]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
tree-wide: use consistent format of short comment for constant argument
authorYu Watanabe <watanabe.yu+github@gmail.com>
Mon, 19 Jan 2026 15:20:01 +0000 (00:20 +0900)
committerYu Watanabe <watanabe.yu+github@gmail.com>
Mon, 19 Jan 2026 15:22:15 +0000 (00:22 +0900)
Follow-ups for recent changes after 93378148d48fa700c7f53b5f8969787af2a47ccb.

src/basic/process-util.c
src/core/bpf-bind-iface.c
src/core/unit.c
src/shared/dissect-image.c
src/shared/journal-importer.c

index c12eae4d422a05353a7a3795745e709bfe2ee5ff..9c44193b67cd43c81f33f88e02b19bd50facf772 100644 (file)
@@ -1804,7 +1804,7 @@ int namespace_fork_full(
 
         r = pidref_safe_fork_full(
                         outer_name,
-                        /* stdio_fds = */ NULL, /* except_fds = */ NULL, /* n_except_fds = */ 0,
+                        /* stdio_fds= */ NULL, /* except_fds= */ NULL, /* n_except_fds= */ 0,
                         (flags|FORK_DEATHSIG_SIGKILL) & ~(FORK_DEATHSIG_SIGTERM|FORK_DEATHSIG_SIGINT|FORK_REOPEN_LOG|FORK_NEW_MOUNTNS|FORK_MOUNTNS_SLAVE|FORK_NEW_USERNS|FORK_NEW_NETNS|FORK_NEW_PIDNS|FORK_CLOSE_ALL_FDS|FORK_PACK_FDS|FORK_CLOEXEC_OFF|FORK_RLIMIT_NOFILE_SAFE),
                         &pidref_outer);
         if (r == -EPROTO && FLAGS_SET(flags, FORK_WAIT)) {
index 6b11e83543f00d0d313d30a90ec8dfb7f69b9f6d..fdd2e1d8e6318bb3b034f6e8db6f908a74b3aa61 100644 (file)
@@ -65,7 +65,7 @@ static int bind_network_interface_install_impl(Unit *u, CGroupRuntime *crt) {
         if (isempty(cc->bind_network_interface))
                 return 0;
 
-        r = cg_get_path(crt->cgroup_path, /* suffix = */ NULL, &cgroup_path);
+        r = cg_get_path(crt->cgroup_path, /* suffix= */ NULL, &cgroup_path);
         if (r < 0)
                 return log_unit_error_errno(u, r, "bind-interface: Failed to get cgroup path: %m");
 
index 95e52858059b803927fba97ce4e0a3c00885ba84..96f56a28e043763695354dc8542f2315ac5b3bcb 100644 (file)
@@ -5582,7 +5582,7 @@ int unit_fork_helper_process_full(Unit *u, const char *name, bool into_cgroup, F
 }
 
 int unit_fork_helper_process(Unit *u, const char *name, bool into_cgroup, PidRef *ret) {
-        return unit_fork_helper_process_full(u, name, into_cgroup, /* flags = */ 0, ret);
+        return unit_fork_helper_process_full(u, name, into_cgroup, /* flags= */ 0, ret);
 }
 
 int unit_fork_and_watch_rm_rf(Unit *u, char **paths, PidRef *ret_pid) {
index 97dc89e5a427e0c27870cedaa27df8ed8dbce873..43a6014afefe72070d0061d059616da23ad93b00 100644 (file)
@@ -471,7 +471,7 @@ static int partition_is_luks2_integrity(int part_fd, uint64_t offset, uint64_t s
                 return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to read LUKS JSON header.");
         json[sz] = '\0';
 
-        r = sd_json_parse(json, /* flags = */ 0, &v, /* reterr_line = */ NULL, /* reterr_column = */ NULL);
+        r = sd_json_parse(json, /* flags= */ 0, &v, /* reterr_line= */ NULL, /* reterr_column= */ NULL);
         if (r < 0)
                 return log_error_errno(r, "Failed to parse LUKS JSON header.");
 
@@ -567,7 +567,7 @@ static int dissected_image_probe_filesystems(
                         m->encrypted = true;
 
                         if (p->mount_node_fd >= 0)
-                                r = partition_is_luks2_integrity(p->mount_node_fd, /* offset = */ 0, /* size = */ UINT64_MAX);
+                                r = partition_is_luks2_integrity(p->mount_node_fd, /* offset= */ 0, /* size= */ UINT64_MAX);
                         else
                                 r = partition_is_luks2_integrity(fd, p->offset, p->size);
                         if (r < 0)
@@ -1168,7 +1168,7 @@ static int dissect_image(
                         if (verity_settings_data_covers(verity, PARTITION_ROOT))
                                 found_flags = iovec_is_set(&verity->root_hash_sig) ? PARTITION_POLICY_SIGNED : PARTITION_POLICY_VERITY;
                         else if (encrypted) {
-                                r = partition_is_luks2_integrity(fd, /* offset = */ 0, /* size = */ UINT64_MAX);
+                                r = partition_is_luks2_integrity(fd, /* offset= */ 0, /* size= */ UINT64_MAX);
                                 if (r < 0)
                                         return r;
 
index 43681f5d227c3904537e624cb741ced6a0da8eaa..3aa472a2d1cf6d4811973c4b991a889e7ec2bed0 100644 (file)
@@ -349,7 +349,7 @@ int journal_importer_process_data(JournalImporter *imp) {
                                 return 0;
                         }
 
-                        /* replace \n with = */
+                        /* replace '\n' with '=' */
                         line[n-1] = '=';
 
                         imp->field_len = n;