On (18/02/15 16:18), Jakub Hrozek wrote:
>On Wed, Feb 18, 2015 at 01:33:32PM +0100, Pavel Reichl wrote:
>> ci 1-12: http://sssd-ci.duckdns.org/logs/job/7/64/summary.html
>
>I fixed the space-before-newline mentioned in the other mail and pushed
>the patch to sssd-1-12: 7bc69afc71c0b8f48bdbf0b5b79d229a47aa49f2

All big patch sets were pushed to master.
So it's time for patches for master branch.

LS
>From 0063d98897c1068863e05bb5f3fb72e891b05f3d Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lsleb...@redhat.com>
Date: Tue, 17 Feb 2015 16:40:01 +0100
Subject: [PATCH 1/4] Add missing new lines to debug messages

---
 src/confdb/confdb_setup.c                  |  2 +-
 src/db/sysdb_autofs.c                      |  4 ++--
 src/db/sysdb_sudo.c                        |  2 +-
 src/db/sysdb_views.c                       |  2 +-
 src/monitor/monitor.c                      |  6 +++---
 src/monitor/monitor_netlink.c              | 16 ++++++++--------
 src/providers/ad/ad_common.c               |  8 ++++----
 src/providers/ad/ad_init.c                 |  8 ++++----
 src/providers/ad/ad_subdomains.c           |  4 ++--
 src/providers/data_provider_be.c           |  4 ++--
 src/providers/dp_dyndns.c                  | 16 ++++++++--------
 src/providers/dp_ptask.c                   | 10 ++++++----
 src/providers/ipa/ipa_access.c             |  2 +-
 src/providers/ipa/ipa_hbac_rules.c         |  2 +-
 src/providers/ipa/ipa_hostid.c             |  2 +-
 src/providers/ipa/ipa_selinux.c            |  6 +++---
 src/providers/ipa/ipa_subdomains.c         |  6 +++---
 src/providers/krb5/krb5_child.c            |  2 +-
 src/providers/krb5/krb5_wait_queue.c       |  2 +-
 src/providers/ldap/ldap_id.c               |  2 +-
 src/providers/ldap/sdap.c                  |  4 ++--
 src/providers/ldap/sdap_async.c            |  2 +-
 src/providers/ldap/sdap_async_connection.c |  2 +-
 src/providers/ldap/sdap_async_initgroups.c |  6 +++---
 src/providers/ldap/sdap_utils.c            |  2 +-
 src/responder/autofs/autofssrv_cmd.c       |  4 ++--
 src/responder/common/responder_dp.c        |  4 ++--
 src/responder/nss/nsssrv_cmd.c             |  4 ++--
 src/responder/nss/nsssrv_netgroup.c        |  4 ++--
 src/responder/pac/pacsrv_cmd.c             |  2 +-
 src/responder/pac/pacsrv_utils.c           |  4 ++--
 src/responder/pam/pamsrv.c                 |  4 ++--
 src/responder/sudo/sudosrv_get_sudorules.c |  2 +-
 src/responder/sudo/sudosrv_query.c         |  2 +-
 src/sbus/sssd_dbus_server.c                |  4 ++--
 src/tests/krb5_child-test.c                |  2 +-
 src/tools/files.c                          | 12 ++++++------
 src/tools/sss_sync_ops.c                   |  2 +-
 src/util/debug.c                           |  2 +-
 src/util/domain_info_utils.c               |  8 ++++----
 src/util/find_uid.c                        |  2 +-
 src/util/server.c                          |  4 ++--
 src/util/sss_ini.c                         |  4 ++--
 src/util/sss_krb5.c                        | 10 +++++-----
 src/util/sss_semanage.c                    |  7 ++++---
 src/util/usertools.c                       |  2 +-
 46 files changed, 107 insertions(+), 104 deletions(-)

diff --git a/src/confdb/confdb_setup.c b/src/confdb/confdb_setup.c
index 
857725f1a80219045b1fd9bfb6e24f95f8f06c1a..93a1a1b53ab0c9d76ecb35cf186624770088b425
 100644
--- a/src/confdb/confdb_setup.c
+++ b/src/confdb/confdb_setup.c
@@ -275,7 +275,7 @@ int confdb_init_db(const char *config_file, struct 
confdb_ctx *cdb)
         goto done;
     }
 
-    DEBUG(SSSDBG_TRACE_LIBS, "LDIF file to import: \n%s", config_ldif);
+    DEBUG(SSSDBG_TRACE_LIBS, "LDIF file to import: \n%s\n", config_ldif);
 
     while ((ldif = ldb_ldif_read_string(cdb->ldb, &config_ldif))) {
         ret = ldb_add(cdb->ldb, ldif->msg);
diff --git a/src/db/sysdb_autofs.c b/src/db/sysdb_autofs.c
index 
218e9c0a09a6b274d9154d5d084b87c229811bce..b3e9b4ec83b66ec65a72ab7a3180106e2293d8a5
 100644
--- a/src/db/sysdb_autofs.c
+++ b/src/db/sysdb_autofs.c
@@ -222,7 +222,7 @@ sysdb_get_map_byname(TALLOC_CTX *mem_ctx,
                               &count, &msgs);
     if (ret != EOK && ret != ENOENT) {
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Error looking up autofs map [%s]", safe_map_name);
+              "Error looking up autofs map [%s]\n", safe_map_name);
         goto done;
     } else if (ret == ENOENT) {
         DEBUG(SSSDBG_TRACE_FUNC, "No such map\n");
@@ -467,7 +467,7 @@ sysdb_invalidate_autofs_maps(struct sss_domain_info *domain)
                               &count, &msgs);
     if (ret != EOK && ret != ENOENT) {
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Error looking up autofs maps");
+              "Error looking up autofs maps\n");
         goto done;
     } else if (ret == ENOENT) {
         ret = EOK;
diff --git a/src/db/sysdb_sudo.c b/src/db/sysdb_sudo.c
index 
54f726ffff907dd2531f5577cf87c84848509d00..4c50d32c779732a5fb78f23f4344ba4ba0825e84
 100644
--- a/src/db/sysdb_sudo.c
+++ b/src/db/sysdb_sudo.c
@@ -668,7 +668,7 @@ errno_t sysdb_sudo_purge_byfilter(struct sss_domain_info 
*domain,
         ret = EOK;
         goto done;
     } else if (ret != EOK) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up SUDO rules");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up SUDO rules\n");
         goto done;
     }
 
diff --git a/src/db/sysdb_views.c b/src/db/sysdb_views.c
index 
431d3345418ad05f12b025a1c1733c13a89c490a..945f16ac1753e3b4dfa0c799b00ad177b24d438c
 100644
--- a/src/db/sysdb_views.c
+++ b/src/db/sysdb_views.c
@@ -238,7 +238,7 @@ errno_t sysdb_invalidate_overrides(struct sysdb_ctx *sysdb)
 
