diff options
author | Samuli Suominen <ssuominen@gentoo.org> | 2012-07-03 10:07:17 +0000 |
---|---|---|
committer | Samuli Suominen <ssuominen@gentoo.org> | 2012-07-03 10:07:17 +0000 |
commit | 27056a7ace5a6199646de6b221ffb7c8c918ad10 (patch) | |
tree | 8a38664ccd0cc5b573322d42082c8016315272ee /sys-apps/fakeroot-ng | |
parent | Fix building with sys-devel/gcc >= 4.7.0 wrt #422905 (diff) | |
download | gentoo-2-27056a7ace5a6199646de6b221ffb7c8c918ad10.tar.gz gentoo-2-27056a7ace5a6199646de6b221ffb7c8c918ad10.tar.bz2 gentoo-2-27056a7ace5a6199646de6b221ffb7c8c918ad10.zip |
Move patch to mirrors because it's 47 KiB
(Portage version: 2.2.0_alpha114/cvs/Linux x86_64)
Diffstat (limited to 'sys-apps/fakeroot-ng')
-rw-r--r-- | sys-apps/fakeroot-ng/ChangeLog | 6 | ||||
-rw-r--r-- | sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild | 7 | ||||
-rw-r--r-- | sys-apps/fakeroot-ng/files/fakeroot-ng-0.17-gcc47.patch | 937 |
3 files changed, 9 insertions, 941 deletions
diff --git a/sys-apps/fakeroot-ng/ChangeLog b/sys-apps/fakeroot-ng/ChangeLog index f1c600e6b6f6..318a6a3d8c6d 100644 --- a/sys-apps/fakeroot-ng/ChangeLog +++ b/sys-apps/fakeroot-ng/ChangeLog @@ -1,6 +1,10 @@ # ChangeLog for sys-apps/fakeroot-ng # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/fakeroot-ng/ChangeLog,v 1.7 2012/07/03 10:04:22 ssuominen Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-apps/fakeroot-ng/ChangeLog,v 1.8 2012/07/03 10:07:17 ssuominen Exp $ + + 03 Jul 2012; Samuli Suominen <ssuominen@gentoo.org> fakeroot-ng-0.17.ebuild, + -files/fakeroot-ng-0.17-gcc47.patch: + Move patch to mirrors because it's 47 KiB 03 Jul 2012; Samuli Suominen <ssuominen@gentoo.org> fakeroot-ng-0.17.ebuild, +files/fakeroot-ng-0.17-gcc47.patch: diff --git a/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild b/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild index 9d6a3862c0ca..ffa19cf994ce 100644 --- a/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild +++ b/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild @@ -1,13 +1,14 @@ # Copyright 1999-2012 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild,v 1.2 2012/07/03 10:04:22 ssuominen Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-apps/fakeroot-ng/fakeroot-ng-0.17.ebuild,v 1.3 2012/07/03 10:07:17 ssuominen Exp $ EAPI=4 inherit eutils DESCRIPTION="A utility to run commands with fake root privileges" HOMEPAGE="http://sourceforge.net/projects/fakerootng/" -SRC_URI="mirror://sourceforge/${PN//-/}/${PF}.tar.gz" +SRC_URI="mirror://sourceforge/${PN//-/}/${PF}.tar.gz + http://dev.gentoo.org/~ssuominen/${P}-gcc47.patch.xz" LICENSE="GPL-2" SLOT="0" @@ -17,5 +18,5 @@ IUSE="" DOCS="AUTHORS ChangeLog NEWS README" src_prepare() { - epatch "${FILESDIR}"/${P}-gcc47.patch + epatch "${WORKDIR}"/${P}-gcc47.patch } diff --git a/sys-apps/fakeroot-ng/files/fakeroot-ng-0.17-gcc47.patch b/sys-apps/fakeroot-ng/files/fakeroot-ng-0.17-gcc47.patch deleted file mode 100644 index 5c544e20c7b4..000000000000 --- a/sys-apps/fakeroot-ng/files/fakeroot-ng-0.17-gcc47.patch +++ /dev/null @@ -1,937 +0,0 @@ ---- file.cpp -+++ file.cpp -@@ -29,6 +29,7 @@ - #include <limits.h> - - #include <string.h> -+#include <unistd.h> - - #include "syscalls.h" - #include "file_lie.h" -@@ -53,7 +54,7 @@ - // Entering the syscall - state->state=pid_state::RETURN; - state->context_state[0]=ptlib_get_argument( pid, 2 ); // Store the pointer to the stat struct -- dlog("stat64: "PID_F" stored pointer at %p\n", pid, (void*)state->context_state[0] ); -+ dlog("stat64: " PID_F " stored pointer at %p\n", pid, (void*)state->context_state[0] ); - - // If the process is chrooted, we need to translate the file name - int real_sc=ptlib_get_syscall( pid ); -@@ -63,7 +64,7 @@ - } else if( state->state==pid_state::RETURN ) { - // Returning from the syscall - int returncode=ptlib_get_retval( pid ); -- dlog("stat64: "PID_F" returned %x\n", pid, returncode); -+ dlog("stat64: " PID_F " returned %x\n", pid, returncode); - if( ptlib_success( pid, sc_num ) ) { - struct ptlib_stat ret; - struct stat_override override; -@@ -92,11 +93,11 @@ - } - - if( ok ) { -- dlog("stat64: "PID_F" override dev="DEV_F" inode="INODE_F" mode=%o uid="UID_F" gid="GID_F"\n", -+ dlog("stat64: " PID_F " override dev=" DEV_F " inode=" INODE_F " mode=%o uid=" UID_F " gid=" GID_F "\n", - pid, ret.dev, ret.ino, ret.mode, ret.uid, ret.gid ); - ptlib_set_mem( pid, &ret, (void *)state->context_state[0], sizeof(struct stat) ); - } else { -- dlog("stat64: "PID_F" dev="DEV_F" inode="INODE_F" override entry corrupt - removed\n", pid, ret.dev, ret.ino ); -+ dlog("stat64: " PID_F " dev=" DEV_F " inode=" INODE_F " override entry corrupt - removed\n", pid, ret.dev, ret.ino ); - remove_map( ret.dev, ret.ino ); - } - } -@@ -117,7 +118,7 @@ - chroot_translate_paramat( pid, state, ptlib_get_argument( pid, 1 ), 2, (ptlib_get_argument(pid, 4)&AT_SYMLINK_NOFOLLOW)!