From: Steve Dickson <SteveD@redhat.com>
To: Nick Alcock <nix@esperi.org.uk>
Cc: linux-nfs@vger.kernel.org, Nick Alcock <nick.alcock@oracle.com>
Subject: Re: [PATCH 4/4] Fix debugging-related namespace pollution.
Date: Thu, 26 Apr 2012 16:07:29 -0400 [thread overview]
Message-ID: <4F99AB01.3060203@RedHat.com> (raw)
In-Reply-To: <1328472138-25750-4-git-send-email-nix@esperi.org.uk>
On 02/05/2012 03:02 PM, Nick Alcock wrote:
> From: Nick Alcock <nick.alcock@oracle.com>
>
> When GSS is compiled in, libtirpc exports three symbols, 'log_debug',
> 'log_status', and 'log_hexdump', which do nothing unless DEBUG is #defined at
> libtirpc compile time. This is a pretty abominable piece of namespace pollution:
> these symbols are quite likely to be used for local debugging routines by other
> binaries and shared libraries, and those local calls are now likely to go astray
> into libtirpc's do-nothing versions instead.
>
> So this changes the names of these functions. This is technically an ABI break,
> but since these symbols are undocumented and useless (with variable behaviour
> depending on whether DEBUG was #defined, and only present at all if GSS was
> compiled in) anything using those symbols was broken anyway.
>
> (A quick grep of my local sources shows numerous other local users of the name
> log_debug() in particular, including LVM, libassuan, GnuPG, gvfs, and dhcp.
> If you include binaries as well as intra-shared-library calls, the count goes
> much higher.)
>
> Signed-off-by: Nick Alcock <nick.alcock@oracle.com>
> ---
> src/auth_gss.c | 46 ++++++++++++++++----------------
> src/authgss_prot.c | 70 +++++++++++++++++++++++++-------------------------
> src/svc_auth_gss.c | 58 ++++++++++++++++++++--------------------
> tirpc/rpc/auth_gss.h | 6 ++--
> 4 files changed, 90 insertions(+), 90 deletions(-)
>
> diff --git a/src/auth_gss.c b/src/auth_gss.c
> index a992049..539101e 100644
> --- a/src/auth_gss.c
> +++ b/src/auth_gss.c
> @@ -87,9 +87,9 @@ print_rpc_gss_sec(struct rpc_gss_sec *ptr)
> int i;
> char *p;
>
> - log_debug("rpc_gss_sec:");
> + gss_log_debug("rpc_gss_sec:");
> if(ptr->mech == NULL)
> - log_debug("NULL gss_OID mech");
> + gss_log_debug("NULL gss_OID mech");
> else {
> fprintf(stderr, " mechanism_OID: {");
> p = (char *)ptr->mech->elements;
> @@ -151,7 +151,7 @@ authgss_create(CLIENT *clnt, gss_name_t name, struct rpc_gss_sec *sec)
> struct rpc_gss_data *gd;
> OM_uint32 min_stat = 0;
>
> - log_debug("in authgss_create()");
> + gss_log_debug("in authgss_create()");
>
> memset(&rpc_createerr, 0, sizeof(rpc_createerr));
>
> @@ -216,7 +216,7 @@ authgss_create_default(CLIENT *clnt, char *service, struct rpc_gss_sec *sec)
> gss_buffer_desc sname;
> gss_name_t name = GSS_C_NO_NAME;
>
> - log_debug("in authgss_create_default()");
> + gss_log_debug("in authgss_create_default()");
>
>
> sname.value = service;
> @@ -227,7 +227,7 @@ authgss_create_default(CLIENT *clnt, char *service, struct rpc_gss_sec *sec)
> &name);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_import_name", maj_stat, min_stat);
> + gss_log_status("gss_import_name", maj_stat, min_stat);
> rpc_createerr.cf_stat = RPC_AUTHERROR;
> return (NULL);
> }
> @@ -249,7 +249,7 @@ authgss_get_private_data(AUTH *auth, struct authgss_private_data *pd)
> {
> struct rpc_gss_data *gd;
>
> - log_debug("in authgss_get_private_data()");
> + gss_log_debug("in authgss_get_private_data()");