     base_dn = ldb_dn_new(tmp_ctx, sysdb->ldb, SYSDB_BASE);
     if (base_dn == NULL) {
-        DEBUG(SSSDBG_OP_FAILURE, "ldb_dn_new failed");
+        DEBUG(SSSDBG_OP_FAILURE, "ldb_dn_new failed\n");
         ret = ENOMEM;
         goto done;
     }
diff --git a/src/monitor/monitor.c b/src/monitor/monitor.c
index 
8845e4a3758dd725a16f01aa9e09daf07cde6a9c..e02397b6e754b528e898a051845637fe5fbba8df
 100644
--- a/src/monitor/monitor.c
+++ b/src/monitor/monitor.c
@@ -998,9 +998,9 @@ static int get_monitor_config(struct mt_ctx *ctx)
 
     ret = add_implicit_services(ctx->cdb, ctx, &ctx->services);
     if (ret != EOK) {
-        DEBUG(SSSDBG_OP_FAILURE, "Failed to add implicit configured " \
-                                  "services. Some functionality might " \
-                                  "be missing");
+        DEBUG(SSSDBG_OP_FAILURE, "Failed to add implicit configured "
+                                 "services. Some functionality might "
+                                 "be missing\n");
     }
 
     badsrv = check_services(ctx->services);
diff --git a/src/monitor/monitor_netlink.c b/src/monitor/monitor_netlink.c
index 
51e8ffe4725ac2943b39bf229022d2637b799cea..7e6f8cbbd3c4815fb2c9991698ecfd4ee5deeeef
 100644
--- a/src/monitor/monitor_netlink.c
+++ b/src/monitor/monitor_netlink.c
@@ -220,7 +220,7 @@ static bool has_phy_80211_subdir(const char *sysfs_path)
     ret = snprintf(phy80211_path, SYSFS_SUBDIR_PATH_MAX,
                    "%s/%s", sysfs_path, PHY_80211_SUBDIR);
     if (ret < 0) {
-        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed");
+        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed\n");
         return false;
     } else if (ret >= SYSFS_SUBDIR_PATH_MAX) {
         DEBUG(SSSDBG_OP_FAILURE, "path too long?!?!\n");
@@ -263,7 +263,7 @@ static bool discard_iff_up(const char *ifname)
 
     ret = snprintf(path, SYSFS_IFACE_PATH_MAX, SYSFS_IFACE_TEMPLATE, ifname);
     if (ret < 0) {
-        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed");
+        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed\n");
         return false;
     } else if (ret >= SYSFS_IFACE_PATH_MAX) {
         DEBUG(SSSDBG_OP_FAILURE, "path too long?!?!\n");
@@ -339,8 +339,8 @@ static bool nlw_accept_message(struct nlw_handle *nlp,
     }
 
     if (accept_msg == false) {
-        DEBUG(SSSDBG_TRACE_ALL, "ignoring netlink message from PID %d",
-                  hdr->nlmsg_pid);
+        DEBUG(SSSDBG_TRACE_ALL,
+              "ignoring netlink message from PID %d\n", hdr->nlmsg_pid);
     }
 
     return accept_msg;
@@ -475,8 +475,8 @@ static int event_msg_recv(struct nl_msg *msg, void *arg)
     creds = nlmsg_get_creds(msg);
     if (!creds || creds->uid != 0) {
         DEBUG(SSSDBG_TRACE_ALL,
-              "Ignoring netlink message from UID %"SPRIuid,
-                  creds ? creds->uid : (uid_t)-1);
+              "Ignoring netlink message from UID %"SPRIuid"\n",
+              creds ? creds->uid : (uid_t)-1);
         return NL_SKIP;
     }
 
@@ -754,8 +754,8 @@ int setup_netlink(TALLOC_CTX *mem_ctx, struct 
tevent_context *ev,
     /* allocate the libnl handle/socket and register the default filter set */
     nlctx->nlp = nlw_alloc();
     if (!nlctx->nlp) {
-        DEBUG(SSSDBG_CRIT_FAILURE, ("unable to allocate netlink handle: %s"),
-                                     nlw_geterror(ENOMEM));
+        DEBUG(SSSDBG_CRIT_FAILURE,
+              "unable to allocate netlink handle: %s\n", nlw_geterror(ENOMEM));
         ret = ENOMEM;
         goto fail;
     }
diff --git a/src/providers/ad/ad_common.c b/src/providers/ad/ad_common.c
index 
c3cbfdac06b1e89c35ceb7547f5a31ca85bbb28f..120878977d08aab04bbd9e3cf87a00a4b018b6e4
 100644
--- a/src/providers/ad/ad_common.c
+++ b/src/providers/ad/ad_common.c
@@ -437,8 +437,8 @@ _ad_servers_init(struct ad_service *service,
                                        false, sdata);
             if (ret != EOK) {
                 DEBUG(SSSDBG_FATAL_FAILURE,
-                      "Failed to add service discovery to failover: [%s]",
-                       strerror(ret));
+                      "Failed to add service discovery to failover: [%s]\n",
+                      strerror(ret));
                 goto done;
             }
 
@@ -454,8 +454,8 @@ _ad_servers_init(struct ad_service *service,
                                        false, sdata);
             if (ret != EOK) {
                 DEBUG(SSSDBG_FATAL_FAILURE,
-                      "Failed to add service discovery to failover: [%s]",
-                       strerror(ret));
+                      "Failed to add service discovery to failover: [%s]\n",
+                      strerror(ret));
                 goto done;
             }
 
diff --git a/src/providers/ad/ad_init.c b/src/providers/ad/ad_init.c
index 
ca2d49f624e9f7a9155e7f744fb41d6f4ec4b3b3..3d12f382c613883a8f88442c7b1602470deb105d
 100644
--- a/src/providers/ad/ad_init.c
+++ b/src/providers/ad/ad_init.c
@@ -454,16 +454,16 @@ sssm_ad_access_init(struct be_ctx *bectx,
     ret = sss_hash_create(access_ctx, 10, &access_ctx->gpo_map_options_table);
     if (ret != EOK) {
         DEBUG(SSSDBG_FATAL_FAILURE,
-              "Could not create gpo_map_options hash table: [%s]",
-               strerror(ret));
+              "Could not create gpo_map_options hash table: [%s]\n",
+              strerror(ret));
         goto fail;
     }
 
     ret = ad_gpo_parse_map_options(access_ctx);
     if (ret != EOK) {
         DEBUG(SSSDBG_FATAL_FAILURE,
-              "Could not parse gpo_map_options (invalid config): [%s]",
-               strerror(ret));
+              "Could not parse gpo_map_options (invalid config): [%s]\n",
+              strerror(ret));
         goto fail;
     }
 
diff --git a/src/providers/ad/ad_subdomains.c b/src/providers/ad/ad_subdomains.c
index 
b3821f8d07855e431e69cdc00c225bcd7e4db1eb..5a6e9338d6dc581fba4f76e8b28f92a558eb6294
 100644
--- a/src/providers/ad/ad_subdomains.c
+++ b/src/providers/ad/ad_subdomains.c
@@ -1186,12 +1186,12 @@ int ad_subdom_init(struct be_ctx *be_ctx,
 
     ret = be_add_online_cb(ctx, be_ctx, ad_subdom_online_cb, ctx, NULL);
     if (ret != EOK) {
-        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom online callback");
+        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom online callback\n");
     }
 
     ret = be_add_offline_cb(ctx, be_ctx, ad_subdom_offline_cb, ctx, NULL);
     if (ret != EOK) {
-        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom offline callback");
+        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom offline callback\n");
     }
 
