summaryrefslogtreecommitdiffstats
path: root/src/responder/common/responder_common.c
diff options
context:
space:
mode:
authorNikolai Kondrashov <Nikolai.Kondrashov@redhat.com>2014-02-12 10:12:04 -0500
committerJakub Hrozek <jhrozek@redhat.com>2014-02-12 22:30:55 +0100
commita3c8390d19593b1e5277d95bfb4ab206d4785150 (patch)
tree2eb4e5432f4f79a75589c03b1513b656879ebf9c /src/responder/common/responder_common.c
parentcc026fd9ba386f2197e3217940d597dcad1a26fe (diff)
downloadsssd-a3c8390d19593b1e5277d95bfb4ab206d4785150.tar.gz
sssd-a3c8390d19593b1e5277d95bfb4ab206d4785150.tar.xz
sssd-a3c8390d19593b1e5277d95bfb4ab206d4785150.zip
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic macro, supplying format string and its arguments directly, instead of wrapping them in parens. This script was used to update the code: grep -rwl --include '*.[hc]' DEBUG . | while read f; do mv "$f"{,.orig} perl -e \ 'use strict; use File::Slurp; my $text=read_file(\*STDIN); $text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs; print $text;' < "$f.orig" > "$f" rm "$f.orig" done Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>
Diffstat (limited to 'src/responder/common/responder_common.c')
-rw-r--r--src/responder/common/responder_common.c196
1 files changed, 98 insertions, 98 deletions
diff --git a/src/responder/common/responder_common.c b/src/responder/common/responder_common.c
index 8a9188707..5e6d94d32 100644
--- a/src/responder/common/responder_common.c
+++ b/src/responder/common/responder_common.c
@@ -59,8 +59,8 @@ static errno_t set_nonblocking(int fd)
ferr = fcntl(fd, F_SETFL, v | O_NONBLOCK);
if (ferr < 0) {
error = errno;
- DEBUG(0, ("Unable to set fd non-blocking: [%d][%s]\n",
- error, strerror(error)));
+ DEBUG(0, "Unable to set fd non-blocking: [%d][%s]\n",
+ error, strerror(error));
return error;
}
return EOK;
@@ -80,8 +80,8 @@ static errno_t set_close_on_exec(int fd)
ferr = fcntl(fd, F_SETFD, v | FD_CLOEXEC);
if (ferr < 0) {
error = errno;
- DEBUG(0, ("Unable to set fd close-on-exec: [%d][%s]\n",
- error, strerror(error)));
+ DEBUG(0, "Unable to set fd close-on-exec: [%d][%s]\n",
+ error, strerror(error));
return error;
}
return EOK;
@@ -94,13 +94,13 @@ static int client_destructor(struct cli_ctx *ctx)
if ((ctx->cfd > 0) && close(ctx->cfd) < 0) {
ret = errno;
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Failed to close fd [%d]: [%s]\n",
- ctx->cfd, strerror(ret)));
+ "Failed to close fd [%d]: [%s]\n",
+ ctx->cfd, strerror(ret));
}
DEBUG(SSSDBG_TRACE_INTERNAL,
- ("Terminated client [%p][%d]\n",
- ctx, ctx->cfd));
+ "Terminated client [%p][%d]\n",
+ ctx, ctx->cfd);
return 0;
}
@@ -119,11 +119,11 @@ static errno_t get_client_cred(struct cli_ctx *cctx)
&client_cred_len);
if (ret != EOK) {
ret = errno;
- DEBUG(1, ("getsock failed [%d][%s].\n", ret, strerror(ret)));
+ DEBUG(1, "getsock failed [%d][%s].\n", ret, strerror(ret));
return ret;
}
if (client_cred_len != sizeof(struct ucred)) {
- DEBUG(1, ("getsockopt returned unexpected message size.\n"));
+ DEBUG(1, "getsockopt returned unexpected message size.\n");
return ENOMSG;
}
@@ -131,8 +131,8 @@ static errno_t get_client_cred(struct cli_ctx *cctx)
cctx->client_egid = client_cred.gid;
cctx->client_pid = client_cred.pid;
- DEBUG(9, ("Client creds: euid[%d] egid[%d] pid[%d].\n",
- cctx->client_euid, cctx->client_egid, cctx->client_pid));
+ DEBUG(9, "Client creds: euid[%d] egid[%d] pid[%d].\n",
+ cctx->client_euid, cctx->client_egid, cctx->client_pid);
#endif
return EOK;