>
> if (!auth || !pd)
> return (FALSE);
> @@ -269,7 +269,7 @@ authgss_get_private_data(AUTH *auth, struct authgss_private_data *pd)
> static void
> authgss_nextverf(AUTH *auth)
> {
> - log_debug("in authgss_nextverf()");
> + gss_log_debug("in authgss_nextverf()");
> /* no action necessary */
> }
>
> @@ -283,7 +283,7 @@ authgss_marshal(AUTH *auth, XDR *xdrs)
> OM_uint32 maj_stat, min_stat;
> bool_t xdr_stat;
>
> - log_debug("in authgss_marshal()");
> + gss_log_debug("in authgss_marshal()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -318,7 +318,7 @@ authgss_marshal(AUTH *auth, XDR *xdrs)
> &rpcbuf, &checksum);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_get_mic", maj_stat, min_stat);
> + gss_log_status("gss_get_mic", maj_stat, min_stat);
> if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
> gd->established = FALSE;
> authgss_destroy_context(auth);
> @@ -343,7 +343,7 @@ authgss_validate(AUTH *auth, struct opaque_auth *verf)
> gss_buffer_desc signbuf, checksum;
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in authgss_validate()");
> + gss_log_debug("in authgss_validate()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -379,7 +379,7 @@ authgss_validate(AUTH *auth, struct opaque_auth *verf)
> maj_stat = gss_verify_mic(&min_stat, gd->ctx, &signbuf,
> &checksum, &qop_state);
> if (maj_stat != GSS_S_COMPLETE || qop_state != gd->sec.qop) {
> - log_status("gss_verify_mic", maj_stat, min_stat);
> + gss_log_status("gss_verify_mic", maj_stat, min_stat);
> if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
> gd->established = FALSE;
> authgss_destroy_context(auth);
> @@ -397,7 +397,7 @@ authgss_refresh(AUTH *auth)
> gss_buffer_desc *recv_tokenp, send_token;
> OM_uint32 maj_stat, min_stat, call_stat, ret_flags;
>
> - log_debug("in authgss_refresh()");
> + gss_log_debug("in authgss_refresh()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -416,9 +416,9 @@ authgss_refresh(AUTH *auth)
> #ifdef DEBUG
> /* print the token we just received */
> if (recv_tokenp != GSS_C_NO_BUFFER) {
> - log_debug("The token we just received (length %d):",
> + gss_log_debug("The token we just received (length %d):",
> recv_tokenp->length);
> - log_hexdump(recv_tokenp->value, recv_tokenp->length, 0);
> + gss_log_hexdump(recv_tokenp->value, recv_tokenp->length, 0);
> }
> #endif
> maj_stat = gss_init_sec_context(&min_stat,
> @@ -441,7 +441,7 @@ authgss_refresh(AUTH *auth)
> }
> if (maj_stat != GSS_S_COMPLETE &&
> maj_stat != GSS_S_CONTINUE_NEEDED) {
> - log_status("gss_init_sec_context", maj_stat, min_stat);
> + gss_log_status("gss_init_sec_context", maj_stat, min_stat);
> break;
> }
> if (send_token.length != 0) {
> @@ -449,9 +449,9 @@ authgss_refresh(AUTH *auth)
>
> #ifdef DEBUG
> /* print the token we are about to send */
> - log_debug("The token being sent (length %d):",
> + gss_log_debug("The token being sent (length %d):",
> send_token.length);
> - log_hexdump(send_token.value, send_token.length, 0);
> + gss_log_hexdump(send_token.value, send_token.length, 0);
> #endif
>
> call_stat = clnt_call(gd->clnt, NULLPROC,
> @@ -500,7 +500,7 @@ authgss_refresh(AUTH *auth)
>
> if (maj_stat != GSS_S_COMPLETE
> || qop_state != gd->sec.qop) {
> - log_status("gss_verify_mic", maj_stat, min_stat);
> + gss_log_status("gss_verify_mic", maj_stat, min_stat);
> if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