     err = sss_idmap_init(sss_idmap_talloc, ctx, sss_idmap_talloc_free,
diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c
index 
47809e20f48e9cd5e2cc30fab17300ee0563e5a3..a48a42878d207785b664c06d3a6c1557dcab69b3
 100644
--- a/src/providers/data_provider_be.c
+++ b/src/providers/data_provider_be.c
@@ -927,7 +927,7 @@ be_file_account_request(struct be_req *be_req, struct 
be_acct_req *ar)
     if ((ar->entry_type & 0xFF) == BE_REQ_INITGROUPS) {
         ret = be_initgroups_prereq(be_req);
         if (ret) {
-            DEBUG(SSSDBG_CRIT_FAILURE, "Prerequest failed");
+            DEBUG(SSSDBG_CRIT_FAILURE, "Prerequest failed\n");
             return ret;
         }
     }
@@ -936,7 +936,7 @@ be_file_account_request(struct be_req *be_req, struct 
be_acct_req *ar)
     ret = be_file_request(be_ctx, be_req,
                           be_ctx->bet_info[BET_ID].bet_ops->handler);
     if (ret != EOK) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Failed to file request");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Failed to file request\n");
         return ret;
     }
 
diff --git a/src/providers/dp_dyndns.c b/src/providers/dp_dyndns.c
index 
580fb2c637973719ed771caa2da65081b5f16ca8..7db21509d181b1a5f2de0fd603711e7829a5a452
 100644
--- a/src/providers/dp_dyndns.c
+++ b/src/providers/dp_dyndns.c
@@ -475,10 +475,10 @@ be_nsupdate_create_fwd_msg(TALLOC_CTX *mem_ctx, const 
char *realm,
     }
 
     DEBUG(SSSDBG_TRACE_FUNC,
-          " -- Begin nsupdate message -- \n%s",
-           update_msg);
-    DEBUG(SSSDBG_TRACE_FUNC,
-          " -- End nsupdate message -- \n");
+          " -- Begin nsupdate message -- \n"
+          "%s"
+          " -- End nsupdate message -- \n",
+          update_msg);
 
     ret = ERR_OK;
     *_update_msg = talloc_steal(mem_ctx, update_msg);
@@ -517,10 +517,10 @@ be_nsupdate_create_ptr_msg(TALLOC_CTX *mem_ctx, const 
char *realm,
     }
 
     DEBUG(SSSDBG_TRACE_FUNC,
-          " -- Begin nsupdate message -- \n%s",
-           update_msg);
-    DEBUG(SSSDBG_TRACE_FUNC,
-          " -- End nsupdate message -- \n");
+          " -- Begin nsupdate message -- \n"
+          "%s"
+          " -- End nsupdate message -- \n",
+          update_msg);
 
     ret = ERR_OK;
     *_update_msg = talloc_steal(mem_ctx, update_msg);
diff --git a/src/providers/dp_ptask.c b/src/providers/dp_ptask.c
index 
e3450851e095ded7994ab8bb58031e0b3a22593c..0f28dee1ed8e6683dbdb82d9274d18a10108cbd6
 100644
--- a/src/providers/dp_ptask.c
+++ b/src/providers/dp_ptask.c
@@ -317,15 +317,17 @@ errno_t be_ptask_create(TALLOC_CTX *mem_ctx,
         /* install offline and online callbacks */
         ret = be_add_online_cb(task, be_ctx, be_ptask_online_cb, task, NULL);
         if (ret != EOK) {
-            DEBUG(SSSDBG_OP_FAILURE, "Unable to install online callback "
-                                      "[%d]: %s", ret, sss_strerror(ret));
+            DEBUG(SSSDBG_OP_FAILURE,
+                  "Unable to install online callback [%d]: %s\n",
+                  ret, sss_strerror(ret));
             goto done;
         }
 
         ret = be_add_offline_cb(task, be_ctx, be_ptask_offline_cb, task, NULL);
         if (ret != EOK) {
-            DEBUG(SSSDBG_OP_FAILURE, "Unable to install offline callback "
-                                      "[%d]: %s", ret, sss_strerror(ret));
+            DEBUG(SSSDBG_OP_FAILURE,
+                  "Unable to install offline callback [%d]: %s\n",
+                  ret, sss_strerror(ret));
             goto done;
         }
     }
diff --git a/src/providers/ipa/ipa_access.c b/src/providers/ipa/ipa_access.c
index 
ed52132ad51fb89eb428233037e623fbbcad13ca..2ebaec337eedd205bab7c7cbb2a77568616062d0
 100644
--- a/src/providers/ipa/ipa_access.c
+++ b/src/providers/ipa/ipa_access.c
@@ -711,7 +711,7 @@ errno_t hbac_get_cached_rules(TALLOC_CTX *mem_ctx,
                               HBAC_RULES_SUBDIR, attrs,
                               &rule_count, &msgs);
     if (ret != EOK && ret != ENOENT) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up HBAC rules");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up HBAC rules\n");
         goto done;
     } if (ret == ENOENT) {
        rule_count = 0;
diff --git a/src/providers/ipa/ipa_hbac_rules.c 
b/src/providers/ipa/ipa_hbac_rules.c
index 
571b90c5813b9b1a7d38d70c4c61604b6e64f0e4..497eee612be8e2a93c91f9b7fc598e1793b84949
 100644
--- a/src/providers/ipa/ipa_hbac_rules.c
+++ b/src/providers/ipa/ipa_hbac_rules.c
@@ -144,7 +144,7 @@ ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
     ret = sysdb_attrs_get_string_array(ipa_host, SYSDB_ORIG_MEMBEROF,
                                        tmp_ctx, &memberof_list);
     if (ret != EOK && ret != ENOENT) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Could not identify ");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Could not identify.\n");
     } if (ret == ENOENT) {
         /* This host is not a member of any hostgroups */
         memberof_list = talloc_array(tmp_ctx, const char *, 1);
diff --git a/src/providers/ipa/ipa_hostid.c b/src/providers/ipa/ipa_hostid.c
index 
6b8233587925b87ae89ec1975d1cc933b8643fb4..31fa29f91e72f8f55ad20e45fc23b7279e785889
 100644
--- a/src/providers/ipa/ipa_hostid.c
+++ b/src/providers/ipa/ipa_hostid.c
@@ -110,7 +110,7 @@ ipa_host_info_complete(struct be_req *breq, int dp_error,
             error_text = NULL;
         } else {
             DEBUG(SSSDBG_CRIT_FAILURE,
-                  "Bug: dp_error is OK on failed request");
+                  "Bug: dp_error is OK on failed request\n");
             dp_error = DP_ERR_FATAL;
             error_text = default_error_text;
         }
diff --git a/src/providers/ipa/ipa_selinux.c b/src/providers/ipa/ipa_selinux.c
index 
50ff840560b38a0e2537b61df00191278d346ff2..005a82569f5826b17107968f42531217d9f9029d
 100644
--- a/src/providers/ipa/ipa_selinux.c
+++ b/src/providers/ipa/ipa_selinux.c
@@ -211,7 +211,7 @@ done:
     if (in_transaction) {
         sret = sysdb_transaction_cancel(sysdb);
         if (sret != EOK) {
-            DEBUG(SSSDBG_CRIT_FAILURE, "Failed to cancel transaction");
+            DEBUG(SSSDBG_CRIT_FAILURE, "Failed to cancel transaction\n");
         }
     }
     return ret;
@@ -788,7 +788,7 @@ static errno_t choose_best_seuser(TALLOC_CTX *mem_ctx,
 
     ret = selinux_child_setup(tmp_ctx, pd->user, user_domain, seuser_mls_str, 
&sci);
     if (ret != EOK) {
-        DEBUG(SSSDBG_OP_FAILURE, "Cannot set up child input buffer");
+        DEBUG(SSSDBG_OP_FAILURE, "Cannot set up child input buffer\n");
         goto done;
     }
 