@@ -171,14 +171,14 @@ errno_t csv_string_to_uid_array(TALLOC_CTX *mem_ctx, const char *cvs_string,
ret = split_on_separator(mem_ctx, cvs_string, ',', true, false,
&list, &list_size);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("split_on_separator failed [%d][%s].\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "split_on_separator failed [%d][%s].\n",
+ ret, strerror(ret));
goto done;
}
uids = talloc_array(mem_ctx, uint32_t, list_size);
if (uids == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_array failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_array failed.\n");
ret = ENOMEM;
goto done;
}
@@ -186,15 +186,15 @@ errno_t csv_string_to_uid_array(TALLOC_CTX *mem_ctx, const char *cvs_string,
if (allow_sss_loop) {
ret = unsetenv("_SSS_LOOPS");
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to unset _SSS_LOOPS, getpwnam "
- "might not find sssd users.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to unset _SSS_LOOPS, getpwnam "
+ "might not find sssd users.\n");
}
}
for (c = 0; c < list_size; c++) {
errno = 0;
if (*list[c] == '\0') {
- DEBUG(SSSDBG_OP_FAILURE, ("Empty list item.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Empty list item.\n");
ret = EINVAL;
goto done;
}
@@ -203,17 +203,17 @@ errno_t csv_string_to_uid_array(TALLOC_CTX *mem_ctx, const char *cvs_string,
if (errno != 0 || *endptr != '\0') {
ret = errno;
if (ret == ERANGE) {
- DEBUG(SSSDBG_OP_FAILURE, ("List item [%s] is out of range.\n",
- list[c]));
+ DEBUG(SSSDBG_OP_FAILURE, "List item [%s] is out of range.\n",
+ list[c]);
goto done;
}
errno = 0;
pwd = getpwnam(list[c]);
if (pwd == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("List item [%s] is neither a valid "
+ DEBUG(SSSDBG_OP_FAILURE, "List item [%s] is neither a valid "
"UID nor a user name which cloud be "
- "resolved by getpwnam().\n", list[c]));
+ "resolved by getpwnam().\n", list[c]);
ret = EINVAL;
goto done;
}
@@ -229,7 +229,7 @@ errno_t csv_string_to_uid_array(TALLOC_CTX *mem_ctx, const char *cvs_string,
done:
if(setenv("_SSS_LOOPS", "NO", 0) != 0) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to set _SSS_LOOPS.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to set _SSS_LOOPS.\n");
}
talloc_free(list);
if (ret != EOK) {
@@ -250,7 +250,7 @@ static void client_send(struct cli_ctx *cctx)
return;
}
if (ret != EOK) {
- DEBUG(0, ("Failed to send data, aborting client!\n"));
+ DEBUG(0, "Failed to send data, aborting client!\n");
talloc_free(cctx);
return;
}
@@ -278,7 +278,7 @@ static void client_recv(struct cli_ctx *cctx)
if (!cctx->creq) {
cctx->creq = talloc_zero(cctx, struct cli_request);
if (!cctx->creq) {
- DEBUG(0, ("Failed to alloc request, aborting client!\n"));
+ DEBUG(0, "Failed to alloc request, aborting client!\n");
talloc_free(cctx);
return;
}
@@ -288,7 +288,7 @@ static void client_recv(struct cli_ctx *cctx)
ret = sss_packet_new(cctx->creq, SSS_PACKET_MAX_RECV_SIZE,
0, &cctx->creq->in);
if (ret != EOK) {
- DEBUG(0, ("Failed to alloc request, aborting client!\n"));
+ DEBUG(0, "Failed to alloc request, aborting client!\n");
talloc_free(cctx);
return;
}
@@ -302,7 +302,7 @@ static void client_recv(struct cli_ctx *cctx)
/* execute command */
ret = client_cmd_execute(cctx, cctx->rctx->sss_cmds);
if (ret != EOK) {
- DEBUG(0, ("Failed to execute request, aborting client!\n"));
+ DEBUG(0, "Failed to execute request, aborting client!\n");
talloc_free(cctx);
}
/* past this point cctx can be freed at any time by callbacks
@@ -314,17 +314,17 @@ static void client_recv(struct cli_ctx *cctx)
break;