=0 ); - - state->context_state[0]=ptlib_get_argument( pid, 3 ); // Store the pointer to the stat struct -- dlog("statat64: "PID_F" stored pointer at %p\n", pid, (void*)state->context_state[0] ); -+ dlog("statat64: " PID_F " stored pointer at %p\n", pid, (void*)state->context_state[0] ); - - return true; - } else { -@@ -213,11 +214,11 @@ - override.dev_id=0; - override.transient=true; - -- dlog("chmod: "PID_F" error (race?) getting override info for dev "DEV_F" inode "INODE_F"\n", -+ dlog("chmod: " PID_F " error (race?) getting override info for dev " DEV_F " inode " INODE_F "\n", - pid, state->context_state[2], state->context_state[3] ); - } - override.mode=(override.mode&~07777)|(((mode_t)state->context_state[1])&07777); -- dlog("chmod: "PID_F" Setting override mode %o dev "DEV_F" inode "INODE_F"\n", pid, override.mode, override.dev, -+ dlog("chmod: " PID_F " Setting override mode %o dev " DEV_F " inode " INODE_F "\n", pid, override.mode, override.dev, - override.inode ); - set_map( &override ); - -@@ -233,7 +234,7 @@ - - state->state=pid_state::NONE; - } else { -- dlog("chmod: "PID_F" unknown state %d\n", pid, state->state ); -+ dlog("chmod: " PID_F " unknown state %d\n", pid, state->state ); - } - - return true; -@@ -295,7 +296,7 @@ - } - - ptlib_set_syscall( pid, stat_function ); -- dlog("chown: "PID_F" redirected chown call to stat\n", pid ); -+ dlog("chown: " PID_F " redirected chown call to stat\n", pid ); - - state->state=pid_state::REDIRECT2; - } else if( state->state==pid_state::REDIRECT2 ) { -@@ -306,7 +307,7 @@ - ptlib_get_mem( pid, state->memory, &stat, sizeof( stat ) ); - - if( !get_map( stat.dev, stat.ino, &override ) ) { -- dlog("chown: "PID_F" no override for file - create a new one\n", pid ); -+ dlog("chown: " PID_F " no override for file - create a new one\n", pid ); - stat_override_copy( &stat, &override ); - } - -@@ -315,10 +316,10 @@ - if( ((int)state->context_state[1])!=-1 ) - override.gid=state->context_state[1]; - -- dlog("chown: "PID_F" changing owner of dev "DEV_F" inode "INODE_F"\n", pid, override.dev, override.inode ); -+ dlog("chown: " PID_F " changing owner of dev " DEV_F " inode " INODE_F "\n", pid, override.dev, override.inode ); - set_map( &override ); - } else { -- dlog("chown: "PID_F" stat call failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num)) ); -+ dlog("chown: " PID_F " stat call failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num)) ); - } - - state->state=pid_state::NONE; -@@ -391,7 +392,7 @@ - mode|= 00600; - - if( S_ISCHR(mode) || S_ISBLK(mode) ) { -- dlog("mknod: "PID_F" tried to create %s device, turn to regular file\n", pid, S_ISCHR(mode) ? "character" : "block" ); -+ dlog("mknod: " PID_F " tried to create %s device, turn to regular file\n", pid, S_ISCHR(mode) ? "character" : "block" ); - mode=(mode&~S_IFMT) | S_IFREG; - } - ptlib_set_argument( pid, mode_offset+1, mode ); -@@ -414,11 +415,11 @@ - - state->state=pid_state::REDIRECT1; - -- dlog("mknod: "PID_F" Actual node creation successful. Calling stat\n", pid ); -+ dlog("mknod: " PID_F " Actual node creation successful. Calling stat\n", pid ); - return ptlib_generate_syscall( pid, stat_function, state->shared_memory ); - } else { - // Nothing to do if the call failed -- dlog("mknod: "PID_F" call failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); -+ dlog("mknod: " PID_F " call failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); - } - } else if( state->state==pid_state::REDIRECT2 ) { - if( ptlib_success( pid, sc_num ) ) { -@@ -434,12 +435,12 @@ - override.uid=state->fsuid; - override.gid=state->fsgid; - -- dlog("mknod: "PID_F" registering the new device in the override DB dev "DEV_F" inode "INODE_F"\n", pid, -+ dlog("mknod: " PID_F " registering the new device in the override DB dev " DEV_F " inode " INODE_F "\n", pid, - stat.dev, stat.ino ); - - mode_t mode=(mode_t)state->context_state[0]; - if( S_ISCHR(mode) || S_ISBLK(mode) || (mode&07000)!=0) { -- dlog("mknod: "PID_F" overriding the file type and/or mode\n", pid ); -+ dlog("mknod: " PID_F " overriding the file type and/or mode\n", pid ); - override.mode=(override.mode&~(S_IFMT|07000)) | (mode&(S_IFMT|07000)); - override.dev_id=(dev_t)state->context_state[1]; - } -@@ -451,7 +452,7 @@ - set_map( &override ); - } else { - // mknod succeeded, but stat failed? -- dlog("mknod: "PID_F" stat failed. Leave override DB non-updated\n", pid ); -+ dlog("mknod: " PID_F " stat failed. Leave override DB non-updated\n", pid ); - } - - ptlib_restore_state( pid, state->saved_state ); -@@ -512,7 +513,7 @@ - // Did we request to create a new file? - if( (state->context_state[0]&O_CREAT)!=0 && ptlib_success(pid, sc_num) ) { - int fd=(long)ptlib_get_retval(pid); -- dlog("open: "PID_F" opened fd %d, assume we actually created it\n", pid, fd ); -+ dlog("open: " PID_F " opened fd %d, assume we actually created it\n", pid, fd ); - - ptlib_save_state( pid, state->saved_state ); - state->state=pid_state::REDIRECT1; -@@ -545,12 +546,12 @@ - // XXX We are ignoring the umask here! - - set_map( &override ); -- dlog("open: "PID_F" creating override for dev "DEV_F" inode "INODE_F"\n", pid, override.dev, override.inode); -+ dlog("open: " PID_F " creating override for dev " DEV_F " inode " INODE_F "\n", pid, override.dev, override.inode); - } else { -- dlog("open: "PID_F" map for dev "DEV_F" inode "INODE_F" already exists - doing nothing\n", pid, stat.dev, stat.ino ); -+ dlog("open: " PID_F " map for dev " DEV_F " inode " INODE_F " already exists - doing nothing\n", pid, stat.dev, stat.ino ); - } - } else { -- dlog("open: "PID_F" fstat failed %s\n", pid, strerror( ptlib_get_error( pid, sc_num ) ) ); -+ dlog("open: " PID_F " fstat failed %s\n", pid, strerror( ptlib_get_error( pid, sc_num ) ) ); - } - - state->state=pid_state::NONE; -@@ -607,7 +608,7 @@ - state->state=pid_state::NONE; - - if( ptlib_success( pid, sc_num ) ) { -- dlog("mkdir: "PID_F" succeeded. Call stat\n", pid ); -+ dlog("mkdir: " PID_F " succeeded. Call stat\n", pid ); - ptlib_save_state( pid, state->saved_state ); - - // Perform a stat operation so we can know the directory's dev and inode -@@ -625,7 +626,7 @@ - return