>From 8e5ef8ec9f642f8245d21a499f751acf4ac6d452 Mon Sep 17 00:00:00 2001 From: Lukas Slebodnik Date: Wed, 4 Sep 2013 16:28:06 +0200 Subject: [PATCH 17/19] Fix formating of variables with type: uid_t --- src/db/sysdb_ops.c | 5 +++-- src/monitor/monitor.c | 3 ++- src/monitor/monitor_netlink.c | 5 +++-- src/providers/krb5/krb5_become_user.c | 5 +++-- src/providers/krb5/krb5_utils.c | 4 ++-- src/providers/proxy/proxy_id.c | 11 +++++++---- src/responder/common/negcache.c | 4 ++-- src/tools/sss_seed.c | 5 +++-- src/tools/tools_util.c | 3 ++- 9 files changed, 27 insertions(+), 18 deletions(-) diff --git a/src/db/sysdb_ops.c b/src/db/sysdb_ops.c index 03f45de730be815d9cc9e42b6239ab6a7c04601b..4e5451e3fe35d03df5994b8b3480f55541c69d78 100644 --- a/src/db/sysdb_ops.c +++ b/src/db/sysdb_ops.c @@ -1198,8 +1198,9 @@ int sysdb_add_user(struct sysdb_ctx *sysdb, if (domain->id_max != 0 && uid != 0 && (uid < domain->id_min || uid > domain->id_max)) { - DEBUG(2, ("Supplied uid [%d] is not in the allowed range [%d-%d].\n", - uid, domain->id_min, domain->id_max)); + DEBUG(SSSDBG_OP_FAILURE, + ("Supplied uid [%"SPRIuid"] is not in the allowed range " + "[%d-%d].\n", uid, domain->id_min, domain->id_max)); return ERANGE; } diff --git a/src/monitor/monitor.c b/src/monitor/monitor.c index d8bbfbcbe7666cef43fcc3597103beabea634800..3d8ba26285b6a8fc60ccb695f8b10ae1714ac918 100644 --- a/src/monitor/monitor.c +++ b/src/monitor/monitor.c @@ -2695,7 +2695,8 @@ int main(int argc, const char *argv[]) uid = getuid(); if (uid != 0) { - DEBUG(SSSDBG_FATAL_FAILURE, ("Running under %d, must be root\n", uid)); + DEBUG(SSSDBG_FATAL_FAILURE, + ("Running under %"SPRIuid", must be root\n", uid)); sss_log(SSS_LOG_ALERT, "sssd must be run as root"); return 8; } diff --git a/src/monitor/monitor_netlink.c b/src/monitor/monitor_netlink.c index 932a6bf330a80e8c0f7cd506a0ae50a49e9ce38f..c013423780f318f2a0f12dd5fa50babe12cdcd18 100644 --- a/src/monitor/monitor_netlink.c +++ b/src/monitor/monitor_netlink.c @@ -472,8 +472,9 @@ static int event_msg_recv(struct nl_msg *msg, void *arg) creds = nlmsg_get_creds(msg); if (!creds || creds->uid != 0) { - DEBUG(9, ("Ignoring netlink message from UID %d", - creds ? creds->uid : -1)); + DEBUG(SSSDBG_TRACE_ALL, + ("Ignoring netlink message from UID %"SPRIuid, + creds ? creds->uid : (uid_t)-1)); return NL_SKIP; } diff --git a/src/providers/krb5/krb5_become_user.c b/src/providers/krb5/krb5_become_user.c index 567cf237569f70a6b0fd500327438f2dbb08d24d..d549d838487ea31f795cd26c77c57d1f3c45d8c8 100644 --- a/src/providers/krb5/krb5_become_user.c +++ b/src/providers/krb5/krb5_become_user.c @@ -30,12 +30,13 @@ errno_t become_user(uid_t uid, gid_t gid) uid_t cuid; int ret; - DEBUG(SSSDBG_FUNC_DATA, ("Trying to become user [%d][%d].\n", uid, gid)); + DEBUG(SSSDBG_FUNC_DATA, + ("Trying to become user [%"SPRIuid"][%d].\n", uid, gid)); /* skip call if we already are the requested user */ cuid = geteuid(); if (uid == cuid) { - DEBUG(SSSDBG_FUNC_DATA, ("Already user [%d].\n", uid)); + DEBUG(SSSDBG_FUNC_DATA, ("Already user [%"SPRIuid"].\n", uid)); return EOK; } diff --git a/src/providers/krb5/krb5_utils.c b/src/providers/krb5/krb5_utils.c index d09687356f84e0d4e3ed81d8b3b9bb38f2c506cd..9dd9882de1f468cbcf07cf2a656e3c61267e5301 100644 --- a/src/providers/krb5/krb5_utils.c +++ b/src/providers/krb5/krb5_utils.c @@ -242,7 +242,7 @@ char *expand_ccname_template(TALLOC_CTX *mem_ctx, struct krb5child_req *kr, "because uid is invalid.\n")); goto done; } - result = talloc_asprintf_append(result, "%s%d", p, + result = talloc_asprintf_append(result, "%s%"SPRIuid, p, kr->uid); if (!file_mode) *private_path = true; break; @@ -386,7 +386,7 @@ static errno_t check_parent_stat(bool private_path, struct stat *parent_stat, if (!