@@ -865,7 +865,7 @@ selinux_child_setup(TALLOC_CTX *mem_ctx,
             }
         } else {
             DEBUG(SSSDBG_OP_FAILURE,
-                  "sss_parse_name failed: [%d] %s", ret, sss_strerror(ret));
+                  "sss_parse_name failed: [%d] %s\n", ret, sss_strerror(ret));
             goto done;
         }
     } else {
diff --git a/src/providers/ipa/ipa_subdomains.c 
b/src/providers/ipa/ipa_subdomains.c
index 
d0f02badee52afc93eb9bf316e654aa0e789937a..0fe2a8dd600fee44c5ab27b664dd47b1cb045dc9
 100644
--- a/src/providers/ipa/ipa_subdomains.c
+++ b/src/providers/ipa/ipa_subdomains.c
@@ -1658,17 +1658,17 @@ int ipa_subdom_init(struct be_ctx *be_ctx,
                                          NULL);
     if (ret != EOK) {
         DEBUG(SSSDBG_MINOR_FAILURE,
-              "Failed to add subdom reset timeouts callback");
+              "Failed to add subdom reset timeouts callback\n");
     }
 
     ret = be_add_online_cb(ctx, be_ctx, ipa_subdom_online_cb, ctx, NULL);
     if (ret != EOK) {
-        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom online callback");
+        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom online callback\n");
     }
 
     ret = be_add_offline_cb(ctx, be_ctx, ipa_subdom_offline_cb, ctx, NULL);
     if (ret != EOK) {
-        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom offline callback");
+        DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom offline callback\n");
     }
 
     ret = ipa_subdom_reinit(ctx);
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c
index 
6c690145dbd0ea03851e6bfb7f45c543c99f6e3a..8fb2e6b2f5565f6594e03b9c45f0ab50e9eed17e
 100644
--- a/src/providers/krb5/krb5_child.c
+++ b/src/providers/krb5/krb5_child.c
@@ -947,7 +947,7 @@ done:
     }
 
     if (krb5_kt_close(kr->ctx, keytab) != 0) {
-        DEBUG(SSSDBG_MINOR_FAILURE, "krb5_kt_close failed");
+        DEBUG(SSSDBG_MINOR_FAILURE, "krb5_kt_close failed\n");
     }
     if (validation_princ != NULL) {
         krb5_free_principal(kr->ctx, validation_princ);
diff --git a/src/providers/krb5/krb5_wait_queue.c 
b/src/providers/krb5/krb5_wait_queue.c
index 
3c390531eacc2db01796135c384acd494b3c919d..10c50d81b8c8b81aab0b5f73fa86b57f708a2e54
 100644
--- a/src/providers/krb5/krb5_wait_queue.c
+++ b/src/providers/krb5/krb5_wait_queue.c
@@ -84,7 +84,7 @@ errno_t add_to_wait_queue(struct be_req *be_req, struct 
pam_data *pd,
                                  &krb5_ctx->wait_queue_hash, 0, 0, 0, 0,
                                  wait_queue_del_cb, NULL);
         if (ret != EOK) {
-            DEBUG(SSSDBG_CRIT_FAILURE, "sss_hash_create failed");
+            DEBUG(SSSDBG_CRIT_FAILURE, "sss_hash_create failed\n");
             return ret;
         }
     }
diff --git a/src/providers/ldap/ldap_id.c b/src/providers/ldap/ldap_id.c
index 
4705714ade959d8373fb670d44b1d665db01973d..eed5035851b66f6b0b85f5876f7e21b38a2b20b4
 100644
--- a/src/providers/ldap/ldap_id.c
+++ b/src/providers/ldap/ldap_id.c
@@ -1636,7 +1636,7 @@ static void sdap_account_info_complete(struct tevent_req 
*req)
             error_text = NULL;
         } else {
             DEBUG(SSSDBG_CRIT_FAILURE,
-                  "Bug: dp_error is OK on failed request");
+                  "Bug: dp_error is OK on failed request\n");
             dp_error = DP_ERR_FATAL;
             error_text = req_error_text;
         }
diff --git a/src/providers/ldap/sdap.c b/src/providers/ldap/sdap.c
index 
c401e7dc86ded8b3685862c6528034b5cc55068d..bae7d02c5b6dbf736ac8826d58b497efc7e4acec
 100644
--- a/src/providers/ldap/sdap.c
+++ b/src/providers/ldap/sdap.c
@@ -437,7 +437,7 @@ int sdap_parse_entry(TALLOC_CTX *memctx,
             if (!vals) {
                 ldap_get_option(sh->ldap, LDAP_OPT_RESULT_CODE, &lerrno);
                 if (lerrno != LDAP_SUCCESS) {
-                    DEBUG(SSSDBG_CRIT_FAILURE, "LDAP Library error: %d(%s)",
+                    DEBUG(SSSDBG_CRIT_FAILURE, "LDAP Library error: %d(%s)\n",
                           lerrno, sss_ldap_err2string(lerrno));
                     ret = EIO;
                     goto done;
@@ -517,7 +517,7 @@ int sdap_parse_entry(TALLOC_CTX *memctx,
 