ptlib_generate_syscall( pid, stat_function, state->shared_memory ); - } else { - // If mkdir failed, we don't have anything else to do. -- dlog("mkdir: "PID_F" failed with error %s\n", pid, strerror(ptlib_get_error( pid, sc_num ) ) ); -+ dlog("mkdir: " PID_F " failed with error %s\n", pid, strerror(ptlib_get_error( pid, sc_num ) ) ); - } - } else if( state->state==pid_state::REDIRECT2 ) { - if( ptlib_success( pid, sc_num ) ) { -@@ -643,10 +644,10 @@ - override.mode|= state->context_state[0]&00700; - // XXX This code does not take the umask into account - -- dlog("mkdir: "PID_F" storing override for dev "DEV_F" inode "INODE_F"\n", pid, override.dev, override.inode); -+ dlog("mkdir: " PID_F " storing override for dev " DEV_F " inode " INODE_F "\n", pid, override.dev, override.inode); - set_map( &override ); - } else { -- dlog("mkdir: "PID_F" stat failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); -+ dlog("mkdir: " PID_F " stat failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); - } - - ptlib_restore_state( pid, state->saved_state ); -@@ -704,7 +705,7 @@ - state->state=pid_state::RETURN; - } else if( state->state==pid_state::RETURN ) { - if( ptlib_success( pid, sc_num ) ) { -- dlog("symlink: "PID_F" success. Call stat to mark uid/gid override\n", pid ); -+ dlog("symlink: " PID_F " success. Call stat to mark uid/gid override\n", pid ); - ptlib_save_state( pid, state->saved_state ); - - for( int i=0; i<mode_offset; ++i ) { -@@ -720,7 +721,7 @@ - - return ptlib_generate_syscall( pid, stat_function, state->shared_memory ); - } else { -- dlog("symlink: "PID_F" failed with error %s\n", pid, strerror( ptlib_get_error(pid, sc_num) ) ); -+ dlog("symlink: " PID_F " failed with error %s\n", pid, strerror( ptlib_get_error(pid, sc_num) ) ); - state->state=pid_state::NONE; - } - } else if( state->state==pid_state::REDIRECT2 ) { -@@ -738,14 +739,14 @@ - override.uid=state->fsuid; - override.gid=state->fsgid; - -- dlog("symlink: "PID_F" set uid/gid override for dev "DEV_F" inode "INODE_F"\n", pid, override.dev, override.inode ); -+ dlog("symlink: " PID_F " set uid/gid override for dev " DEV_F " inode " INODE_F "\n", pid, override.dev, override.inode ); - set_map( &override ); - } else { -- dlog("symlink: "PID_F" acutal file on disk is not a symlink. Type %o dev "DEV_F" inode "INODE_F"\n", pid, stat.mode, stat.dev, -+ dlog("symlink: " PID_F " acutal file on disk is not a symlink. Type %o dev " DEV_F " inode " INODE_F "\n", pid, stat.mode, stat.dev, - stat.ino ); - } - } else { -- dlog("symlink: "PID_F" symlink succeeded, but stat failed with %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); -+ dlog("symlink: " PID_F " symlink succeeded, but stat failed with %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); - } - - ptlib_restore_state( pid, state->saved_state ); -@@ -885,7 +886,7 @@ - state->state=pid_state::REDIRECT2; - if( start<addr1 && end>addr1 ) { - // The unmap range covers the lower range -- dlog("sys_munmap: "PID_F" tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", -+ dlog("sys_munmap: " PID_F " tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", - pid, (void*)start, (void*)end, name1, (void*)addr1, (void*)(addr1+len1) ); - - if( end>addr1+len1 ) { -@@ -897,13 +898,13 @@ - end=addr1; - } else if( start>=addr1 && start<addr1+len1 ) { - // The start pointer is inside the lower memory range -- dlog("sys_munmap: "PID_F" tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", -+ dlog("sys_munmap: " PID_F " tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", - pid, (void*)start, (void*)end, name1, (void*)addr1, (void*)(addr1+len1) ); - - start=addr1+len1; - } else if( start<addr2 && end>addr2 ) { - // The unmap area covers the upper memory range -- dlog("sys_munmap: "PID_F" tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", -+ dlog("sys_munmap: " PID_F " tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", - pid, (void*)start, (void*)end, name2, (void*)addr2, (void*)(addr2+len2) ); - - if( end>addr2+len2 ) { -@@ -915,7 +916,7 @@ - end=addr2; - } else if( start>=addr2 && start<addr2+len2 ) { - // The start pointer is inside the upper memory range -- dlog("sys_munmap: "PID_F" tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", -+ dlog("sys_munmap: " PID_F " tried to unmap range %p-%p, which conflicts with our %s range %p-%p\n", - pid, (void*)start, (void*)end, name2, (void*)addr2, (void*)(addr2+len2) ); - - start=addr2+len2; -@@ -951,7 +952,7 @@ - } - } else { - // The syscall failed - we will end it here even if we thought we had something more to do -- dlog("sys_munmap: "PID_F" failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); -+ dlog("sys_munmap: " PID_F " failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num))); - } - - if( state->context_state[2]==1 ) { -@@ -1090,7 +1091,7 @@ - } else { - // lstat syscall failed - pass the error along - state->state=pid_state::NONE; -- dlog("%s: "PID_F" lstat failed with error: %s\n", __FUNCTION__, pid, strerror(ptlib_get_error(pid, sc_num))); -+ dlog("%s: " PID_F " lstat failed with error: %s\n", __FUNCTION__, pid, strerror(ptlib_get_error(pid, sc_num))); - } - } - break; -@@ -1111,13 +1112,13 @@ - if( get_map( key->dev, key->inode, &map ) ) { - map.transient=true; - set_map( &map ); -- dlog("sys_unlink: "PID_F" inode "INODE_F" in override mapping marked transient\n", pid, key->inode ); -+ dlog("sys_unlink: " PID_F " inode " INODE_F " in override mapping marked transient\n", pid, key->inode ); - } - } - } else { - // The "restore