((parent_stat->st_uid == 0 && parent_stat->st_gid == 0) || parent_stat->st_uid == uid)) { DEBUG(1, ("Private directory can only be created below a " - "directory belonging to root or to [%d][%d].\n", + "directory belonging to root or to [%"SPRIuid"][%d].\n", uid, gid)); return EINVAL; } diff --git a/src/providers/proxy/proxy_id.c b/src/providers/proxy/proxy_id.c index b5d63ecfd280c65e15714ccc98edcc639d7c852d..4ac1c8dcb6efd240dacc8a820e2f60611b35e657 100644 --- a/src/providers/proxy/proxy_id.c +++ b/src/providers/proxy/proxy_id.c @@ -22,6 +22,9 @@ along with this program. If not, see . */ +#include "config.h" + +#include "util/sss_format.h" #include "util/strtonum.h" #include "providers/proxy/proxy.h" @@ -166,7 +169,7 @@ handle_getpw_result(enum nss_status status, struct passwd *pwd, case NSS_STATUS_SUCCESS: - DEBUG(SSSDBG_TRACE_FUNC, ("User found: (%s, %d, %d)\n", + DEBUG(SSSDBG_TRACE_FUNC, ("User found: (%s, %"SPRIuid", %d)\n", pwd->pw_name, pwd->pw_uid, pwd->pw_gid)); /* uid=0 or gid=0 are invalid values */ @@ -314,7 +317,7 @@ static int get_pw_uid(TALLOC_CTX *mem_ctx, bool del_user = false; int ret; - DEBUG(SSSDBG_TRACE_FUNC, ("Searching user by uid (%d)\n", uid)); + DEBUG(SSSDBG_TRACE_FUNC, ("Searching user by uid (%"SPRIuid")\n", uid)); tmpctx = talloc_new(NULL); if (!tmpctx) { @@ -354,7 +357,7 @@ done: talloc_zfree(tmpctx); if (ret) { DEBUG(SSSDBG_CRIT_FAILURE, - ("proxy -> getpwuid_r failed for '%d' <%d>: %s\n", + ("proxy -> getpwuid_r failed for '%"SPRIuid"' <%d>: %s\n", uid, ret, strerror(ret))); } return ret; @@ -453,7 +456,7 @@ static int enum_users(TALLOC_CTX *mem_ctx, case NSS_STATUS_SUCCESS: - DEBUG(SSSDBG_TRACE_LIBS, ("User found (%s, %d, %d)\n", + DEBUG(SSSDBG_TRACE_LIBS, ("User found (%s, %"SPRIuid", %d)\n", pwd->pw_name, pwd->pw_uid, pwd->pw_gid)); /* uid=0 or gid=0 are invalid values */ diff --git a/src/responder/common/negcache.c b/src/responder/common/negcache.c index 769346370b8366a687b63a1a844dde8f083d0154..a1f44789bac9e9818dfc09cf48c105b36eb5e3b5 100644 --- a/src/responder/common/negcache.c +++ b/src/responder/common/negcache.c @@ -379,7 +379,7 @@ int sss_ncache_check_uid(struct sss_nc_ctx *ctx, int ttl, uid_t uid) char *str; int ret; - str = talloc_asprintf(ctx, "%s/%u", NC_UID_PREFIX, uid); + str = talloc_asprintf(ctx, "%s/%"SPRIuid, NC_UID_PREFIX, uid); if (!str) return ENOMEM; ret = sss_ncache_check_str(ctx, str, ttl); @@ -510,7 +510,7 @@ int sss_ncache_set_uid(struct sss_nc_ctx *ctx, bool permanent, uid_t uid) char *str; int ret; - str = talloc_asprintf(ctx, "%s/%u", NC_UID_PREFIX, uid); + str = talloc_asprintf(ctx, "%s/%"SPRIuid, NC_UID_PREFIX, uid); if (!str) return ENOMEM; ret = sss_ncache_set_str(ctx, str, permanent); diff --git a/src/tools/sss_seed.c b/src/tools/sss_seed.c index 75f7e8c520593a0eeb5133ce8749106f951a98cf..78e0274210d70d195b7667026f38a4ae88ca1b4c 100644 --- a/src/tools/sss_seed.c +++ b/src/tools/sss_seed.c @@ -166,8 +166,9 @@ static int seed_id_input(const char *req, return ret; } if (*endptr != '\0') { - DEBUG(SSSDBG_MINOR_FAILURE, ("extra characters [%s] after " - "ID [%d]\n", endptr, *_id_input)); + DEBUG(SSSDBG_MINOR_FAILURE, + ("extra characters [%s] after ID [%"SPRIuid"]\n", + endptr, *_id_input)); } } else { ret = EINVAL; diff --git a/src/tools/tools_util.c b/src/tools/tools_util.c index 6798b6589668b1335a7a5ada59b08cf92a2bbf1f..0e1b3b40704bb7eb7e574e497477410eca968c18 100644 --- a/src/tools/tools_util.c +++ b/src/tools/tools_util.c @@ -360,7 +360,8 @@ static int remove_mail_spool(TALLOC_CTX *mem_ctx, case 0: break; case -1: - DEBUG(3, ("%s not owned by %d, not removing\n", + DEBUG(SSSDBG_MINOR_FAILURE, + ("%s not owned by %"SPRIuid", not removing\n", spool_file, uid)); ret = EACCES; /* FALLTHROUGH */ -- 1.8.3.1