     ldap_get_option(sh->ldap, LDAP_OPT_RESULT_CODE, &lerrno);
     if (lerrno) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "LDAP Library error: %d(%s)",
+        DEBUG(SSSDBG_CRIT_FAILURE, "LDAP Library error: %d(%s)\n",
               lerrno, sss_ldap_err2string(lerrno));
         ret = EIO;
         goto done;
diff --git a/src/providers/ldap/sdap_async.c b/src/providers/ldap/sdap_async.c
index 
a6954620bd0f27b5f2d2e45563af9d1440d9cf7c..c30a4578e01085daeca1ccc9cc54083513acc4de
 100644
--- a/src/providers/ldap/sdap_async.c
+++ b/src/providers/ldap/sdap_async.c
@@ -1481,7 +1481,7 @@ static void sdap_get_generic_op_finished(struct sdap_op 
*op,
                                                &total_count, &cookie);
         ldap_controls_free(returned_controls);
         if (lret != LDAP_SUCCESS) {
-            DEBUG(SSSDBG_CRIT_FAILURE, "Could not determine page control");
+            DEBUG(SSSDBG_CRIT_FAILURE, "Could not determine page control\n");
             tevent_req_error(req, EIO);
             return;
         }
diff --git a/src/providers/ldap/sdap_async_connection.c 
b/src/providers/ldap/sdap_async_connection.c
index 
304505458135ba1f65e2e89e066bf68291435ba1..bc03a87a2f806bf80d72bc0414c37da62135de9a
 100644
--- a/src/providers/ldap/sdap_async_connection.c
+++ b/src/providers/ldap/sdap_async_connection.c
@@ -1792,7 +1792,7 @@ static void sdap_cli_auth_step(struct tevent_req *req)
         ret = sdap_cli_auth_reconnect(req);
         if (ret != EOK) {
             DEBUG(SSSDBG_MINOR_FAILURE,
-                  "sdap_cli_auth_reconnect failed: %d:[%s]",
+                  "sdap_cli_auth_reconnect failed: %d:[%s]\n",
                   ret, sss_strerror(ret));
             tevent_req_error(req, ret);
         }
diff --git a/src/providers/ldap/sdap_async_initgroups.c 
b/src/providers/ldap/sdap_async_initgroups.c
index 
6b3179d2d6bb30b3b00aa35b07da42de3cf08a34..48c16b71637f83399d9a523f64f6d812b91681ef
 100644
--- a/src/providers/ldap/sdap_async_initgroups.c
+++ b/src/providers/ldap/sdap_async_initgroups.c
@@ -1792,7 +1792,7 @@ static void sdap_initgr_rfc2307bis_done(struct tevent_req 
*subreq)
     ret = save_rfc2307bis_groups(state);
     if (ret != EOK) {
         DEBUG(SSSDBG_MINOR_FAILURE,
-              "Could not save groups memberships [%d]", ret);
+              "Could not save groups memberships [%d]\n", ret);
         goto fail;
     }
 
@@ -1800,7 +1800,7 @@ static void sdap_initgr_rfc2307bis_done(struct tevent_req 
*subreq)
     ret = save_rfc2307bis_group_memberships(state);
     if (ret != EOK) {
         DEBUG(SSSDBG_MINOR_FAILURE,
-              "Could not save group memberships [%d]", ret);
+              "Could not save group memberships [%d]\n", ret);
         goto fail;
     }
 
@@ -1808,7 +1808,7 @@ static void sdap_initgr_rfc2307bis_done(struct tevent_req 
*subreq)
     ret = save_rfc2307bis_user_memberships(state);
     if (ret != EOK) {
         DEBUG(SSSDBG_MINOR_FAILURE,
-              "Could not save user memberships [%d]", ret);
+              "Could not save user memberships [%d]\n", ret);
         goto fail;
     }
 
diff --git a/src/providers/ldap/sdap_utils.c b/src/providers/ldap/sdap_utils.c
index 
93a1faae10e5623e35b70269b924ba269b6f8e43..f5ce8ee54f60a6c4c4cdbd5e50b20d973c175e83
 100644
--- a/src/providers/ldap/sdap_utils.c
+++ b/src/providers/ldap/sdap_utils.c
@@ -86,7 +86,7 @@ sdap_save_all_names(const char *name,
     ret = sysdb_attrs_get_aliases(tmp_ctx, ldap_attrs, name,
                                   lowercase, &aliases);
     if (ret != EOK) {
-        DEBUG(SSSDBG_OP_FAILURE, "Failed to get the alias list");
+        DEBUG(SSSDBG_OP_FAILURE, "Failed to get the alias list\n");
         goto done;
     }
 
diff --git a/src/responder/autofs/autofssrv_cmd.c 
b/src/responder/autofs/autofssrv_cmd.c
index 
4c9f5cf7df091a7567107f08137f958fa191198c..797e638d53a8adbac658541496bd0ab85d271533
 100644
--- a/src/responder/autofs/autofssrv_cmd.c
+++ b/src/responder/autofs/autofssrv_cmd.c
@@ -188,9 +188,9 @@ set_autofs_map(struct autofs_ctx *actx,
     hret = hash_enter(actx->maps, &key, &value);
     if (hret != EOK) {
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Unable to add hash table entry for [%s]", key.str);
+              "Unable to add hash table entry for [%s]\n", key.str);
         DEBUG(SSSDBG_MINOR_FAILURE,
-              "Hash error [%d][%s]", hret, hash_error_string(hret));
+              "Hash error [%d][%s]\n", hret, hash_error_string(hret));
         return EIO;
     }
     talloc_steal(actx->maps, map);
diff --git a/src/responder/common/responder_dp.c 
b/src/responder/common/responder_dp.c
index 
df7455ce3ead4d84ff124ca54f5b74273c77a6d4..853b3eae3877a8b6b2ffb310a0fb9ccf017498ae
 100644
--- a/src/responder/common/responder_dp.c
+++ b/src/responder/common/responder_dp.c
@@ -684,8 +684,8 @@ sss_dp_internal_get_send(struct resp_ctx *rctx,
     ret = sss_dp_get_domain_conn(rctx, dom->conn_name, &be_conn);
     if (ret != EOK) {
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "BUG: The Data Provider connection for %s is not available!",
-               dom->name);
+              "BUG: The Data Provider connection for %s is not available!\n",
+              dom->name);
         ret = EIO;
         goto error;
     }
diff --git a/src/responder/nss/nsssrv_cmd.c b/src/responder/nss/nsssrv_cmd.c
index 
4f297c6a32800303f0480dc63b70d3558462d385..4c0e9414d2cdebe61fd91de06f4900f00904ef22
 100644
--- a/src/responder/nss/nsssrv_cmd.c
+++ b/src/responder/nss/nsssrv_cmd.c
@@ -2865,8 +2865,8 @@ static int fill_grent(struct sss_packet *packet,
                                             fullname.len - pwfield.len);
             if (ret != EOK && ret != ENOMEM) {
                 DEBUG(SSSDBG_OP_FAILURE,
-                      "Failed to store group %s(%s) in mmap cache!",
-                       name.str, domain);
+                      "Failed to store group %s(%s) in mmap cache!\n",
+                      name.str, domain);
             }
         }
 
diff --git a/src/responder/nss/nsssrv_netgroup.c 
b/src/responder/nss/nsssrv_netgroup.c
index 
66b7f2759c88e8279747d59d2ec4c83ada8a21ba..c71043858988bbf6c66aaab1357d24d3701c777f
 100644
--- a/src/responder/nss/nsssrv_netgroup.c
+++ b/src/responder/nss/nsssrv_netgroup.c
@@ -76,9 +76,9 @@ static errno_t set_netgroup_entry(struct nss_ctx *nctx,
     hret = hash_enter(nctx->netgroups, &key, &value);
     if (hret != EOK) {
         DEBUG(SSSDBG_FATAL_FAILURE,
-              "Unable to add hash table entry for [%s]", key.str);
+              "Unable to add hash table entry for [%s]\n", key.str);
         DEBUG(SSSDBG_CONF_SETTINGS,
-              "Hash error [%d][%s]", hret, hash_error_string(hret));
+              "Hash error [%d][%s]\n", hret, hash_error_string(hret));
         return EIO;
     }
     talloc_steal(nctx->netgroups, netgr);
diff --git a/src/responder/pac/pacsrv_cmd.c b/src/responder/pac/pacsrv_cmd.c
index 
83609343bcce11a12bd80525acc0595ae68634a4..64c02e81cb02c28ed14635a6532fc72253a83481
 100644
--- a/src/responder/pac/pacsrv_cmd.c
+++ b/src/responder/pac/pacsrv_cmd.c
@@ -131,7 +131,7 @@ static errno_t pac_add_pac_user(struct cli_ctx *cctx)
 