state" command overwrote the error - ptlib_set_error( pid, sc_num, error ); -- dlog("%s: "PID_F" unlink failed with error: %s\n", __FUNCTION__, pid, strerror(error)); -+ dlog("%s: " PID_F " unlink failed with error: %s\n", __FUNCTION__, pid, strerror(error)); - } - } - break; -@@ -1229,7 +1230,7 @@ - } else { - // lstat syscall failed - pass the error along - state->state=pid_state::NONE; -- dlog("%s: "PID_F" fstatat failed with error: %s\n", __FUNCTION__, pid, strerror(ptlib_get_error(pid, sc_num))); -+ dlog("%s: " PID_F " fstatat failed with error: %s\n", __FUNCTION__, pid, strerror(ptlib_get_error(pid, sc_num))); - } - } - break; -@@ -1250,14 +1251,14 @@ - if( get_map( key->dev, key->inode, &map ) ) { - map.transient=true; - set_map( &map ); -- dlog("%s: "PID_F" inode "INODE_F" in override mapping marked transient\n", __FUNCTION__, -+ dlog("%s: " PID_F " inode " INODE_F " in override mapping marked transient\n", __FUNCTION__, - pid, key->inode ); - } - } - } else { - // The "restore state" command overwrote the error - ptlib_set_error( pid, sc_num, error ); -- dlog("%s: "PID_F" unlinkat failed with error: %s\n", __FUNCTION__, pid, strerror(error)); -+ dlog("%s: " PID_F " unlinkat failed with error: %s\n", __FUNCTION__, pid, strerror(error)); - } - } - break; -@@ -1350,7 +1351,7 @@ - if( get_map( key->dev, key->inode, &map ) ) { - map.transient=true; - set_map( &map ); -- dlog("sys_rmdir: "PID_F" inode "INODE_F" in override mapping marked transient\n", pid, key->inode ); -+ dlog("sys_rmdir: " PID_F " inode " INODE_F " in override mapping marked transient\n", pid, key->inode ); - } - } else { - // Need to copy the error number (overwritten by the state restore) ---- file_lie.cpp -+++ file_lie.cpp -@@ -64,7 +64,7 @@ - stat_override override; - int params; - -- while( (params=fscanf(file, "dev="DEV_F", ino="INODE_F", mode=%o, uid=%d, gid=%d, rdev="DEV_F" \n", &override.dev, &override.inode, -+ while( (params=fscanf(file, "dev=" DEV_F ", ino=" INODE_F ", mode=%o, uid=%d, gid=%d, rdev=" DEV_F " \n", &override.dev, &override.inode, - &override.mode, &override.uid, &override.gid, &override.dev_id ))==6 ) - { - set_map( &override ); -@@ -78,7 +78,7 @@ - - override=&(i->second); - if( !override->transient ) { -- fprintf( file, "dev="DEV_F",ino="INODE_F",mode=%o,uid=%d,gid=%d,rdev="DEV_F"\n", override->dev, override->inode, -+ fprintf( file, "dev=" DEV_F ",ino=" INODE_F ",mode=%o,uid=%d,gid=%d,rdev=" DEV_F "\n", override->dev, override->inode, - override->mode, override->uid, override->gid, override->dev_id ); - } - } ---- parent.cpp -+++ parent.cpp -@@ -40,6 +40,7 @@ - #include <limits.h> - #include <string.h> - #include <stdlib.h> -+#include <unistd.h> - - #include "arch/platform.h" - -@@ -397,7 +398,7 @@ - // This process has no parent, or had a parent that already quit - return; - } -- dlog("notify_parent: "PID_F" sent a notify about "PID_F"(%x)\n", parent, waiting.pid(), waiting.status()); -+ dlog("notify_parent: " PID_F " sent a notify about " PID_F "(%x)\n", parent, waiting.pid(), waiting.status()); - pid_state *proc_state=lookup_state(parent); - assert(proc_state!=NULL); - -@@ -407,7 +408,7 @@ - if( proc_state->state==pid_state::WAITING ) { - // Call the original function handler, now that it has something to do - if( syscalls[proc_state->orig_sc].func( -1, parent, proc_state ) ) { -- dlog("notify_parent: "PID_F" released from wait\n", parent); -+ dlog("notify_parent: " PID_F " released from wait\n", parent); - ptlib_continue(PTRACE_SYSCALL, parent, 0); - } - } -@@ -423,7 +424,7 @@ - // Set the process state to ZOMBIE with usage count of 1 - proc_state->state=pid_state::ZOMBIE; - proc_state->context_state[0]=1; -- dlog("%s: "PID_F" is now a zombie\n", __func__, pid ); -+ dlog("%s: " PID_F " is now a zombie\n", __func__, pid ); - - pid_state *parent_state=lookup_state(proc_state->parent); - -@@ -497,12 +498,12 @@ - // Due to platform incompatibilities and other issues, we may be called several times over the same - // child. Don't make a fuss - just return. - -- dlog("%s: Process "PID_F" already registered - not performing any operation\n", __FUNCTION__, child_id ); -+ dlog("%s: Process " PID_F " already registered - not performing any operation\n", __FUNCTION__, child_id ); - - return; - } - -- dlog("%s: Registering "PID_F" with parent "PID_F"\n", __FUNCTION__, child_id, parent_id ); -+ dlog("%s: Registering " PID_F " with parent " PID_F "\n", __FUNCTION__, child_id, parent_id ); - - // The platform may want to init the process in some way - ptlib_prepare(child_id); -@@ -561,7 +562,7 @@ - // The process does not exist! - // Register it - pid_t parent_pid=ptlib_get_parent(pid); -- dlog("Caught unknown new process "PID_F", detected parent "PID_F"\n", pid, parent_pid ); -+ dlog("Caught unknown new process " PID_F ", detected parent " PID_F "\n", pid, parent_pid ); - dlog(NULL); - assert( parent_pid==0 || parent_pid==1 || state.find(parent_pid)!=state.end() ); // Make sure the parent is, indeed, ours - -@@ -583,20 +584,20 @@ - if( proc_state->state==pid_state::REDIRECT1 ) { - // REDIRECT1 is just a filler state between the previous call, where the arguments were set up and - // the call initiated, and the call's return (REDIRECT2). No need to actually call the handler -- dlog(PID_F": Calling syscall %ld redirected from %s\n", pid, ret, syscalls[proc_state->orig_sc].name ); -+ dlog(PID_F ": Calling syscall %ld redirected from %s\n", pid, ret, syscalls[proc_state->orig_sc].name ); - proc_state->state=pid_state::REDIRECT2; - } else if( proc_state->state==pid_state::REDIRECT2 || proc_state->state==pid_state::REDIRECT3 ) { - // REDIRECT2 means a return from a syscall generated by us. - // REDIRECT3 means entering a syscall generated by us, but for which the handler function would like - // to be notified (unlike REDIRECT1 above, which is short circuited) - if( proc_state->orig_sc!