp4_set_client_identifier(link);
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_add_post(m->event, NULL, manager_post_handler, m);
if (r < 0)
log_debug_errno(r, "Failed to create directory %s: %m", where);
- /* If we failed mkdir() or chown() due to the root directory being read only,
+ /* If mkdir() or chown() failed due to the root directory being read only,
* attempt to mount this fs anyway and let mount_verbose log any errors */
if (r != -EROFS)
continue;
} else {
r = read_full_file(optarg, (char**) &p, &l);
if (r < 0)
- return log_error_errno(r, "Failed parse root hash signature file '%s': %m", optarg);
+ return log_error_errno(r, "Failed to parse root hash signature file '%s': %m", optarg);
}
free_and_replace(arg_verity_settings.root_hash_sig, p);
r = sd_event_add_memory_pressure(event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
/* Exit when the child exits */
(void) sd_event_add_signal(event, NULL, SIGCHLD, on_sigchld, pid);
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_set_watchdog(m->event, true);
if (r < 0)
}
r = invoke_callout_binary(SYSTEMD_NSRESOURCEWORK_PATH, STRV_MAKE("systemd-nsresourcework", "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
- log_error_errno(r, "Failed start worker process: %m");
+ log_error_errno(r, "Failed to start worker process: %m");
_exit(EXIT_FAILURE);
}
MOUNTS_MAX,
NULL);
if (fd < 0)
- return log_debug_errno(errno, "Failed allocate inner BPF map: %m");
+ return log_debug_errno(errno, "Failed to allocate inner BPF map: %m");
return fd;
}
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
(void) sd_event_set_watchdog(m->event, true);
}
}
} else if (errno != ENOENT)
- return log_error_errno(errno, "Failed open %s: %m", p);
+ return log_error_errno(errno, "Failed to open %s: %m", p);
else {
r = resolve_copy_blocks_auto_candidate(devno, type, restrict_devno, &found_uuid);
if (r < 0)
r = sd_netlink_message_get_type(mm, &type);
if (r < 0) {
- log_warning_errno(r, "Failed not get message type, ignoring: %m");
+ log_warning_errno(r, "Failed to get rtnl message type, ignoring: %m");
return 0;
}
r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGHUP | SD_EVENT_SIGNAL_PROCMASK, manager_dispatch_reload_signal, m);
if (r < 0)
- return log_debug_errno(r, "Failed install SIGHUP handler: %m");
+ return log_debug_errno(r, "Failed to install SIGHUP handler: %m");
r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGUSR1 | SD_EVENT_SIGNAL_PROCMASK, manager_sigusr1, m);
if (r < 0)
- return log_debug_errno(r, "Failed install SIGUSR1 handler: %m");
+ return log_debug_errno(r, "Failed to install SIGUSR1 handler: %m");
r = sd_event_add_signal(m->event, /* ret= */ NULL, SIGUSR2 | SD_EVENT_SIGNAL_PROCMASK, manager_sigusr2, m);
if (r < 0)
- return log_debug_errno(r, "Failed install SIGUSR2 handler: %m");
+ return log_debug_errno(r, "Failed to install SIGUSR2 handler: %m");
r = sd_event_add_signal(m->event, /* ret= */ NULL, (SIGRTMIN+1) | SD_EVENT_SIGNAL_PROCMASK, manager_sigrtmin1, m);
if (r < 0)
- return log_debug_errno(r, "Failed install SIGRTMIN+1 handler: %m");
+ return log_debug_errno(r, "Failed to install SIGRTMIN+1 handler: %m");
r = sd_event_add_signal(m->event, /* ret= */ NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK, sigrtmin18_handler, &m->sigrtmin18_info);
if (r < 0)
- return log_debug_errno(r, "Failed install SIGRTMIN+18 handler: %m");
+ return log_debug_errno(r, "Failed to install SIGRTMIN+18 handler: %m");
manager_cleanup_saved_user(m);
if (r >= 0)
return 1; /* found */
if (!IN_SET(r, -ENXIO, -ENOENT))
- return log_error_errno(r, "Failed read unencrypted credential '%s': %m", name);
+ return log_error_errno(r, "Failed to read unencrypted credential '%s': %m", name);
r = get_encrypted_credentials_dir(&d);
if (r == -ENXIO)
r = tpm2_load_pcr_public_key(tpm2_pubkey_path, &pubkey.iov_base, &pubkey.iov_len);
if (r < 0) {
if (tpm2_pubkey_path || r != -ENOENT || !sd_id128_in_set(with_key, _CRED_AUTO, _CRED_AUTO_INITRD, _CRED_AUTO_SCOPED))
- return log_error_errno(r, "Failed read TPM PCR public key: %m");
+ return log_error_errno(r, "Failed to read TPM PCR public key: %m");
log_debug_errno(r, "Failed to read TPM2 PCR public key, proceeding without: %m");
}
if (image_policy) {
r = image_policy_to_string(image_policy, /* simplify= */ false, &ps);
if (r < 0)
- return log_error_errno(r, "Failed format image policy to string: %m");
+ return log_error_errno(r, "Failed to format image policy to string: %m");
}
sd_json_variant *reply = NULL;
r = random_write_entropy(-1, buffer->buffer, buffer->size, /* credit= */ false);
if (r < 0)
- return log_debug_errno(r, "Failed wo write entropy to kernel: %m");