     pr_ctx->domain_name = pr_ctx->logon_info->info3.base.logon_domain.string;
     if (pr_ctx->domain_name == NULL) {
-        DEBUG(SSSDBG_FATAL_FAILURE, "No domain name in PAC");
+        DEBUG(SSSDBG_FATAL_FAILURE, "No domain name in PAC\n");
         ret = EINVAL;
         goto done;
     }
diff --git a/src/responder/pac/pacsrv_utils.c b/src/responder/pac/pacsrv_utils.c
index 
7d37cda87ab4a5c233474beb67d91aa03c939b72..de2e8dfbd4e6c08cf67da4f4e252af694d030f1e
 100644
--- a/src/responder/pac/pacsrv_utils.c
+++ b/src/responder/pac/pacsrv_utils.c
@@ -433,8 +433,8 @@ errno_t get_pwd_from_pac(TALLOC_CTX *mem_ctx,
             goto done;
         }
     } else {
-        DEBUG(SSSDBG_OP_FAILURE, "Missing full name in PAC, "
-                                  "gecos field will by empty.\n ");
+        DEBUG(SSSDBG_OP_FAILURE,
+              "Missing full name in PAC, gecos field will by empty.\n");
     }
 
     /* Check if there is a special homedir template for sub-domains. If not a
diff --git a/src/responder/pam/pamsrv.c b/src/responder/pam/pamsrv.c
index 
886136b420b6184a86ce6e0d9ac84dd3dea9a94b..45747baa03b593a65e70f4cbd0ce022648d1333c
 100644
--- a/src/responder/pam/pamsrv.c
+++ b/src/responder/pam/pamsrv.c
@@ -278,8 +278,8 @@ static int pam_process_init(TALLOC_CTX *mem_ctx,
     ret = sss_hash_create(pctx, 10, &pctx->id_table);
     if (ret != EOK) {
         DEBUG(SSSDBG_FATAL_FAILURE,
-              "Could not create initgroups hash table: [%s]",
-               strerror(ret));
+              "Could not create initgroups hash table: [%s]\n",
+              strerror(ret));
         goto done;
     }
 
diff --git a/src/responder/sudo/sudosrv_get_sudorules.c 
b/src/responder/sudo/sudosrv_get_sudorules.c
index 
ac95877143e210da962a47143c18733eecdc9c02..34d63bd74741c3cab5168fd0b0108cb05528d218
 100644
--- a/src/responder/sudo/sudosrv_get_sudorules.c
+++ b/src/responder/sudo/sudosrv_get_sudorules.c
@@ -664,7 +664,7 @@ static errno_t sudosrv_get_sudorules_query_cache(TALLOC_CTX 
*mem_ctx,
                               SUDORULE_SUBDIR, attrs,
                               &count, &msgs);
     if (ret != EOK && ret != ENOENT) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up SUDO rules");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up SUDO rules\n");
         goto done;
     } if (ret == ENOENT) {
        *_rules = NULL;
diff --git a/src/responder/sudo/sudosrv_query.c 
b/src/responder/sudo/sudosrv_query.c
index 
4d19514cd63f432d7cee2bbfbece237fb56c5dec..4cb07e32b3d7f2897dcd7f4941aa44bf8928d5c2
 100644
--- a/src/responder/sudo/sudosrv_query.c
+++ b/src/responder/sudo/sudosrv_query.c
@@ -109,7 +109,7 @@ static int sudosrv_response_append_attr(TALLOC_CTX *mem_ctx,
     /* values */
     for (i = 0; i < values_num; i++) {
         if (strlen((char*)(values[i].data)) != values[i].length) {
-            DEBUG(SSSDBG_CRIT_FAILURE, "value is not a string");
+            DEBUG(SSSDBG_CRIT_FAILURE, "value is not a string\n");
             ret = EINVAL;
             goto done;
         }
diff --git a/src/sbus/sssd_dbus_server.c b/src/sbus/sssd_dbus_server.c
index 
1375248923525e9afcf3ad380fedff0e9ae2badb..0a1cace415b3514a6904e92a2d879538ce51a593
 100644
--- a/src/sbus/sssd_dbus_server.c
+++ b/src/sbus/sssd_dbus_server.c
@@ -56,7 +56,7 @@ static void sbus_server_init_new_connection(DBusServer 
*dbus_server,
                                SBUS_CONN_TYPE_PRIVATE, &conn);
     if (ret != 0) {
         dbus_connection_close(dbus_conn);
-        DEBUG(SSSDBG_FUNC_DATA,"Closing connection (failed setup)");
+        DEBUG(SSSDBG_FUNC_DATA, "Closing connection (failed setup)\n");
         return;
     }
 
@@ -145,7 +145,7 @@ remove_socket_symlink(const char *symlink_name)
     ret = snprintf(pidpath, PATH_MAX, "%s.%lu",
                    symlink_name, (unsigned long) getpid());
     if (ret < 0) {
-        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed");
+        DEBUG(SSSDBG_OP_FAILURE, "snprintf failed\n");
         return EIO;
     } else if (ret >= PATH_MAX) {
         DEBUG(SSSDBG_OP_FAILURE, "path too long?!?!\n");
diff --git a/src/tests/krb5_child-test.c b/src/tests/krb5_child-test.c
index 
a59863b4d8aa8bdcc241c87befd672a5e5c876a3..50acc88ed0c312b2662f01fe41247781f235a54d
 100644
--- a/src/tests/krb5_child-test.c
+++ b/src/tests/krb5_child-test.c
@@ -73,7 +73,7 @@ setup_krb5_child_test(TALLOC_CTX *mem_ctx, struct 
krb5_child_test_ctx **_ctx)
 
     ctx->ev = tevent_context_init(ctx);
     if (ctx->ev == NULL) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Could not init tevent context");
+        DEBUG(SSSDBG_CRIT_FAILURE, "Could not init tevent context\n");
         talloc_free(ctx);
         return EFAULT;
     }
diff --git a/src/tools/files.c b/src/tools/files.c
index 
f1cede0cee3b7096b76c88b8cd6e717007b692a1..5b3f9d103120aa5c06d9a453b279aca19258947d
 100644
--- a/src/tools/files.c
+++ b/src/tools/files.c
@@ -516,7 +516,7 @@ copy_entry(struct copy_ctx *cctx,
     if (ret != 0) {
         ret = errno;
         DEBUG(SSSDBG_CRIT_FAILURE,
-                "couldn't stat '%s': %s", src_ent_path, strerror(ret));
+              "couldn't stat '%s': %s\n", src_ent_path, strerror(ret));
         goto done;
     }
 
@@ -577,7 +577,7 @@ copy_dir(struct copy_ctx *cctx,
     if (dir == NULL) {
         ret = errno;
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Error reading '%s': %s", src_dir_path, strerror(ret));
+              "Error reading '%s': %s\n", src_dir_path, strerror(ret));
         goto done;
     }
 
