You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by sf...@apache.org on 2011/12/03 00:02:11 UTC

svn commit: r1209766 [2/12] - in /httpd/httpd/trunk: docs/log-message-tags/ modules/aaa/ modules/apreq/ modules/arch/netware/ modules/arch/unix/ modules/arch/win32/ modules/cache/ modules/cluster/ modules/core/ modules/database/ modules/dav/fs/ modules...

Modified: httpd/httpd/trunk/modules/aaa/mod_authz_groupfile.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/aaa/mod_authz_groupfile.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/aaa/mod_authz_groupfile.c (original)
+++ httpd/httpd/trunk/modules/aaa/mod_authz_groupfile.c Fri Dec  2 23:02:04 2011
@@ -161,7 +161,7 @@ static authz_status group_check_authoriz
      * configured. So decline.
      */
     if (!(conf->groupfile)) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01664)
                         "No group file was specified in the configuration");
         return AUTHZ_DENIED;
     }
@@ -170,7 +170,7 @@ static authz_status group_check_authoriz
                                 &grpstatus);
 
     if (status != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01665)
                         "Could not open group file: %s",
                         conf->groupfile);
         return AUTHZ_DENIED;
@@ -178,7 +178,7 @@ static authz_status group_check_authoriz
 
     if (apr_table_elts(grpstatus)->nelts == 0) {
         /* no groups available, so exit immediately */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01666)
                       "Authorization of user %s to access %s failed, reason: "
                       "user doesn't appear in group file (%s).",
                       r->user, r->uri, conf->groupfile);
@@ -192,7 +192,7 @@ static authz_status group_check_authoriz
         }
     }
 
-    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01667)
                     "Authorization of user %s to access %s failed, reason: "
                     "user is not part of the 'require'ed group(s).",
                     r->user, r->uri);
@@ -221,7 +221,7 @@ static authz_status filegroup_check_auth
      * configured. So decline.
      */
     if (!(conf->groupfile)) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01668)
                         "No group file was specified in the configuration");
         return AUTHZ_DENIED;
     }
@@ -229,7 +229,7 @@ static authz_status filegroup_check_auth
     status = groups_for_user(r->pool, user, conf->groupfile,
                              &grpstatus);
     if (status != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01669)
                       "Could not open group file: %s",
                       conf->groupfile);
         return AUTHZ_DENIED;
@@ -237,7 +237,7 @@ static authz_status filegroup_check_auth
 
     if (apr_table_elts(grpstatus)->nelts == 0) {
         /* no groups available, so exit immediately */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01670)
                         "Authorization of user %s to access %s failed, reason: "
                         "user doesn't appear in group file (%s).",
                         r->user, r->uri, conf->groupfile);
@@ -259,7 +259,7 @@ static authz_status filegroup_check_auth
         return AUTHZ_DENIED;
     }
 
-    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01671)
                   "Authorization of user %s to access %s failed, reason: "
                   "user is not part of the 'require'ed file group.",
                   r->user, r->uri);

Modified: httpd/httpd/trunk/modules/aaa/mod_authz_host.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/aaa/mod_authz_host.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/aaa/mod_authz_host.c (original)
+++ httpd/httpd/trunk/modules/aaa/mod_authz_host.c Fri Dec  2 23:02:04 2011
@@ -176,7 +176,7 @@ static authz_status host_check_authoriza
                                     &remotehost_is_ip);
 
     if ((remotehost == NULL) || remotehost_is_ip) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01753)
                       "access check of '%s' to %s failed, reason: unable to get the "
                       "remote host name", require_line, r->uri);
     }

Modified: httpd/httpd/trunk/modules/aaa/mod_authz_owner.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/aaa/mod_authz_owner.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/aaa/mod_authz_owner.c (original)
+++ httpd/httpd/trunk/modules/aaa/mod_authz_owner.c Fri Dec  2 23:02:04 2011
@@ -47,7 +47,7 @@ static authz_status fileowner_check_auth
 
 #if !APR_HAS_USER
     reason = "'Require file-owner' is not supported on this platform.";
-    ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+    ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01632)
                   "Authorization of user %s to access %s failed, reason: %s",
                   r->user, r->uri, reason ? reason : "unknown");
     return AUTHZ_DENIED;
@@ -61,7 +61,7 @@ static authz_status fileowner_check_auth
 
     if (!r->filename) {
         reason = "no filename available";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01633)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return AUTHZ_DENIED;
@@ -71,7 +71,7 @@ static authz_status fileowner_check_auth
     if (status != APR_SUCCESS) {
         reason = apr_pstrcat(r->pool, "could not stat file ",
                                 r->filename, NULL);
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01634)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return AUTHZ_DENIED;
@@ -79,7 +79,7 @@ static authz_status fileowner_check_auth
 