> gd->established = FALSE;
> authgss_destroy_context(auth);
> @@ -533,7 +533,7 @@ authgss_service(AUTH *auth, int svc)
> {
> struct rpc_gss_data *gd;
>
> - log_debug("in authgss_service()");
> + gss_log_debug("in authgss_service()");
>
> if (!auth)
> return(FALSE);
> @@ -551,7 +551,7 @@ authgss_destroy_context(AUTH *auth)
> struct rpc_gss_data *gd;
> OM_uint32 min_stat;
>
> - log_debug("in authgss_destroy_context()");
> + gss_log_debug("in authgss_destroy_context()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -595,7 +595,7 @@ authgss_destroy(AUTH *auth)
> struct rpc_gss_data *gd;
> OM_uint32 min_stat;
>
> - log_debug("in authgss_destroy()");
> + gss_log_debug("in authgss_destroy()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -616,7 +616,7 @@ authgss_wrap(AUTH *auth, XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr)
> {
> struct rpc_gss_data *gd;
>
> - log_debug("in authgss_wrap()");
> + gss_log_debug("in authgss_wrap()");
>
> gd = AUTH_PRIVATE(auth);
>
> @@ -633,7 +633,7 @@ authgss_unwrap(AUTH *auth, XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr)
> {
> struct rpc_gss_data *gd;
>
> - log_debug("in authgss_unwrap()");
> + gss_log_debug("in authgss_unwrap()");
>
> gd = AUTH_PRIVATE(auth);
>
> diff --git a/src/authgss_prot.c b/src/authgss_prot.c
> index 0168318..a3c93c9 100644
> --- a/src/authgss_prot.c
> +++ b/src/authgss_prot.c
> @@ -64,10 +64,10 @@ xdr_rpc_gss_buf(XDR *xdrs, gss_buffer_t buf, u_int maxsize)
> if (xdr_stat && xdrs->x_op == XDR_DECODE)
> buf->length = tmplen;
>
> - log_debug("xdr_rpc_gss_buf: %s %s (%p:%d)",
> - (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> - (xdr_stat == TRUE) ? "success" : "failure",
> - buf->value, buf->length);
> + gss_log_debug("xdr_rpc_gss_buf: %s %s (%p:%d)",
> + (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> + (xdr_stat == TRUE) ? "success" : "failure",
> + buf->value, buf->length);
>
> return xdr_stat;
> }
> @@ -83,12 +83,12 @@ xdr_rpc_gss_cred(XDR *xdrs, struct rpc_gss_cred *p)
> xdr_enum(xdrs, (enum_t *)&p->gc_svc) &&
> xdr_rpc_gss_buf(xdrs, &p->gc_ctx, MAX_AUTH_BYTES));
>
> - log_debug("xdr_rpc_gss_cred: %s %s "
> - "(v %d, proc %d, seq %d, svc %d, ctx %p:%d)",
> - (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> - (xdr_stat == TRUE) ? "success" : "failure",
> - p->gc_v, p->gc_proc, p->gc_seq, p->gc_svc,
> - p->gc_ctx.value, p->gc_ctx.length);
> + gss_log_debug("xdr_rpc_gss_cred: %s %s "
> + "(v %d, proc %d, seq %d, svc %d, ctx %p:%d)",
> + (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> + (xdr_stat == TRUE) ? "success" : "failure",
> + p->gc_v, p->gc_proc, p->gc_seq, p->gc_svc,
> + p->gc_ctx.value, p->gc_ctx.length);
>
> return (xdr_stat);
> }
> @@ -101,10 +101,10 @@ xdr_rpc_gss_init_args(XDR *xdrs, gss_buffer_desc *p)
>
> xdr_stat = xdr_rpc_gss_buf(xdrs, p, maxlen);
>
> - log_debug("xdr_rpc_gss_init_args: %s %s (token %p:%d)",
> - (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> - (xdr_stat == TRUE) ? "success" : "failure",
> - p->value, p->length);
> + gss_log_debug("xdr_rpc_gss_init_args: %s %s (token %p:%d)",
> + (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> + (xdr_stat == TRUE) ? "success" : "failure",
> + p->value, p->length);
>
> return (xdr_stat);
> }
> @@ -123,13 +123,13 @@ xdr_rpc_gss_init_res(XDR *xdrs, struct rpc_gss_init_res *p)
> xdr_u_int(xdrs, &p->gr_win) &&
