tevent_req_set_cleanup_fn(req, cli_credentials_krb5_refresh_ccache_cleanup);
+ log_stack_trace();
status = cli_credentials_krb5_get_ccache_name(cred,
state,
&existing_ccache);
/* Bleh, nasty recursion issues: We are setting a machine
* account here, so we don't want the 'pending' flag around
* any more */
+ SMB_ASSERT(cred->machine_account_pending == false);
cred->machine_account_pending = false;
/* We have to do this, as the fallback in
}
DBG_PREFIX(dbg_level, (
- "%s: parsing NEG_TOKEN_INIT content failed "
+ "%s: PID=%u parsing NEG_TOKEN_INIT content failed "
"(next[%s]): %s\n", cur_sec->op->name,
- next, nt_errstr(status)));
+ (unsigned int)getpid(), next, nt_errstr(status)));
if (next == NULL) {
/*
backtrace_size = backtrace(backtrace_stack,BACKTRACE_STACK_SIZE);
backtrace_strings = backtrace_symbols(backtrace_stack, backtrace_size);
- DEBUG(0, ("BACKTRACE: %lu stack frames:\n",
- (unsigned long)backtrace_size));
+ DEBUG(0, ("BACKTRACE(PID=%u): %lu stack frames:\n",
+ (unsigned int)getpid(), (unsigned long)backtrace_size));
if (backtrace_strings) {
size_t i;
/* garbage input, possibly from the auto-mech detection */
return NT_STATUS_INVALID_PARAMETER;
default:
- DEBUG(1, ("GSS %s Update(krb5)(%d) Update failed: %s\n",
+ DEBUG(1, ("GSS %s Update(krb5)(%d) PID=%u Update failed: %s\n",
gensec_security->gensec_role == GENSEC_CLIENT ? "client" : "server",
gensec_gssapi_state->gss_exchange_count,
+ (unsigned int)getpid(),
gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
return NT_STATUS_LOGON_FAILURE;
}
cli_credentials_set_conf(session_info->credentials, lp_ctx);
+ log_stack_trace();
+ //cli_credentials_set_machine_account_pending(session_info->credentials, lp_ctx);
cli_credentials_set_machine_account(session_info->credentials, lp_ctx);
} else {
session_info->credentials = cli_credentials_init_anon(session_info);