case EINVAL:
- DEBUG(6, ("Invalid data from client, closing connection!\n"));
+ DEBUG(6, "Invalid data from client, closing connection!\n");
talloc_free(cctx);
break;
case ENODATA:
- DEBUG(5, ("Client disconnected!\n"));
+ DEBUG(5, "Client disconnected!\n");
talloc_free(cctx);
break;
default:
- DEBUG(6, ("Failed to read request, aborting client!\n"));
+ DEBUG(6, "Failed to read request, aborting client!\n");
talloc_free(cctx);
}
@@ -344,8 +344,8 @@ static void client_fd_handler(struct tevent_context *ev,
ret = reset_idle_timer(cctx);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not create idle timer for client. "
- "This connection may not auto-terminate\n"));
+ "Could not create idle timer for client. "
+ "This connection may not auto-terminate\n");
/* Non-fatal, continue */
}
@@ -387,14 +387,14 @@ static void accept_fd_handler(struct tevent_context *ev,
if (accept_ctx->is_private) {
ret = stat(rctx->priv_sock_name, &stat_buf);
if (ret == -1) {
- DEBUG(1, ("stat on privileged pipe failed: [%d][%s].\n", errno,
- strerror(errno)));
+ DEBUG(1, "stat on privileged pipe failed: [%d][%s].\n", errno,
+ strerror(errno));
return;
}
if ( ! (stat_buf.st_uid == 0 && stat_buf.st_gid == 0 &&
(stat_buf.st_mode&(S_IFSOCK|S_IRUSR|S_IWUSR)) == stat_buf.st_mode)) {
- DEBUG(1, ("privileged pipe has an illegal status.\n"));
+ DEBUG(1, "privileged pipe has an illegal status.\n");
/* TODO: what is the best response to this condition? Terminate? */
return;
}
@@ -403,8 +403,8 @@ static void accept_fd_handler(struct tevent_context *ev,
cctx = talloc_zero(rctx, struct cli_ctx);
if (!cctx) {
struct sockaddr_un addr;
- DEBUG(0, ("Out of memory trying to setup client context%s!\n",
- accept_ctx->is_private ? " on privileged pipe": ""));
+ DEBUG(0, "Out of memory trying to setup client context%s!\n",
+ accept_ctx->is_private ? " on privileged pipe": "");
/* accept and close to signal the client we have a problem */
memset(&addr, 0, sizeof(addr));
len = sizeof(addr);
@@ -419,7 +419,7 @@ static void accept_fd_handler(struct tevent_context *ev,
len = sizeof(cctx->addr);
cctx->cfd = accept(fd, (struct sockaddr *)&cctx->addr, &len);
if (cctx->cfd == -1) {
- DEBUG(1, ("Accept failed [%s]\n", strerror(errno)));
+ DEBUG(1, "Accept failed [%s]\n", strerror(errno));
talloc_free(cctx);
return;
}
@@ -428,16 +428,16 @@ static void accept_fd_handler(struct tevent_context *ev,
ret = get_client_cred(cctx);
if (ret != EOK) {
- DEBUG(2, ("get_client_cred failed, "
- "client cred may not be available.\n"));
+ DEBUG(2, "get_client_cred failed, "
+ "client cred may not be available.\n");
}
if (rctx->allowed_uids_count != 0) {
if (cctx->client_euid == -1) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("allowed_uids configured, " \
+ DEBUG(SSSDBG_CRIT_FAILURE, "allowed_uids configured, " \
"but platform does not support " \
"reading peer credential from the " \
- "socket. Access denied.\n"));
+ "socket. Access denied.\n");
close(cctx->cfd);
talloc_free(cctx);
return;
@@ -447,10 +447,10 @@ static void accept_fd_handler(struct tevent_context *ev,
rctx->allowed_uids);
if (ret != EOK) {
if (ret == EACCES) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Access denied for uid [%d].\n",
- cctx->client_euid));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Access denied for uid [%d].\n",
+ cctx->client_euid);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("check_allowed_uids failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "check_allowed_uids failed.\n");
}
close(cctx->cfd);