@@ -590,7 +590,7 @@ copy_dir(struct copy_ctx *cctx,
     if (ret == -1 && errno != EEXIST) {
         ret = errno;
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Error reading '%s': %s", dest_dir_path, strerror(ret));
+              "Error reading '%s': %s\n", dest_dir_path, strerror(ret));
         goto done;
     }
 
@@ -599,7 +599,7 @@ copy_dir(struct copy_ctx *cctx,
     if (dest_dir_fd == -1) {
         ret = errno;
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Error opening '%s': %s", dest_dir_path, strerror(ret));
+              "Error opening '%s': %s\n", dest_dir_path, strerror(ret));
         goto done;
     }
 
@@ -628,7 +628,7 @@ copy_dir(struct copy_ctx *cctx,
     if (ret == -1 && errno != EPERM) {
         ret = errno;
         DEBUG(SSSDBG_OP_FAILURE,
-              "Error changing owner of '%s': %s",
+              "Error changing owner of '%s': %s\n",
               dest_dir_path, strerror(ret));
         goto done;
     }
@@ -640,7 +640,7 @@ copy_dir(struct copy_ctx *cctx,
     if (ret == -1) {
         ret = errno;
         DEBUG(SSSDBG_OP_FAILURE,
-              "Error setting mode of '%s': %s",
+              "Error setting mode of '%s': %s\n",
               dest_dir_path, strerror(ret));
         goto done;
     }
diff --git a/src/tools/sss_sync_ops.c b/src/tools/sss_sync_ops.c
index 
fd401cb4da491b1d996178312d5ff69d3a461bfc..e6faedcae556b3c55a7d267b429eed46076119c9
 100644
--- a/src/tools/sss_sync_ops.c
+++ b/src/tools/sss_sync_ops.c
@@ -40,7 +40,7 @@
 
 #define VAR_CHECK(var, val, attr, msg) do { \
         if (var != (val)) { \
-            DEBUG(SSSDBG_CRIT_FAILURE, msg" attribute: %s", attr); \
+            DEBUG(SSSDBG_CRIT_FAILURE, msg" attribute: %s\n", attr); \
             return val; \
         } \
 } while(0)
diff --git a/src/util/debug.c b/src/util/debug.c
index 
41375709170abe33b0c7fd90e3b1244299ed0241..3121c70b17a4c996da143b2ffa449b686b57fab4
 100644
--- a/src/util/debug.c
+++ b/src/util/debug.c
@@ -431,5 +431,5 @@ int rotate_debug_files(void)
 
 void talloc_log_fn(const char *message)
 {
-    DEBUG(SSSDBG_FATAL_FAILURE, "%s", message);
+    DEBUG(SSSDBG_FATAL_FAILURE, "%s\n", message);
 }
diff --git a/src/util/domain_info_utils.c b/src/util/domain_info_utils.c
index 
cbfc55b262c37c36ebbdd2401abf4b6e8f38fc2a..a889bd7aad3a8435d1177cb44371df8d527160c0
 100644
--- a/src/util/domain_info_utils.c
+++ b/src/util/domain_info_utils.c
@@ -568,8 +568,8 @@ done:
         if (err < 0) {
             err = errno;
             DEBUG(SSSDBG_MINOR_FAILURE,
-                  "Could not remove file [%s]: [%d]: %s",
-                   tmp_file, err, strerror(err));
+                  "Could not remove file [%s]: [%d]: %s\n",
+                  tmp_file, err, strerror(err));
         }
     }
     talloc_free(tmp_ctx);
@@ -731,8 +731,8 @@ done:
         if (err == -1) {
             err = errno;
             DEBUG(SSSDBG_MINOR_FAILURE,
-                  "Could not remove file [%s]: [%d]: %s",
-                   tmp_file, err, sss_strerror(err));
+                  "Could not remove file [%s]: [%d]: %s\n",
+                  tmp_file, err, sss_strerror(err));
         }
     }
 
diff --git a/src/util/find_uid.c b/src/util/find_uid.c
index 
d0f76030d69e67d81abe5624d65b4261f8167cf4..535d8268ed3ee9c5531fdfe24e04231f2cbe93c5
 100644
--- a/src/util/find_uid.c
+++ b/src/util/find_uid.c
@@ -74,7 +74,7 @@ static errno_t get_uid_from_pid(const pid_t pid, uid_t *uid)
 
     ret = snprintf(path, PATHLEN, "/proc/%d/status", pid);
     if (ret < 0) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "snprintf failed");
+        DEBUG(SSSDBG_CRIT_FAILURE, "snprintf failed\n");
         return EINVAL;
     } else if (ret >= PATHLEN) {
         DEBUG(SSSDBG_CRIT_FAILURE, "path too long?!?!\n");
diff --git a/src/util/server.c b/src/util/server.c
index 
abd29310f7b288b255176a0457f894f05b485df6..7e9b76f74ee5e76d2481eb425eff4811cc2e780e
 100644
--- a/src/util/server.c
+++ b/src/util/server.c
@@ -350,8 +350,8 @@ int die_if_parent_died(void)
     ret = prctl(PR_SET_PDEATHSIG, SIGTERM, 0, 0, 0);
     if (ret != 0) {
         ret = errno;
-        DEBUG(SSSDBG_OP_FAILURE, "prctl failed [%d]: %s",
-                                  ret, strerror(ret));
+        DEBUG(SSSDBG_OP_FAILURE, "prctl failed [%d]: %s\n",
+                                 ret, strerror(ret));
         return ret;
     }
 #endif
diff --git a/src/util/sss_ini.c b/src/util/sss_ini.c
index 
526ca31d414836bf83d12bcc81f535e7492df854..766a75ea6730b3a8f5fbec5f2086075fbcb2d81b
 100644
--- a/src/util/sss_ini.c
+++ b/src/util/sss_ini.c
@@ -425,7 +425,7 @@ int sss_confdb_create_ldif(TALLOC_CTX *mem_ctx,
 
             ldif_attr = talloc_asprintf(tmp_ctx,
                                         "%s: %s\n", attrs[j], value);
-            DEBUG(SSSDBG_TRACE_ALL, "%s", ldif_attr);
+            DEBUG(SSSDBG_TRACE_ALL, "%s\n", ldif_attr);
 
             attr_len = strlen(ldif_attr);
 
@@ -455,7 +455,7 @@ int sss_confdb_create_ldif(TALLOC_CTX *mem_ctx,
         dn[dn_size-1] = '\n';
         dn[dn_size] = '\0';
 