> xdr_rpc_gss_buf(xdrs, &p->gr_token, tok_maxlen));
>
> - log_debug("xdr_rpc_gss_init_res %s %s "
> - "(ctx %p:%d, maj %d, min %d, win %d, token %p:%d)",
> - (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> - (xdr_stat == TRUE) ? "success" : "failure",
> - p->gr_ctx.value, p->gr_ctx.length,
> - p->gr_major, p->gr_minor, p->gr_win,
> - p->gr_token.value, p->gr_token.length);
> + gss_log_debug("xdr_rpc_gss_init_res %s %s "
> + "(ctx %p:%d, maj %d, min %d, win %d, token %p:%d)",
> + (xdrs->x_op == XDR_ENCODE) ? "encode" : "decode",
> + (xdr_stat == TRUE) ? "success" : "failure",
> + p->gr_ctx.value, p->gr_ctx.length,
> + p->gr_major, p->gr_minor, p->gr_win,
> + p->gr_token.value, p->gr_token.length);
>
> return (xdr_stat);
> }
> @@ -175,7 +175,7 @@ xdr_rpc_gss_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
> maj_stat = gss_get_mic(&min_stat, ctx, qop,
> &databuf, &wrapbuf);
> if (maj_stat != GSS_S_COMPLETE) {
> - log_debug("gss_get_mic failed");
> + gss_log_debug("gss_get_mic failed");
> return (FALSE);
> }
> /* Marshal checksum. */
> @@ -189,7 +189,7 @@ xdr_rpc_gss_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
> maj_stat = gss_wrap(&min_stat, ctx, TRUE, qop, &databuf,
> &conf_state, &wrapbuf);
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_wrap", maj_stat, min_stat);
> + gss_log_status("gss_wrap", maj_stat, min_stat);
> return (FALSE);
> }
> /* Marshal databody_priv. */
> @@ -222,13 +222,13 @@ xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
> if (svc == RPCSEC_GSS_SVC_INTEGRITY) {
> /* Decode databody_integ. */
> if (!xdr_rpc_gss_buf(xdrs, &databuf, (u_int)-1)) {
> - log_debug("xdr decode databody_integ failed");
> + gss_log_debug("xdr decode databody_integ failed");
> return (FALSE);
> }
> /* Decode checksum. */
> if (!xdr_rpc_gss_buf(xdrs, &wrapbuf, (u_int)-1)) {
> gss_release_buffer(&min_stat, &databuf);
> - log_debug("xdr decode checksum failed");
> + gss_log_debug("xdr decode checksum failed");
> return (FALSE);
> }
> /* Verify checksum and QOP. */
> @@ -238,14 +238,14 @@ xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
>
> if (maj_stat != GSS_S_COMPLETE || qop_state != qop) {
> gss_release_buffer(&min_stat, &databuf);
> - log_status("gss_verify_mic", maj_stat, min_stat);
> + gss_log_status("gss_verify_mic", maj_stat, min_stat);
> return (FALSE);
> }
> }
> else if (svc == RPCSEC_GSS_SVC_PRIVACY) {
> /* Decode databody_priv. */
> if (!xdr_rpc_gss_buf(xdrs, &wrapbuf, (u_int)-1)) {
> - log_debug("xdr decode databody_priv failed");
> + gss_log_debug("xdr decode databody_priv failed");
> return (FALSE);
> }
> /* Decrypt databody. */
> @@ -258,7 +258,7 @@ xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
> if (maj_stat != GSS_S_COMPLETE || qop_state != qop ||
> conf_state != TRUE) {
> gss_release_buffer(&min_stat, &databuf);
> - log_status("gss_unwrap", maj_stat, min_stat);
> + gss_log_status("gss_unwrap", maj_stat, min_stat);
> return (FALSE);
> }
> }
> @@ -271,7 +271,7 @@ xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
>
> /* Verify sequence number. */
> if (xdr_stat == TRUE && seq_num != seq) {
> - log_debug("wrong sequence number in databody");
> + gss_log_debug("wrong sequence number in databody");
> return (FALSE);
> }
> return (xdr_stat);
> @@ -300,7 +300,7 @@ xdr_rpc_gss_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
> #include <ctype.h>
>
> void
> -log_debug(const char *fmt, ...)