=SYS_execve ) { -- dlog(PID_F": Called syscall %ld, redirected from %s\n", pid, ret, syscalls[proc_state->orig_sc].name ); -+ dlog(PID_F ": Called syscall %ld, redirected from %s\n", pid, ret, syscalls[proc_state->orig_sc].name ); - - if( !syscalls[proc_state->orig_sc].func( ret, pid, proc_state ) ) - sig=-1; // Mark for ptrace not to continue the process - } else { - // Special handling of the execve case -- dlog(PID_F": Called syscall %ld, redirected from execve\n", pid, ret ); -+ dlog(PID_F ": Called syscall %ld, redirected from execve\n", pid, ret ); - - if( !sys_execve( ret, pid, proc_state, posttrap_always ) ) - sig=-1; -@@ -610,14 +611,14 @@ - if( proc_state->state!=pid_state::ALLOCATE ) { - // Sanity check - returning from same syscall that got us in - if( proc_state->state==pid_state::RETURN && ret!=proc_state->orig_sc ) { -- dlog("process "PID_F" orig_sc=%d actual sc=%ld state=%s\n", pid, proc_state->orig_sc, ret, -+ dlog("process " PID_F " orig_sc=%d actual sc=%ld state=%s\n", pid, proc_state->orig_sc, ret, - state2str(proc_state->state)); - dlog(NULL); - assert( proc_state->state!=pid_state::RETURN || ret==proc_state->orig_sc ); - } - - if( proc_state->state==pid_state::NONE && proc_state->debugger!=0 && proc_state->trace_mode==TRACE_SYSCALL ) { -- dlog(PID_F": pre-syscall hook called for debugger "PID_F"\n", pid, proc_state->debugger ); -+ dlog(PID_F ": pre-syscall hook called for debugger " PID_F "\n", pid, proc_state->debugger ); - - // Notify the debugger before the syscall - proc_state->context_state[0]=wait_state; -@@ -651,18 +652,18 @@ - proc_state->orig_sc=ret; - - if( syscalls.find(ret)!=syscalls.end() ) { -- dlog(PID_F": Called %s(%s)\n", pid, syscalls[ret].name, state2str(proc_state->state)); -+ dlog(PID_F ": Called %s(%s)\n", pid, syscalls[ret].name, state2str(proc_state->state)); - - if( !syscalls[ret].func( ret, pid, proc_state ) ) { - sig=-1; // Mark for ptrace not to continue the process - } - } else if( ret==SYS_execve ) { -- dlog(PID_F": Called execve(%s)\n", pid, state2str(proc_state->state)); -+ dlog(PID_F ": Called execve(%s)\n", pid, state2str(proc_state->state)); - - if( !sys_execve(ret, pid, proc_state, posttrap_always ) ) - sig=-1; - } else { -- dlog(PID_F": Unknown syscall %ld(%s)\n", pid, ret, state2str(proc_state->state)); -+ dlog(PID_F ": Unknown syscall %ld(%s)\n", pid, ret, state2str(proc_state->state)); - if( proc_state->state==pid_state::NONE ) { - proc_state->state=pid_state::RETURN; - } else if( proc_state->state==pid_state::RETURN ) { -@@ -680,7 +681,7 @@ - posttrap_always ) - ) - { -- dlog(PID_F": notify debugger "PID_F" about post-syscall hook\n", pid, proc_state->debugger ); -+ dlog(PID_F ": notify debugger " PID_F " about post-syscall hook\n", pid, proc_state->debugger ); - proc_state->trace_mode=TRACE_STOPPED2; - - pid_state::wait_state waiting; -@@ -694,7 +695,7 @@ - } - break; - case SIGNAL: -- dlog(PID_F": Signal %s\n", pid, sig2str(ret)); -+ dlog(PID_F ": Signal %s\n", pid, sig2str(ret)); - if( proc_state->debugger==0 ) - sig=ret; - else { -@@ -713,9 +714,9 @@ - case SIGEXIT: - { - if( wait_state==EXIT ) { -- dlog(PID_F": Exit with return code %ld\n", pid, ret); -+ dlog(PID_F ": Exit with return code %ld\n", pid, ret); - } else { -- dlog(PID_F": Exit with %s\n", pid, sig2str(ret)); -+ dlog(PID_F ": Exit with %s\n", pid, sig2str(ret)); - } - - struct rusage rusage; -@@ -738,7 +739,7 @@ - break; - case NEWPROCESS: - { -- dlog(PID_F": Created new child process %ld\n", pid, ret); -+ dlog(PID_F ": Created new child process %ld\n", pid, ret); - handle_new_process( pid, ret ); - } - } -@@ -752,11 +753,11 @@ - - // Attach a debugger to the child - if( ptrace(PTRACE_ATTACH, child, 0, 0)!=0 ) { -- dlog("Could not start trace of process "PID_F": %s\n", child, strerror(errno) ); -+ dlog("Could not start trace of process " PID_F ": %s\n", child, strerror(errno) ); - - return false; - } -- dlog("Debugger successfully attached to process "PID_F"\n", child ); -+ dlog("Debugger successfully attached to process " PID_F "\n", child ); - - // Let's free the process to do the exec - errno=0; -@@ -892,7 +893,7 @@ - pid_t child=-1; - - if( read( session_socket, &child, sizeof(child))>0 && child>0 ) { -- dlog("Got asynchronous request to attach to process "PID_F"\n", child); -+ dlog("Got asynchronous request to attach to process " PID_F "\n", child); - - attach_debugger(child, session_socket); - } -@@ -932,7 +933,7 @@ - - bool allocate_process_mem( pid_t pid, pid_state *state, int sc_num ) - { -- dlog("allocate_process_mem: "PID_F" running syscall %d needs process memory\n", pid, sc_num ); -+ dlog("allocate_process_mem: " PID_F " running syscall %d needs process memory\n", pid, sc_num ); - - state->orig_sc=sc_num; - -@@ -964,7 +965,7 @@ - int fd=mkstemp(filename); - - if( fd==-1 ) { -- dlog("allocate_shared_mem: "PID_F" Failed to create file %s: %s\n", pid, filename, strerror(errno) ); -+ dlog("allocate_shared_mem: " PID_F " Failed to create file %s: %s\n", pid, filename, strerror(errno) ); - - // We'll kill the process - ptlib_continue( PTRACE_KILL, pid, 0 ); -@@ -978,7 +979,7 @@ - char *memory=(char *)mmap( NULL, shared_mem_size, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0 ); - - if( memory==MAP_FAILED ) { -- dlog("allocate_shared_mem: "PID_F" filed to map file %s into memory: %s\n", pid, filename, strerror(errno) ); -+ dlog("allocate_shared_mem: " PID_F " filed to map file %s into memory: %s\n", pid, filename, strerror(errno) ); - - // Cleanup - close(fd); -@@ -1035,7 +1036,7 @@ - // First step - mmap just returned - if( ptlib_success( pid, sc_num ) ) { - state->memory=(void *)ptlib_get_retval( pid ); -- dlog("handle_memory_allocation: "PID_F" allocated for our use %lu bytes at %p\n", pid, -+ dlog("handle_memory_allocation: " PID_F " allocated for our use %lu bytes at %p\n", pid, - (unsigned long)static_mem_size, state->memory); - - // "All" we need now is the shared memory. First, let's generate the local version for it. -@@ -1045,7 +1046,7 @@ - return false; - } else { - // The allocation failed. What can you do except kill the process? -- dlog("handle_memory_allocation: "PID_F" our memory allocation failed with error. Kill process. %s\n", pid, -+ dlog("handle_memory_allocation: " PID_F " our memory allocation failed with error. Kill process. %s\n", pid, - strerror(ptlib_get_error(pid, sc_num)) ); - ptlib_continue( PTRACE_KILL, pid, 0 ); - return false; -@@ -1088,7 +1089,7 @@ - ptlib_generate_syscall( pid, PREF_MMAP, (char *)state->memory+ptlib_prepare_memory_len() ); - } else { - // open failed -- dlog( "handle_memory_allocation: "PID_F" process failed to open %s: %s\n", pid, state->shared_mem_local.getc(), -+ dlog( "handle_memory_allocation: " PID_F " process failed to open %s: %s\n", pid, state->shared_mem_local.getc(), - strerror(ptlib_get_error(pid, sc_num)) ); - ptlib_continue( PTRACE_KILL, pid, 0 ); - return false; -@@ -1105,7 +1106,7 @@ - if( ptlib_success( pid, sc_num ) ) { - // mmap succeeded - state->shared_memory=(void *)(ptlib_get_retval( pid )+ptlib_prepare_memory_len()); -- dlog("handle_memory_allocation: "PID_F" allocated for our use %lu shared bytes at %p\n", pid, -+ dlog("handle_memory_allocation: " PID_F " allocated for our use %lu shared bytes at %p\n", pid, - (unsigned long)shared_mem_size, (char *)state->shared_memory-ptlib_prepare_memory_len()); - - // We now need to close the file descriptor -@@ -1113,7 +1114,7 @@ - - return ptlib_generate_syscall( pid, SYS_close, state->shared_memory ); - } else { -- dlog( "handle_memory_allocation: "PID_F" process failed to mmap memory: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); -+ dlog( "handle_memory_allocation: " PID_F " process failed to mmap memory: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); - - ptlib_continue( PTRACE_KILL, pid, 0 ); - return false; -@@ -1128,7 +1129,7 @@ - // Close done - we can revert to whatever we were previously doing - if( !ptlib_success( pid, sc_num ) ) { - // If close failed, we'll log the error and leak the file descriptor, but otherwise do nothing about it -- dlog( "handle_memory_allocation: "PID_F" procss close failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); -+ dlog( "handle_memory_allocation: " PID_F " procss close failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); - } - return ptlib_generate_syscall( pid, state->orig_sc , state->shared_memory ); - case 8: -@@ -1137,14 +1138,14 @@ - ptlib_restore_state( pid, state->saved_state ); - state->state=pid_state::NONE; - -- dlog("handle_memory_allocation: "PID_F" restore state and call handler for syscall %d\n", pid, sc_num ); -+ dlog("handle_memory_allocation: " PID_F " restore state and call handler for syscall %d\n", pid, sc_num ); - } - break; - case 25: - // Close done - we now need to deallocate the previous shared mem - if( !ptlib_success( pid, sc_num ) ) { - // If close failed, we'll log the error and leak the file descriptor, but otherwise do nothing about it -- dlog( "handle_memory_allocation: "PID_F" procss close failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); -+ dlog( "handle_memory_allocation: " PID_F " procss close failed: %s\n", pid, strerror(ptlib_get_error(pid, sc_num) ) ); - } - - ptlib_set_argument( pid, 1, state->context_state[2]-ptlib_prepare_memory_len() ); -@@ -1159,7 +1160,7 @@ - // Munmap done - if( !ptlib_success( pid, sc_num ) ) { - // Again, if the unmap failed, we'll log it but otherwise continue -- dlog( "handle_memory_allocation: "PID_F" process munmap failed: %s\n", pid, strerror( ptlib_get_error(pid, sc_num) ) ); -+ dlog( "handle_memory_allocation: " PID_F " process munmap failed: %s\n", pid, strerror( ptlib_get_error(pid, sc_num) ) ); - } - - // Restart the original system call -@@ -1173,10 +1174,10 @@ - bool sys_mmap( int sc_num, pid_t pid, pid_state *state ) - { - if( state->state==pid_state::NONE ) { -- dlog("mmap: "PID_F" direct call\n", pid); -+ dlog("mmap: " PID_F " direct call\n", pid); - state->state=pid_state::RETURN; - } else if( state->state==pid_state::RETURN ) { -- dlog("mmap: "PID_F" direct return\n", pid); -+ dlog("mmap: " PID_F " direct return\n", pid); - state->state=pid_state::NONE; - } - -@@ -1209,7 +1210,7 @@ - dlog("PID\tParent\tState\n"); - - for( map_class<pid_t, pid_state>::const_iterator i=state.begin(); i!=state.end(); ++i ) { -- dlog(PID_F"\t"PID_F"\t%s", i->first, i->second.parent, state2str(i->second.state) ); -+ dlog(PID_F "\t" PID_F "\t%s", i->first, i->second.parent, state2str(i->second.state) ); - - if( i->second.state==pid_state::ZOMBIE ) { - dlog("(%d)", (int)i->second.context_state[0]); ---- process.cpp -+++ process.cpp -@@ -95,7 +95,7 @@ - if( (flags&CLONE_PTRACE)!