-        DEBUG(SSSDBG_TRACE_ALL, "Section dn\n%s", dn);
+        DEBUG(SSSDBG_TRACE_ALL, "Section dn\n%s\n", dn);
 
         tmp_ldif = talloc_realloc(mem_ctx, ldif, char,
                                   ldif_len+dn_size+1);
diff --git a/src/util/sss_krb5.c b/src/util/sss_krb5.c
index 
447b5a5bc941c3ff0cf72fbaa0f2293dc4311194..e5c2121da575b174c8b6a9a90835f2c97f807f37
 100644
--- a/src/util/sss_krb5.c
+++ b/src/util/sss_krb5.c
@@ -172,7 +172,7 @@ errno_t select_principal_from_keytab(TALLOC_CTX *mem_ctx,
         if (_principal) {
             kerr = krb5_unparse_name(krb_ctx, client_princ, &principal_string);
             if (kerr) {
-                DEBUG(SSSDBG_CRIT_FAILURE, "krb5_unparse_name failed");
+                DEBUG(SSSDBG_CRIT_FAILURE, "krb5_unparse_name failed\n");
                 ret = EFAULT;
                 goto done;
             }
@@ -180,7 +180,7 @@ errno_t select_principal_from_keytab(TALLOC_CTX *mem_ctx,
             *_principal = talloc_strdup(mem_ctx, principal_string);
             free(principal_string);
             if (!*_principal) {
-                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_strdup failed");
+                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_strdup failed\n");
                 ret = ENOMEM;
                 goto done;
             }
@@ -192,7 +192,7 @@ errno_t select_principal_from_keytab(TALLOC_CTX *mem_ctx,
                                                KRB5_PRINCIPAL_UNPARSE_NO_REALM,
                                                &principal_string);
             if (kerr) {
-                DEBUG(SSSDBG_CRIT_FAILURE, "krb5_unparse_name failed");
+                DEBUG(SSSDBG_CRIT_FAILURE, "krb5_unparse_name failed\n");
                 ret = EFAULT;
                 goto done;
             }
@@ -200,7 +200,7 @@ errno_t select_principal_from_keytab(TALLOC_CTX *mem_ctx,
             *_primary = talloc_strdup(mem_ctx, principal_string);
             free(principal_string);
             if (!*_primary) {
-                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_strdup failed");
+                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_strdup failed\n");
                 if (_principal) talloc_zfree(*_principal);
                 ret = ENOMEM;
                 goto done;
@@ -223,7 +223,7 @@ errno_t select_principal_from_keytab(TALLOC_CTX *mem_ctx,
             *_realm = talloc_asprintf(mem_ctx, "%.*s",
                                       realm_len, realm_name);
             if (!*_realm) {
-                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_asprintf failed");
+                DEBUG(SSSDBG_CRIT_FAILURE, "talloc_asprintf failed\n");
                 if (_principal) talloc_zfree(*_principal);
                 if (_primary) talloc_zfree(*_primary);
                 ret = ENOMEM;
diff --git a/src/util/sss_semanage.c b/src/util/sss_semanage.c
index 
3c566553f2085a696f79c5ee35ec6015824d56a6..b85831c3d3f262f49b19082e96aa62ccf3afeaa8
 100644
--- a/src/util/sss_semanage.c
+++ b/src/util/sss_semanage.c
@@ -326,8 +326,9 @@ int del_seuser(const char *login_name)
     }
 
     if (!exists) {
-        DEBUG(SSSDBG_CRIT_FAILURE, "Login mapping for %s is defined in policy, 
"
-                  "cannot be deleted", login_name);
+        DEBUG(SSSDBG_CRIT_FAILURE,
+              "Login mapping for %s is defined in policy, cannot be deleted\n",
+              login_name);
         ret = ENOENT;
         goto done;
     }
@@ -335,7 +336,7 @@ int del_seuser(const char *login_name)
     ret = semanage_seuser_del_local(handle, key);
     if (ret != 0) {
         DEBUG(SSSDBG_CRIT_FAILURE,
-              "Could not delete login mapping for %s", login_name);
+              "Could not delete login mapping for %s\n", login_name);
         ret = EIO;
         goto done;
     }
diff --git a/src/util/usertools.c b/src/util/usertools.c
index 
ebe139e6cd3c9eb270033629dab362fefb3e2682..439c1494ae5f4c8c46a7e36ad7c8af627ef83cdf
 100644
--- a/src/util/usertools.c
+++ b/src/util/usertools.c
@@ -144,7 +144,7 @@ static errno_t sss_fqnames_init(struct sss_names_ctx *nctx, 
const char *fq_fmt)
     fq = sss_tc_fqname2 (nctx, nctx, "unused.example.com", "unused", 
"the-test-user");
     if (fq == NULL) {
         DEBUG(SSSDBG_OP_FAILURE,
-              "The fq format is invalid [%s]", nctx->fq_fmt);
+              "The fq format is invalid [%s]\n", nctx->fq_fmt);
         return EINVAL;
     } else if (strstr (fq, "the-test-user") == NULL) {
         DEBUG(SSSDBG_OP_FAILURE,
-- 
2.3.1

>From 9efa6df413b3897ea01f1344dca7fdf9aeaa4a78 Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lsleb...@redhat.com>
Date: Sat, 21 Feb 2015 19:22:40 +0100
Subject: [PATCH 2/4] debug-tests: Fix test with new line in debug message

---
 src/tests/debug-tests.c | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/src/tests/debug-tests.c b/src/tests/debug-tests.c
index 
cc422382a6a352950472daf5119f62387def4e73..2b91c149d79483316794240498e7fe33545dede0
 100644
--- a/src/tests/debug-tests.c
+++ b/src/tests/debug-tests.c
@@ -122,7 +122,7 @@ int test_helper_debug_check_message(int level)
     char *msg = NULL;
     char *compare_to = NULL;
     const char *function = __FUNCTION__;
-    const char *body = "some error\n";
+    const char *body = "some error";
     int filesize;
     int fsize;
     int fd;
@@ -157,7 +157,7 @@ int test_helper_debug_check_message(int level)
         goto done;
     }
 
-    DEBUG(level, "%s", body);
+    DEBUG(level, "%s\n", body);
 
     ret = fseek(file, 0, SEEK_END);
     if (ret == -1) {
@@ -210,7 +210,7 @@ int test_helper_debug_check_message(int level)
             }
             compare_to = talloc_asprintf(ctx,
                                          "(%s %s %2d %.2d:%.2d:%.2d %.4d) "
-                                         "[%s] [%s] (%#.4x): %s",
+                                         "[%s] [%s] (%#.4x): %s\n",
                                          time_day, time_month, time_day_num,
                                          time_hour, time_min, time_sec, 
time_year,
                                          debug_prg_name, function, level, 
body);
@@ -230,7 +230,7 @@ int test_helper_debug_check_message(int level)
             }
             compare_to = talloc_asprintf(ctx,
                                          "(%s %s %2d %.2d:%.2d:%.2d:%.6d %.4d) 
"
-                                         "[%s] [%s] (%#.4x): %s",
+                                         "[%s] [%s] (%#.4x): %s\n",
                                          time_day, time_month, time_day_num,
                                          time_hour, time_min, time_sec, 
time_usec,
                                          time_year, debug_prg_name, function, 
level, body);
@@ -241,7 +241,7 @@ int test_helper_debug_check_message(int level)
             }
         }
     } else {
-        compare_to = talloc_asprintf(ctx, "[%s] [%s] (%#.4x): %s",
+        compare_to = talloc_asprintf(ctx, "[%s] [%s] (%#.4x): %s\n",
                                      debug_prg_name, function, level, body);
         if (compare_to == NULL) {
             _errno = ENOMEM;
-- 
2.3.1

_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/mailman/listinfo/sssd-devel

Reply via email to