talloc_free(cctx);
@@ -464,8 +464,8 @@ static void accept_fd_handler(struct tevent_context *ev,
close(cctx->cfd);
talloc_free(cctx);
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to queue client handler%s\n",
- accept_ctx->is_private ? " on privileged pipe" : ""));
+ "Failed to queue client handler%s\n",
+ accept_ctx->is_private ? " on privileged pipe" : "");
return;
}
@@ -478,14 +478,14 @@ static void accept_fd_handler(struct tevent_context *ev,
ret = reset_idle_timer(cctx);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not create idle timer for client. "
- "This connection may not auto-terminate\n"));
+ "Could not create idle timer for client. "
+ "This connection may not auto-terminate\n");
/* Non-fatal, continue */
}
DEBUG(SSSDBG_TRACE_FUNC,
- ("Client connected%s!\n",
- accept_ctx->is_private ? " to privileged pipe" : ""));
+ "Client connected%s!\n",
+ accept_ctx->is_private ? " to privileged pipe" : "");
return;
}
@@ -501,8 +501,8 @@ static errno_t reset_idle_timer(struct cli_ctx *cctx)
if (!cctx->idle) return ENOMEM;
DEBUG(SSSDBG_TRACE_ALL,
- ("Idle timer re-set for client [%p][%d]\n",
- cctx, cctx->cfd));
+ "Idle timer re-set for client [%p][%d]\n",
+ cctx, cctx->cfd);
return EOK;
}
@@ -517,8 +517,8 @@ static void idle_handler(struct tevent_context *ev,
talloc_get_type(data, struct cli_ctx);
DEBUG(SSSDBG_TRACE_INTERNAL,
- ("Terminating idle client [%p][%d]\n",
- cctx, cctx->cfd));
+ "Terminating idle client [%p][%d]\n",
+ cctx, cctx->cfd);
/* The cli_ctx destructor will handle the rest */
talloc_free(cctx);
@@ -543,7 +543,7 @@ static int sss_dp_init(struct resp_ctx *rctx,
/* Set up SBUS connection to the monitor */
ret = dp_get_sbus_address(be_conn, &be_conn->sbus_address, domain->name);
if (ret != EOK) {
- DEBUG(0, ("Could not locate DP address.\n"));
+ DEBUG(0, "Could not locate DP address.\n");
return ret;
}
ret = sbus_client_init(rctx, rctx->ev,
@@ -551,7 +551,7 @@ static int sss_dp_init(struct resp_ctx *rctx,
intf, &be_conn->conn,
NULL, rctx);
if (ret != EOK) {
- DEBUG(0, ("Failed to connect to monitor services.\n"));
+ DEBUG(0, "Failed to connect to monitor services.\n");
return ret;
}
@@ -562,7 +562,7 @@ static int sss_dp_init(struct resp_ctx *rctx,
DATA_PROVIDER_VERSION,
cli_name);
if (ret != EOK) {
- DEBUG(0, ("Failed to identify to the DP!\n"));
+ DEBUG(0, "Failed to identify to the DP!\n");
return ret;
}
@@ -641,11 +641,11 @@ static int set_unix_socket(struct resp_ctx *rctx)
unlink(rctx->sock_name);
if (bind(rctx->lfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
- DEBUG(0,("Unable to bind on socket '%s'\n", rctx->sock_name));
+ DEBUG(0,"Unable to bind on socket '%s'\n", rctx->sock_name);
goto failed;
}
if (listen(rctx->lfd, 10) != 0) {
- DEBUG(0,("Unable to listen on socket '%s'\n", rctx->sock_name));
+ DEBUG(0,"Unable to listen on socket '%s'\n", rctx->sock_name);
goto failed;
}
@@ -658,7 +658,7 @@ static int set_unix_socket(struct resp_ctx *rctx)
TEVENT_FD_READ, accept_fd_handler,
accept_ctx);
if (!rctx->lfde) {
- DEBUG(0, ("Failed to queue handler on pipe\n"));
+ DEBUG(0, "Failed to queue handler on pipe\n");
goto failed;
}
}
@@ -691,11 +691,11 @@ static int set_unix_socket(struct resp_ctx *rctx)
unlink(rctx->priv_sock_name);
if (bind(rctx->priv_lfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
- DEBUG(0,("Unable to bind on socket '%s'\n", rctx->priv_sock_name));
+ DEBUG(0,"Unable to bind on socket '%s'\n", rctx->priv_sock_name);
goto failed;
}
if (listen(rctx->priv_lfd, 10) != 0) {