+ return log_debug_errno(r, "Failed to write entropy to kernel: %m");
done += buffer->size;
rps = LESS_BY(rps, buffer->size);
/* Make sure the top-level dir has an mtime marking the point we established the merge */
if (utimensat(AT_FDCWD, meta_path, NULL, AT_SYMLINK_NOFOLLOW) < 0)
- return log_error_errno(r, "Failed fix mtime of '%s': %m", meta_path);
+ return log_error_errno(r, "Failed to fix mtime of '%s': %m", meta_path);
return 0;
}
manifest = fdopen(pfd[0], "r");
if (!manifest)
- return log_error_errno(errno, "Failed allocate FILE object for manifest file: %m");
+ return log_error_errno(errno, "Failed to allocate FILE object for manifest file: %m");
TAKE_FD(pfd[0]);
r = gpt_partition_type_from_string(rvalue, &rr->partition_type);
if (r < 0) {
log_syntax(unit, LOG_WARNING, filename, line, r,
- "Failed parse partition type, ignoring: %s", rvalue);
+ "Failed to parse partition type, ignoring: %s", rvalue);
return 0;
}
r = sd_id128_from_string(rvalue, &t->partition_uuid);
if (r < 0) {
log_syntax(unit, LOG_WARNING, filename, line, r,
- "Failed parse partition UUID, ignoring: %s", rvalue);
+ "Failed to parse partition UUID, ignoring: %s", rvalue);
return 0;
}
r = safe_atou64(rvalue, &t->partition_flags);
if (r < 0) {
log_syntax(unit, LOG_WARNING, filename, line, r,
- "Failed parse partition flags, ignoring: %s", rvalue);
+ "Failed to parse partition flags, ignoring: %s", rvalue);
return 0;
}
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_bus_default_system(&m->bus);
if (r < 0)
r = btrfs_subvol_remove("/xxxquotatest", BTRFS_REMOVE_QUOTA|BTRFS_REMOVE_RECURSIVE);
if (r < 0)
- log_error_errno(r, "Failed remove subvolume: %m");
+ log_error_errno(r, "Failed to remove subvolume: %m");
r = btrfs_subvol_remove("/xxxquotatest2", BTRFS_REMOVE_QUOTA|BTRFS_REMOVE_RECURSIVE);
if (r < 0)
- log_error_errno(r, "Failed remove subvolume: %m");
+ log_error_errno(r, "Failed to remove subvolume: %m");
return 0;
}
DISSECT_IMAGE_READ_ONLY|DISSECT_IMAGE_ADD_PARTITION_DEVICES|DISSECT_IMAGE_PIN_PARTITION_DEVICES,
&dissected);
if (r < 0)
- log_error_errno(r, "Failed dissect loopback device %s: %m", loop->node);
+ log_error_errno(r, "Failed to dissect loopback device %s: %m", loop->node);
assert_se(r >= 0);
log_info("Dissected loop device %s", loop->node);
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_set_watchdog(m->event, true);
if (r < 0)
if (r == -EHOSTDOWN)
return log_error_errno(r, "Selected user database service is not available for this request.");
if (r < 0)
- return log_error_errno(r, "Failed acquire next user: %m");
+ return log_error_errno(r, "Failed to acquire next user: %m");
if (draw_separator && arg_output == OUTPUT_FRIENDLY)
putchar('\n');
if (r == -EHOSTDOWN)
return log_error_errno(r, "Selected group database service is not available for this request.");
if (r < 0)
- return log_error_errno(r, "Failed acquire next group: %m");
+ return log_error_errno(r, "Failed to acquire next group: %m");
if (draw_separator && arg_output == OUTPUT_FRIENDLY)
putchar('\n');
if (r == -EHOSTDOWN)
return log_error_errno(r, "Selected membership database service is not available for this request.");
if (r < 0)
- return log_error_errno(r, "Failed acquire next membership: %m");
+ return log_error_errno(r, "Failed to acquire next membership: %m");
r = show_membership(user, group, table);
if (r < 0)
if (r == -EHOSTDOWN)
return log_error_errno(r, "Selected membership database service is not available for this request.");
if (r < 0)
- return log_error_errno(r, "Failed acquire next membership: %m");
+ return log_error_errno(r, "Failed to acquire next membership: %m");
r = show_membership(user, group, table);
if (r < 0)
r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
r = sd_event_set_watchdog(m->event, true);
if (r < 0)
}
r = invoke_callout_binary(SYSTEMD_USERWORK_PATH, STRV_MAKE(SYSTEMD_USERWORK_PATH, "xxxxxxxxxxxxxxxx")); /* With some extra space rename_process() can make use of */
- log_error_errno(r, "Failed start worker process: %m");
+ log_error_errno(r, "Failed to start worker process: %m");
_exit(EXIT_FAILURE);
}
}
if (ftruncate(fd, size) < 0)
- return log_error_errno(errno, "Failed grow image file '%s' from %s to %s: %m", path,
+ return log_error_errno(errno, "Failed to grow image file '%s' from %s to %s: %m", path,
FORMAT_BYTES(st.st_size), FORMAT_BYTES(size));
r = fsync_full(fd);
r = sd_event_add_memory_pressure(event, NULL, NULL, NULL);
if (r < 0)
- log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
+ log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
/* Exit when the child exits */
r = event_add_child_pidref(event, /* ret= */ NULL, &child_pidref, WEXITED, on_child_exit, /* userdata= */ NULL);