> +gss_log_debug(const char *fmt, ...)
> {
> va_list ap;
>
> @@ -312,7 +312,7 @@ log_debug(const char *fmt, ...)
> }
>
> void
> -log_status(char *m, OM_uint32 maj_stat, OM_uint32 min_stat)
> +gss_log_status(char *m, OM_uint32 maj_stat, OM_uint32 min_stat)
> {
> OM_uint32 min;
> gss_buffer_desc msg;
> @@ -332,7 +332,7 @@ log_status(char *m, OM_uint32 maj_stat, OM_uint32 min_stat)
> }
>
> void
> -log_hexdump(const u_char *buf, int len, int offset)
> +gss_log_hexdump(const u_char *buf, int len, int offset)
> {
> u_int i, j, jm;
> int c;
> @@ -367,17 +367,17 @@ log_hexdump(const u_char *buf, int len, int offset)
> #else
>
> void
> -log_debug(const char *fmt, ...)
> +gss_log_debug(const char *fmt, ...)
> {
> }
>
> void
> -log_status(char *m, OM_uint32 maj_stat, OM_uint32 min_stat)
> +gss_log_status(char *m, OM_uint32 maj_stat, OM_uint32 min_stat)
> {
> }
>
> void
> -log_hexdump(const u_char *buf, int len, int offset)
> +gss_log_hexdump(const u_char *buf, int len, int offset)
> {
> }
>
> diff --git a/src/svc_auth_gss.c b/src/svc_auth_gss.c
> index 54b23b1..9c74313 100644
> --- a/src/svc_auth_gss.c
> +++ b/src/svc_auth_gss.c
> @@ -87,13 +87,13 @@ svcauth_gss_set_svc_name(gss_name_t name)
> {
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in svcauth_gss_set_svc_name()");
> + gss_log_debug("in svcauth_gss_set_svc_name()");
>
> if (_svcauth_gss_name != NULL) {
> maj_stat = gss_release_name(&min_stat, &_svcauth_gss_name);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_release_name", maj_stat, min_stat);
> + gss_log_status("gss_release_name", maj_stat, min_stat);
> return (FALSE);
> }
> _svcauth_gss_name = NULL;
> @@ -101,7 +101,7 @@ svcauth_gss_set_svc_name(gss_name_t name)
> maj_stat = gss_duplicate_name(&min_stat, name, &_svcauth_gss_name);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_duplicate_name", maj_stat, min_stat);
> + gss_log_status("gss_duplicate_name", maj_stat, min_stat);
> return (FALSE);
> }
>
> @@ -115,7 +115,7 @@ svcauth_gss_import_name(char *service)
> gss_buffer_desc namebuf;
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in svcauth_gss_import_name()");
> + gss_log_debug("in svcauth_gss_import_name()");
>
> namebuf.value = service;
> namebuf.length = strlen(service);
> @@ -124,7 +124,7 @@ svcauth_gss_import_name(char *service)
> (gss_OID)GSS_C_NT_HOSTBASED_SERVICE, &name);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_import_name", maj_stat, min_stat);
> + gss_log_status("gss_import_name", maj_stat, min_stat);
> return (FALSE);
> }
> if (svcauth_gss_set_svc_name(name) != TRUE) {
> @@ -139,14 +139,14 @@ svcauth_gss_acquire_cred(void)
> {
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in svcauth_gss_acquire_cred()");
> + gss_log_debug("in svcauth_gss_acquire_cred()");
>
> maj_stat = gss_acquire_cred(&min_stat, _svcauth_gss_name, 0,
> GSS_C_NULL_OID_SET, GSS_C_ACCEPT,
> &_svcauth_gss_creds, NULL, NULL);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_acquire_cred", maj_stat, min_stat);
> + gss_log_status("gss_acquire_cred", maj_stat, min_stat);
> return (FALSE);
> }
> return (TRUE);
> @@ -157,12 +157,12 @@ svcauth_gss_release_cred(void)
> {
