1
0
mirror of https://github.com/systemd/systemd.git synced 2024-10-29 04:55:36 +03:00

tree-wide: Downgrade a few more noisy log messages to trace

This commit is contained in:
Daan De Meyer 2023-05-27 10:36:30 +02:00
parent b2efe28658
commit 30868c1c8d
3 changed files with 11 additions and 11 deletions

View File

@ -484,7 +484,7 @@ int catalog_update(const char* database, const char* root, const char* const* di
n = 0;
ORDERED_HASHMAP_FOREACH_KEY(payload, i, h) {
log_debug("Found " SD_ID128_FORMAT_STR ", language %s",
log_trace("Found " SD_ID128_FORMAT_STR ", language %s",
SD_ID128_FORMAT_VAL(i->id),
isempty(i->language) ? "C" : i->language);

View File

@ -99,7 +99,7 @@ int umount_recursive_full(const char *prefix, int flags, char **keep) {
continue;
}
log_debug("Successfully unmounted %s", path);
log_trace("Successfully unmounted %s", path);
again = true;
n++;
@ -376,7 +376,7 @@ int bind_remount_recursive_with_mountinfo(
continue;
}
log_debug("Remounted %s.", x);
log_trace("Remounted %s.", x);
}
}
}

View File

@ -1079,7 +1079,7 @@ int seccomp_load_syscall_filter_set(uint32_t default_action, const SyscallFilter
SECCOMP_FOREACH_LOCAL_ARCH(arch) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
r = seccomp_init_for_arch(&seccomp, arch, default_action);
if (r < 0)
@ -1113,7 +1113,7 @@ int seccomp_load_syscall_filter_set_raw(uint32_t default_action, Hashmap* filter
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
void *syscall_id, *val;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
r = seccomp_init_for_arch(&seccomp, arch, default_action);
if (r < 0)
@ -1254,7 +1254,7 @@ int seccomp_restrict_namespaces(unsigned long retain) {
SECCOMP_FOREACH_LOCAL_ARCH(arch) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
r = seccomp_init_for_arch(&seccomp, arch, SCMP_ACT_ALLOW);
if (r < 0)
@ -1306,7 +1306,7 @@ int seccomp_restrict_namespaces(unsigned long retain) {
continue;
}
log_debug("Blocking %s.", namespace_info[i].proc_name);
log_trace("Blocking %s.", namespace_info[i].proc_name);
r = seccomp_rule_add_exact(
seccomp,
@ -1372,7 +1372,7 @@ int seccomp_protect_sysctl(void) {
SECCOMP_FOREACH_LOCAL_ARCH(arch) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
if (IN_SET(arch,
SCMP_ARCH_AARCH64,
@ -1448,7 +1448,7 @@ int seccomp_restrict_address_families(Set *address_families, bool allow_list) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
bool supported;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
switch (arch) {
@ -1632,7 +1632,7 @@ int seccomp_restrict_realtime_full(int error_code) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
int p;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
r = seccomp_init_for_arch(&seccomp, arch, SCMP_ACT_ALLOW);
if (r < 0)
@ -1724,7 +1724,7 @@ int seccomp_memory_deny_write_execute(void) {
_cleanup_(seccomp_releasep) scmp_filter_ctx seccomp = NULL;
int filter_syscall = 0, block_syscall = 0, shmat_syscall = 0, r;
log_debug("Operating on architecture: %s", seccomp_arch_to_string(arch));
log_trace("Operating on architecture: %s", seccomp_arch_to_string(arch));
switch (arch) {