- DEBUG(0,("Unable to listen on socket '%s'\n", rctx->priv_sock_name));
+ DEBUG(0,"Unable to listen on socket '%s'\n", rctx->priv_sock_name);
goto failed;
}
@@ -708,7 +708,7 @@ static int set_unix_socket(struct resp_ctx *rctx)
TEVENT_FD_READ, accept_fd_handler,
accept_ctx);
if (!rctx->priv_lfde) {
- DEBUG(0, ("Failed to queue handler on privileged pipe\n"));
+ DEBUG(0, "Failed to queue handler on privileged pipe\n");
goto failed;
}
}
@@ -733,7 +733,7 @@ static int sss_responder_ctx_destructor(void *ptr)
/* mark that we are shutting down the responder, so it is propagated
* into underlying contexts that are freed right before rctx */
- DEBUG(SSSDBG_TRACE_FUNC, ("Responder is being shut down\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Responder is being shut down\n");
rctx->shutting_down = true;
return 0;
@@ -759,7 +759,7 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
rctx = talloc_zero(mem_ctx, struct resp_ctx);
if (!rctx) {
- DEBUG(0, ("fatal error initializing resp_ctx\n"));
+ DEBUG(0, "fatal error initializing resp_ctx\n");
return ENOMEM;
}
rctx->ev = ev;
@@ -778,8 +778,8 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
&rctx->client_idle_timeout);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannot get the client idle timeout [%d]: %s\n",
- ret, strerror(ret)));
+ "Cannot get the client idle timeout [%d]: %s\n",
+ ret, strerror(ret));
goto fail;
}
@@ -793,19 +793,19 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
GET_DOMAINS_DEFAULT_TIMEOUT, &rctx->domains_timeout);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannnot get the default domain timeout [%d]: %s\n",
- ret, strerror(ret)));
+ "Cannnot get the default domain timeout [%d]: %s\n",
+ ret, strerror(ret));
goto fail;
}
if (rctx->domains_timeout < 0) {
- DEBUG(SSSDBG_CONF_SETTINGS, ("timeout can't be set to negative value, setting default\n"));
+ DEBUG(SSSDBG_CONF_SETTINGS, "timeout can't be set to negative value, setting default\n");
rctx->domains_timeout = GET_DOMAINS_DEFAULT_TIMEOUT;
}
ret = confdb_get_domains(rctx->cdb, &rctx->domains);
if (ret != EOK) {
- DEBUG(0, ("fatal error setting up domain map\n"));
+ DEBUG(0, "fatal error setting up domain map\n");
goto fail;
}
@@ -814,8 +814,8 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
&rctx->default_domain);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannnot get the default domain [%d]: %s\n",
- ret, strerror(ret)));
+ "Cannnot get the default domain [%d]: %s\n",
+ ret, strerror(ret));
goto fail;
}
@@ -823,7 +823,7 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
svc_name, svc_version, rctx,
&rctx->mon_conn);
if (ret != EOK) {
- DEBUG(0, ("fatal error setting up message bus\n"));
+ DEBUG(0, "fatal error setting up message bus\n");
goto fail;
}
@@ -831,8 +831,8 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
ret = sss_names_init(rctx->cdb, rctx->cdb, dom->name, &dom->names);
if (ret != EOK) {
DEBUG(SSSDBG_FATAL_FAILURE,
- ("fatal error initializing regex data for domain: %s\n",
- dom->name));
+ "fatal error initializing regex data for domain: %s\n",
+ dom->name);
goto fail;
}
@@ -843,7 +843,7 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
ret = sss_dp_init(rctx, dp_intf, cli_name, dom);
if (ret != EOK) {
- DEBUG(0, ("fatal error setting up backend connector\n"));
+ DEBUG(0, "fatal error setting up backend connector\n");
goto fail;
}
}
@@ -851,14 +851,14 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
ret = sysdb_init(rctx, rctx->domains, false);
if (ret != EOK) {
SYSDB_VERSION_ERROR_DAEMON(ret);