=0 ) - state->context_state[0]|=NEW_PROCESS_SAME_DEBUGGER; - -- dlog(PID_F": clone called with flags %lx\n", pid, (unsigned long)flags ); -+ dlog(PID_F ": clone called with flags %lx\n", pid, (unsigned long)flags ); - - // Whatever it originally was, add a CLONE_PTRACE to the flags so that we remain in control - flags|=CLONE_PTRACE; -@@ -107,10 +107,10 @@ - - if( ptlib_success( pid, state->orig_sc ) ) { - pid_t newpid=(pid_t)ptlib_get_retval( pid ); -- dlog(PID_F": clone succeeded, new process "PID_F"\n", pid, newpid ); -+ dlog(PID_F ": clone succeeded, new process " PID_F "\n", pid, newpid ); - handle_new_process( pid, newpid ); - } else { -- dlog(PID_F": clone failed: %s\n", pid, strerror( ptlib_get_error( pid, state->orig_sc ) ) ); -+ dlog(PID_F ": clone failed: %s\n", pid, strerror( ptlib_get_error( pid, state->orig_sc ) ) ); - } - } - -@@ -133,7 +133,7 @@ - if( log_level>0 ) { - char cmd[PATH_MAX]; - ptlib_get_string( pid, (void *)ptlib_get_argument( pid, 1 ), cmd, sizeof(cmd) ); -- dlog("execve: "PID_F" calling execve for executing %s\n", pid, cmd ); -+ dlog("execve: " PID_F " calling execve for executing %s\n", pid, cmd ); - dlog(NULL); - } - -@@ -156,7 +156,7 @@ - state->state=pid_state::NONE; - - if( ptlib_success( pid, sc_num ) && state->context_state[1]==0 ) { -- dlog("execve: "PID_F" successfully execed a new command\n", pid ); -+ dlog("execve: " PID_F " successfully execed a new command\n", pid ); - - // All memory allocations performed before the exec are now null and void - state->memory=NULL; -@@ -175,15 +175,15 @@ - } - #endif - } else if( state->context_state[1]!=0 ) { -- dlog("execve: "PID_F" chroot translation forced error on us: %s\n", pid, strerror(state->context_state[1]) ); -+ dlog("execve: " PID_F " chroot translation forced error on us: %s\n", pid, strerror(state->context_state[1]) ); - - ptlib_set_error( pid, state->orig_sc, state->context_state[1] ); - } else { -- dlog("execve: "PID_F" failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num)) ); -+ dlog("execve: " PID_F " failed with error %s\n", pid, strerror(ptlib_get_error(pid, sc_num)) ); - } - } else { - state->state=pid_state::NONE; -- dlog("execve: "PID_F" absorbed dummy SIGTRAP after successful execve\n", pid ); -+ dlog("execve: " PID_F " absorbed dummy SIGTRAP after successful execve\n", pid ); - - // If the trace mode is not SYSCALL, the post handling will not generate a TRACE. If PTLIB_TRAP_AFTER_EXEC is set, - // a trace is required, however, even if not in TRACE_SYSCALL -@@ -328,7 +328,7 @@ - if( child_state->state==pid_state::ZOMBIE ) { - // We can dispense with the pid entry - delete_state(child->pid()); -- dlog("%s: Child "PID_F" removed from process table\n", __func__, child->pid() ); -+ dlog("%s: Child " PID_F " removed from process table\n", __func__, child->pid() ); - child_state=NULL; - } - -@@ -367,7 +367,7 @@ - - state->state=pid_state::REDIRECT2; - } else { -- dlog("wait4: "PID_F" hanged in wait for %d\n", pid, wait_pid ); -+ dlog("wait4: " PID_F " hanged in wait for %d\n", pid, wait_pid ); - } - } - ---- ptrace.cpp -+++ ptrace.cpp -@@ -37,13 +37,13 @@ - pid_state *child_state=lookup_state( traced ); - if( child_state==NULL || child_state->debugger!=pid ) - { -- dlog("ptrace verify_permission: %d failed permission - not the debugger for "PID_F"\n", pid, traced); -+ dlog("ptrace verify_permission: %d failed permission - not the debugger for " PID_F "\n", pid, traced); - errno=ESRCH; - return false; - } - if( child_state->trace_mode!=TRACE_STOPPED1 && child_state->trace_mode!=TRACE_STOPPED2 ) - { -- dlog("ptrace verify_permission: %d failed permission - "PID_F" is not stopped\n", pid, traced); -+ dlog("ptrace verify_permission: %d failed permission - " PID_F " is not stopped\n", pid, traced); - errno=ESRCH; - return false; - } -@@ -57,10 +57,10 @@ - pid_state *parent_state=lookup_state( debugger ); - - if( child_state==NULL || parent_state==NULL || child_state->debugger!=0 ) { -- dlog("begin_trace: %d Failed to start trace for "PID_F": child_state=%p, parent_state=%p", debugger, child, child_state, -+ dlog("begin_trace: %d Failed to start trace for " PID_F ": child_state=%p, parent_state=%p", debugger, child, child_state, - parent_state ); - if( child_state!=NULL ) { -- dlog("child_state debugger="PID_F, child_state->debugger); -+ dlog("child_state debugger=" PID_F, child_state->debugger); - } - dlog("\n"); - -@@ -82,10 +82,10 @@ - __ptrace_request req=(__ptrace_request)state->context_state[0]; - if( req==PTRACE_CONT ) { - child_state->trace_mode|=TRACE_CONT; -- dlog("ptrace: %d PTRACE_CONT("PID_F")\n", pid, child ); -+ dlog("ptrace: %d PTRACE_CONT(" PID_F ")\n", pid, child ); - } else if( req==PTRACE_SYSCALL ) { - child_state->trace_mode|=TRACE_SYSCALL; -- dlog("ptrace: %d PTRACE_SYSCALL("PID_F")\n", pid, child ); -+ dlog("ptrace: %d PTRACE_SYSCALL(" PID_F ")\n", pid, child ); - } else if( req==PTRACE_DETACH ) { - child_state->trace_mode&=TRACE_MASK2; - } else { -@@ -95,7 +95,7 @@ - long rc=0; - - if( (child_state->trace_mode&TRACE_MASK2)==TRACE_STOPPED1 ) { -- dlog("handle_cont_syscall: "PID_F" process "PID_F" was in pre-syscall hook\n", pid, child ); -+ dlog("handle_cont_syscall: " PID_F " process " PID_F " was in pre-syscall hook\n", pid, child ); - // Need to restart the syscall - int status=child_state->context_state[1]; - PTLIB_WAIT_RET wait_state=(PTLIB_WAIT_RET)child_state->context_state[0]; -@@ -109,14 +109,14 @@ - rc=ptlib_continue(PTRACE_SYSCALL, child, sig); - } - } else