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in svcauth_gss_release_cred()");
> + gss_log_debug("in svcauth_gss_release_cred()");
>
> maj_stat = gss_release_cred(&min_stat, &_svcauth_gss_creds);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_release_cred", maj_stat, min_stat);
> + gss_log_status("gss_release_cred", maj_stat, min_stat);
> return (FALSE);
> }
>
> @@ -181,7 +181,7 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
> gss_OID mech;
> OM_uint32 maj_stat = 0, min_stat = 0, ret_flags, seq;
>
> - log_debug("in svcauth_gss_accept_context()");
> + gss_log_debug("in svcauth_gss_accept_context()");
>
> gd = SVCAUTH_PRIVATE(rqst->rq_xprt->xp_auth);
> gc = (struct rpc_gss_cred *)rqst->rq_clntcred;
> @@ -208,7 +208,7 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
>
> if (gr->gr_major != GSS_S_COMPLETE &&
> gr->gr_major != GSS_S_CONTINUE_NEEDED) {
> - log_status("accept_sec_context", gr->gr_major, gr->gr_minor);
> + gss_log_status("accept_sec_context", gr->gr_major, gr->gr_minor);
> gd->ctx = GSS_C_NO_CONTEXT;
> gss_release_buffer(&min_stat, &gr->gr_token);
> return (FALSE);
> @@ -238,7 +238,7 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
> maj_stat = gss_display_name(&min_stat, gd->client_name,
> &gd->cname, &gd->sec.mech);
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("display_name", maj_stat, min_stat);
> + gss_log_status("display_name", maj_stat, min_stat);
> return (FALSE);
> }
> #ifdef DEBUG
> @@ -248,19 +248,19 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
>
> gss_oid_to_str(&min_stat, mech, &mechname);
>
> - log_debug("accepted context for %.*s with "
> - "<mech %.*s, qop %d, svc %d>",
> - gd->cname.length, (char *)gd->cname.value,
> - mechname.length, (char *)mechname.value,
> - gd->sec.qop, gd->sec.svc);
> + gss_log_debug("accepted context for %.*s with "
> + "<mech %.*s, qop %d, svc %d>",
> + gd->cname.length, (char *)gd->cname.value,
> + mechname.length, (char *)mechname.value,
> + gd->sec.qop, gd->sec.svc);
>
> gss_release_buffer(&min_stat, &mechname);
> }
> #elif HAVE_HEIMDAL
> - log_debug("accepted context for %.*s with "
> - "<mech {}, qop %d, svc %d>",
> - gd->cname.length, (char *)gd->cname.value,
> - gd->sec.qop, gd->sec.svc);
> + gss_log_debug("accepted context for %.*s with "
> + "<mech {}, qop %d, svc %d>",
> + gd->cname.length, (char *)gd->cname.value,
> + gd->sec.qop, gd->sec.svc);
> #endif
> #endif /* DEBUG */
> seq = htonl(gr->gr_win);
> @@ -289,7 +289,7 @@ svcauth_gss_validate(struct svc_rpc_gss_data *gd, struct rpc_msg *msg)
> u_char rpchdr[128];
> int32_t *buf;
>
> - log_debug("in svcauth_gss_validate()");
> + gss_log_debug("in svcauth_gss_validate()");
>
> memset(rpchdr, 0, sizeof(rpchdr));
>
> @@ -326,7 +326,7 @@ svcauth_gss_validate(struct svc_rpc_gss_data *gd, struct rpc_msg *msg)
> &qop_state);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_verify_mic", maj_stat, min_stat);
> + gss_log_status("gss_verify_mic", maj_stat, min_stat);
> return (FALSE);
> }
> return (TRUE);
> @@ -339,7 +339,7 @@ svcauth_gss_nextverf(struct svc_req *rqst, u_int num)
> gss_buffer_desc signbuf, checksum;
> OM_uint32 maj_stat, min_stat;
