From: Daan De Meyer Date: Sat, 27 May 2023 08:36:30 +0000 (+0200) Subject: tree-wide: Downgrade a few more noisy log messages to trace X-Git-Tag: v254-rc1~354 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=30868c1c8d6e518a4da9c491df7eb8559951365d;p=thirdparty%2Fsystemd.git tree-wide: Downgrade a few more noisy log messages to trace --- diff --git a/src/libsystemd/sd-journal/catalog.c b/src/libsystemd/sd-journal/catalog.c index f490e21490e..ae91534198c 100644 --- a/src/libsystemd/sd-journal/catalog.c +++ b/src/libsystemd/sd-journal/catalog.c @@ -484,7 +484,7 @@ int catalog_update(const char* database, const char* root, const char* const* di n = 0; ORDERED_HASHMAP_FOREACH_KEY(payload, i, h) { - log_debug("Found " SD_ID128_FORMAT_STR ", language %s", + log_trace("Found " SD_ID128_FORMAT_STR ", language %s", SD_ID128_FORMAT_VAL(i->id), isempty(i->language) ? "C" : i->language); diff --git a/src/shared/mount-util.c b/src/shared/mount-util.c index 7b791a96e8b..7a06cc75ae9 100644 --- a/src/shared/mount-util.c +++ b/src/shared/mount-util.c @@ -99,7 +99,7 @@ int umount_recursive_full(const char *prefix, int flags, char **keep) { continue; } - log_debug("Successfully unmounted %s", path); + log_trace("Successfully unmounted %s", path); again = true; n++; @@ -376,7 +376,7 @@ int bind_remount_recursive_with_mountinfo( continue; } - log_debug("Remounted %s.", x); + log_trace("Remounted %s.", x); } } } diff --git a/src/shared/seccomp-util.c b/src/shared/seccomp-util.c index 3e9f89c8905..4eae96e69a6 100644 --- a/src/shared/seccomp-util.c +++ b/src/shared/seccomp-util.c @@ -1079,7 +1079,7 @@ int seccomp_load_syscall_filter_set(uint32_t default_action, const SyscallFilter SECCOMP_FOREACH_LOCAL_ARCH(arch) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); r = seccomp_init_for_arch(&seccomp, arch, default_action); if (r < 0) @@ -1113,7 +1113,7 @@ int seccomp_load_syscall_filter_set_raw(uint32_t default_action, Hashmap* filter _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; void *syscall_id, *val; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); r = seccomp_init_for_arch(&seccomp, arch, default_action); if (r < 0) @@ -1254,7 +1254,7 @@ int seccomp_restrict_namespaces(unsigned long retain) { SECCOMP_FOREACH_LOCAL_ARCH(arch) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); r = seccomp_init_for_arch(&seccomp, arch, SCMP_ACT_ALLOW); if (r < 0) @@ -1306,7 +1306,7 @@ int seccomp_restrict_namespaces(unsigned long retain) { continue; } - log_debug("Blocking %s.", namespace_info[i].proc_name); + log_trace("Blocking %s.", namespace_info[i].proc_name); r = seccomp_rule_add_exact( seccomp, @@ -1372,7 +1372,7 @@ int seccomp_protect_sysctl(void) { SECCOMP_FOREACH_LOCAL_ARCH(arch) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); if (IN_SET(arch, SCMP_ARCH_AARCH64, @@ -1448,7 +1448,7 @@ int seccomp_restrict_address_families(Set *address_families, bool allow_list) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; bool supported; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); switch (arch) { @@ -1632,7 +1632,7 @@ int seccomp_restrict_realtime_full(int error_code) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; int p; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); r = seccomp_init_for_arch(&seccomp, arch, SCMP_ACT_ALLOW); if (r < 0) @@ -1724,7 +1724,7 @@ int seccomp_memory_deny_write_execute(void) { _cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL; int filter_syscall = 0, block_syscall = 0, shmat_syscall = 0, r; - log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch)); + log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch)); switch (arch) {