if( (child_state->trace_mode&TRACE_MASK2)==TRACE_STOPPED2 ) { -- dlog("handle_cont_syscall: "PID_F" process "PID_F" was in post-syscall hook\n", pid, child ); -+ dlog("handle_cont_syscall: " PID_F " process " PID_F " was in post-syscall hook\n", pid, child ); - child_state->trace_mode&=TRACE_MASK1; - rc=ptlib_continue( PTRACE_SYSCALL, child, (int)state->context_state[3] ); - } else { - // Our child was not stopped (at least, by us) - // This is an internal inconsistency - -- dlog("handle_cont_syscall: "PID_F" process "PID_F" was started with no specific state (%x)\n", pid, child, -+ dlog("handle_cont_syscall: " PID_F " process " PID_F " was started with no specific state (%x)\n", pid, child, - child_state->trace_mode ); - dlog(NULL); - rc=-1; -@@ -143,7 +143,7 @@ - static bool handle_detach( pid_t pid, pid_state *state ) - { - if( verify_permission( pid, state ) ) { -- dlog("ptrace: %d PTRACE_DETACH("PID_F")\n", pid, (pid_t)state->context_state[1]); -+ dlog("ptrace: %d PTRACE_DETACH(" PID_F ")\n", pid, (pid_t)state->context_state[1]); - - pid_state *child_state=lookup_state((pid_t)state->context_state[1]); - -@@ -167,13 +167,13 @@ - pid_t child=(pid_t)state->context_state[1]; - - if( verify_permission( pid, state ) ) { -- dlog("handle_kill: %d is sending a kill to "PID_F"\n", pid, child ); -+ dlog("handle_kill: %d is sending a kill to " PID_F "\n", pid, child ); - - ptlib_continue(PTRACE_KILL, child, 0); - ptlib_set_retval( pid, 0 ); - } else { - ptlib_set_error( pid, state->orig_sc, errno ); -- dlog("handle_kill: %d tried to kill "PID_F": %s\n", pid, child, strerror(errno)); -+ dlog("handle_kill: %d tried to kill " PID_F ": %s\n", pid, child, strerror(errno)); - } - } - -@@ -185,7 +185,7 @@ - errno=0; - long data=ptrace( (__ptrace_request)state->context_state[0], child, state->context_state[2], 0 ); - if( data!=-1 || errno==0 ) { -- dlog("handle_peek_data: %d is peeking data from "PID_F" at address %p\n", pid, child, (void*)state->context_state[2] ); -+ dlog("handle_peek_data: %d is peeking data from " PID_F " at address %p\n", pid, child, (void*)state->context_state[2] ); - - // Write the result where applicable - // XXX This may be a Linux only semantics - pass addres to write result to as "data" argument -@@ -199,7 +199,7 @@ - } - } else { - ptlib_set_error( pid, state->orig_sc, errno ); -- dlog("handle_peek_data: %d tried get data from "PID_F": %s\n", pid, child, strerror(errno)); -+ dlog("handle_peek_data: %d tried get data from " PID_F ": %s\n", pid, child, strerror(errno)); - } - } - -@@ -210,11 +210,11 @@ - if( verify_permission( pid, state ) && - ptrace( (__ptrace_request)state->context_state[0], child, state->context_state[2], state->context_state[3] )==0 ) - { -- dlog("handle_poke_data: %d is pokeing data in "PID_F" at address %p\n", pid, child, (void*)state->context_state[2] ); -+ dlog("handle_poke_data: %d is pokeing data in " PID_F " at address %p\n", pid, child, (void*)state->context_state[2] ); - ptlib_set_retval( pid, 0 ); - } else { - ptlib_set_error( pid, state->orig_sc, errno ); -- dlog("handle_poke_data: %d tried push data to "PID_F": %s\n", pid, child, strerror(errno)); -+ dlog("handle_poke_data: %d tried push data to " PID_F ": %s\n", pid, child, strerror(errno)); - } - } - -@@ -228,7 +228,7 @@ - state->context_state[2]=ptlib_get_argument( pid, 3 ); // addr - state->context_state[3]=ptlib_get_argument( pid, 4 ); // data - -- dlog("ptrace: "PID_F" ptrace( %d, "PID_F", %p, %p )\n", pid, (int)state->context_state[0], (pid_t)state->context_state[1], -+ dlog("ptrace: " PID_F " ptrace( %d, " PID_F ", %p, %p )\n", pid, (int)state->context_state[0], (pid_t)state->context_state[1], - (void*)state->context_state[2], (void*)state->context_state[3] ); - - ptlib_set_syscall( pid, PREF_NOP ); -@@ -240,7 +240,7 @@ - switch( state->context_state[0] ) { - case PTRACE_TRACEME: - if( begin_trace( state->parent, pid ) ) { -- dlog("ptrace: %d PTRACE_TRACEME parent "PID_F"\n", pid, state->parent ); -+ dlog("ptrace: %d PTRACE_TRACEME parent " PID_F "\n", pid, state->parent ); - ptlib_set_retval( pid, 0 ); - } else { - dlog("ptrace: %d PTRACE_TRACEME failed %s\n", pid, strerror(errno) ); -@@ -249,10 +249,10 @@ - break; - case PTRACE_ATTACH: - if( begin_trace( pid, (pid_t)state->context_state[1] ) ) { -- dlog("ptrace: "PID_F" PTRACE_ATTACH("PID_F") succeeded\n", pid, (pid_t)state->context_state[1] ); -+ dlog("ptrace: " PID_F " PTRACE_ATTACH(" PID_F ") succeeded\n", pid, (pid_t)state->context_state[1] ); - ptlib_set_retval( pid, 0 ); - } else { -- dlog("ptrace: "PID_F" PTRACE_ATTACH("PID_F") failed %s\n", pid, (pid_t)state->context_state[1], strerror(errno) ); -+ dlog("ptrace: " PID_F " PTRACE_ATTACH(" PID_F ") failed %s\n", pid, (pid_t)state->context_state[1], strerror(errno) ); - ptlib_set_error( pid, state->orig_sc, errno ); - } - break; -@@ -293,7 +293,7 @@ - case PTRACE_SINGLESTEP: - // We do not support single step right now - ptlib_set_error( pid, state->orig_sc, EINVAL ); -- dlog("ptrace: "PID_F" tried to call SINGLESTEP on "PID_F"\n", pid, (pid_t)state->context_state[1]); -+ dlog("ptrace: " PID_F " tried to call SINGLESTEP on " PID_F "\n", pid, (pid_t)state->context_state[1]); - break; - case PTRACE_CONT: - case PTRACE_SYSCALL: -@@ -306,7 +306,7 @@ - handle_detach( pid, state ); - break; - default: -- dlog("ptrace: "PID_F" Unsupported option %lx\n", pid, state->context_state[0] ); -+ dlog("ptrace: " PID_F " Unsupported option %lx\n", pid, state->context_state[0] ); - ptlib_set_error(pid, state->orig_sc, EINVAL); - break; - } |