- DEBUG(0, ("fatal error initializing resp_ctx\n"));
+ DEBUG(0, "fatal error initializing resp_ctx\n");
goto fail;
}
/* after all initializations we are ready to listen on our socket */
ret = set_unix_socket(rctx);
if (ret != EOK) {
- DEBUG(0, ("fatal error initializing socket\n"));
+ DEBUG(0, "fatal error initializing socket\n");
goto fail;
}
@@ -866,11 +866,11 @@ int sss_process_init(TALLOC_CTX *mem_ctx,
ret = sss_hash_create(rctx, 30, &rctx->dp_request_table);
if (ret != EOK) {
DEBUG(SSSDBG_FATAL_FAILURE,
- ("Could not create hash table for the request queue\n"));
+ "Could not create hash table for the request queue\n");
goto fail;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Responder Initialization complete\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Responder Initialization complete\n");
*responder_ctx = rctx;
return EOK;
@@ -918,8 +918,8 @@ responder_get_domain(struct resp_ctx *rctx, const char *name)
}
if (!ret_dom) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unknown domain [%s], checking for "
- "possible subdomains!\n", name));
+ DEBUG(SSSDBG_OP_FAILURE, "Unknown domain [%s], checking for "
+ "possible subdomains!\n", name);
}
return ret_dom;
@@ -951,8 +951,8 @@ errno_t responder_get_domain_by_id(struct resp_ctx *rctx, const char *id,
if (IS_SUBDOMAIN(dom) &&
((time(NULL) - dom->parent->subdomains_last_checked.tv_sec) >
rctx->domains_timeout)) {
- DEBUG(SSSDBG_TRACE_FUNC, ("Domain entry with id [%s] " \
- "is expired.\n", id));
+ DEBUG(SSSDBG_TRACE_FUNC, "Domain entry with id [%s] " \
+ "is expired.\n", id);
ret = EAGAIN;
goto done;
}
@@ -962,8 +962,8 @@ errno_t responder_get_domain_by_id(struct resp_ctx *rctx, const char *id,
}
if (ret_dom == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unknown domain id [%s], checking for "
- "possible subdomains!\n", id));
+ DEBUG(SSSDBG_OP_FAILURE, "Unknown domain id [%s], checking for "
+ "possible subdomains!\n", id);
ret = ENOENT;
} else {
*_ret_dom = ret_dom;
@@ -1000,8 +1000,8 @@ void responder_set_fd_limit(rlim_t fd_limit)
limret = setrlimit(RLIMIT_NOFILE, &new_limit);
if (limret == 0) {
DEBUG(SSSDBG_CONF_SETTINGS,
- ("Maximum file descriptors set to [%"SPRIrlim"]\n",
- new_limit.rlim_cur));
+ "Maximum file descriptors set to [%"SPRIrlim"]\n",
+ new_limit.rlim_cur);
return;
}
@@ -1013,8 +1013,8 @@ void responder_set_fd_limit(rlim_t fd_limit)
limret = getrlimit(RLIMIT_NOFILE, &current_limit);
if (limret == 0) {
DEBUG(SSSDBG_TRACE_INTERNAL,
- ("Current fd limit: [%"SPRIrlim"]\n",
- current_limit.rlim_cur));
+ "Current fd limit: [%"SPRIrlim"]\n",
+ current_limit.rlim_cur);
/* Choose the lesser of the requested and the hard limit */
if (current_limit.rlim_max < fd_limit) {
new_limit.rlim_cur = current_limit.rlim_max;
@@ -1026,16 +1026,16 @@ void responder_set_fd_limit(rlim_t fd_limit)
limret = setrlimit(RLIMIT_NOFILE, &new_limit);
if (limret == 0) {
DEBUG(SSSDBG_CONF_SETTINGS,
- ("Maximum file descriptors set to [%"SPRIrlim"]\n",
- new_limit.rlim_cur));
+ "Maximum file descriptors set to [%"SPRIrlim"]\n",
+ new_limit.rlim_cur);
} else {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not set new fd limits. Proceeding with "
- "[%"SPRIrlim"]\n", current_limit.rlim_cur));
+ "Could not set new fd limits. Proceeding with "
+ "[%"SPRIrlim"]\n", current_limit.rlim_cur);
}
} else {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not determine fd limits. "
- "Proceeding with system values\n"));
+ "Could not determine fd limits. "
+ "Proceeding with system values\n");
}
}