>
> - log_debug("in svcauth_gss_nextverf()");
> + gss_log_debug("in svcauth_gss_nextverf()");
>
> if (rqst->rq_xprt->xp_auth == NULL)
> return (FALSE);
> @@ -353,7 +353,7 @@ svcauth_gss_nextverf(struct svc_req *rqst, u_int num)
> &signbuf, &checksum);
>
> if (maj_stat != GSS_S_COMPLETE) {
> - log_status("gss_get_mic", maj_stat, min_stat);
> + gss_log_status("gss_get_mic", maj_stat, min_stat);
> return (FALSE);
> }
> rqst->rq_xprt->xp_verf.oa_flavor = RPCSEC_GSS;
> @@ -373,7 +373,7 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, bool_t *no_dispatch)
> struct rpc_gss_init_res gr;
> int call_stat, offset;
>
> - log_debug("in svcauth_gss()");
> + gss_log_debug("in svcauth_gss()");
>
> /* Initialize reply. */
> rqst->rq_xprt->xp_verf = _null_auth;
> @@ -519,7 +519,7 @@ svcauth_gss_destroy(SVCAUTH *auth)
> struct svc_rpc_gss_data *gd;
> OM_uint32 min_stat;
>
> - log_debug("in svcauth_gss_destroy()");
> + gss_log_debug("in svcauth_gss_destroy()");
>
> gd = SVCAUTH_PRIVATE(auth);
>
> @@ -540,7 +540,7 @@ svcauth_gss_wrap(SVCAUTH *auth, XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr)
> {
> struct svc_rpc_gss_data *gd;
>
> - log_debug("in svcauth_gss_wrap()");
> + gss_log_debug("in svcauth_gss_wrap()");
>
> gd = SVCAUTH_PRIVATE(auth);
>
> @@ -557,7 +557,7 @@ svcauth_gss_unwrap(SVCAUTH *auth, XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr
> {
> struct svc_rpc_gss_data *gd;
>
> - log_debug("in svcauth_gss_unwrap()");
> + gss_log_debug("in svcauth_gss_unwrap()");
>
> gd = SVCAUTH_PRIVATE(auth);
>
> diff --git a/tirpc/rpc/auth_gss.h b/tirpc/rpc/auth_gss.h
> index 633b11f..fc3ffbd 100644
> --- a/tirpc/rpc/auth_gss.h
> +++ b/tirpc/rpc/auth_gss.h
> @@ -120,10 +120,10 @@ bool_t authgss_service __P((AUTH *auth, int svc));
> bool_t authgss_get_private_data __P((AUTH *auth,
> struct authgss_private_data *));
>
> -void log_debug __P((const char *fmt, ...));
> -void log_status __P((char *m, OM_uint32 major,
> +void gss_log_debug __P((const char *fmt, ...));
> +void gss_log_status __P((char *m, OM_uint32 major,
> OM_uint32 minor));
> -void log_hexdump __P((const u_char *buf, int len, int offset));
> +void gss_log_hexdump __P((const u_char *buf, int len, int offset));
>
> __END_DECLS
>
Committed..
steved
next prev parent reply other threads:[~2012-04-26 20:07 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-02-05 20:02 [PATCH 1/4] Fix debugging reference from non-GSS to optional GSS code Nick Alcock
2012-02-05 20:02 ` [PATCH 2/4] Make svc_auth_none always available Nick Alcock
2012-04-26 20:06 ` Steve Dickson
2012-02-05 20:02 ` [PATCH 3/4] No longer require NIS Nick Alcock
2012-04-26 20:07 ` Steve Dickson
2012-02-05 20:02 ` [PATCH 4/4] Fix debugging-related namespace pollution Nick Alcock
2012-04-26 20:07 ` Steve Dickson [this message]
2012-04-26 20:06 ` [PATCH 1/4] Fix debugging reference from non-GSS to optional GSS code Steve Dickson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4F99AB01.3060203@RedHat.com \
--to=steved@redhat.com \
--cc=linux-nfs@vger.kernel.org \
--cc=nick.alcock@oracle.com \
--cc=nix@esperi.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).