     if (!(finfo.valid & APR_FINFO_USER)) {
         reason = "no file owner information available";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01635)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return AUTHZ_DENIED;
@@ -88,7 +88,7 @@ static authz_status fileowner_check_auth
     status = apr_uid_name_get(&owner, finfo.user, r->pool);
     if (status != APR_SUCCESS || !owner) {
         reason = "could not get name of file owner";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01636)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return AUTHZ_DENIED;
@@ -97,7 +97,7 @@ static authz_status fileowner_check_auth
     if (strcmp(owner, r->user)) {
         reason = apr_psprintf(r->pool, "file owner %s does not match.",
                                 owner);
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01637)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return AUTHZ_DENIED;
@@ -126,7 +126,7 @@ static char *authz_owner_get_file_group(
 
     if (!r->filename) {
         reason = "no filename available";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01638)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return NULL;
@@ -136,7 +136,7 @@ static char *authz_owner_get_file_group(
     if (status != APR_SUCCESS) {
         reason = apr_pstrcat(r->pool, "could not stat file ",
                                 r->filename, NULL);
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01639)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return NULL;
@@ -144,7 +144,7 @@ static char *authz_owner_get_file_group(
 
     if (!(finfo.valid & APR_FINFO_GROUP)) {
         reason = "no file group information available";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01640)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return NULL;
@@ -153,7 +153,7 @@ static char *authz_owner_get_file_group(
     status = apr_gid_name_get(&group, finfo.group, r->pool);
     if (status != APR_SUCCESS || !group) {
         reason = "could not get name of file group";
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(01641)
                       "Authorization of user %s to access %s failed, reason: %s",
                       r->user, r->uri, reason ? reason : "unknown");
         return NULL;

Modified: httpd/httpd/trunk/modules/aaa/mod_authz_user.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/aaa/mod_authz_user.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/aaa/mod_authz_user.c (original)
+++ httpd/httpd/trunk/modules/aaa/mod_authz_user.c Fri Dec  2 23:02:04 2011
@@ -62,7 +62,7 @@ static authz_status user_check_authoriza
         }
     }
 
-    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01663)
                   "access to %s failed, reason: user '%s' does not meet "
                   "'require'ments for user to be allowed access",
                   r->uri, r->user);

Modified: httpd/httpd/trunk/modules/apreq/filter.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/apreq/filter.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/apreq/filter.c (original)
+++ httpd/httpd/trunk/modules/apreq/filter.c Fri Dec  2 23:02:04 2011
@@ -127,13 +127,13 @@ void apreq_filter_init_context(ap_filter
         apr_uint64_t content_length = apr_strtoi64(cl_header,&dummy,0);
 
         if (dummy == NULL || *dummy != 0) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r, APLOGNO(02045)
                           "Invalid Content-Length header (%s)", cl_header);
             ctx->body_status = APREQ_ERROR_BADHEADER;
             return;
         }
         else if (content_length > ctx->read_limit) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r, APLOGNO(02046)
                           "Content-Length header (%s) exceeds configured "
                           "max_body limit (%" APR_UINT64_T_FMT ")",
                           cl_header, ctx->read_limit);
@@ -221,14 +221,14 @@ static apr_status_t apreq_filter_init(ap
             handle->f = f;
         }
         else if (r->input_filters->frec->filter_func.in_func == apreq_filter) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(02047)
                           "removing intermediate apreq filter");
             if (handle->f == f)
                 handle->f = r->input_filters;
             ap_remove_input_filter(f);
         }
         else {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(02048)
                           "relocating intermediate apreq filter");
             apreq_filter_relocate(f);
             handle->f = f;
@@ -240,7 +240,7 @@ static apr_status_t apreq_filter_init(ap
      * if it is, we must deregister it now.
      */
     if (handle->f == f) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(02049)
                      "disabling stale protocol filter");
         if (ctx->body_status == APR_INCOMPLETE)
             ctx->body_status = APREQ_ERROR_INTERRUPT;
@@ -264,14 +264,14 @@ apr_status_t apreq_filter_prefetch(ap_fi
     if (ctx->body_status != APR_INCOMPLETE || readbytes == 0)
         return ctx->body_status;
 
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(02050)
                   "prefetching %" APR_OFF_T_FMT " bytes", readbytes);
 
     rv = ap_get_brigade(f->next, ctx->bb, AP_MODE_READBYTES,
                        APR_BLOCK_READ, readbytes);
 
     if (rv != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, APLOGNO(02051)
                       "ap_get_brigade failed during prefetch");
         ctx->filter_error = rv;
         return ctx->body_status = APREQ_ERROR_GENERAL;
@@ -283,7 +283,7 @@ apr_status_t apreq_filter_prefetch(ap_fi
     rv = apreq_brigade_concat(r->pool, ctx->temp_dir, ctx->brigade_limit,
                               ctx->spool, ctx->bbtmp);
     if (rv != APR_SUCCESS && rv != APR_EOF) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, APLOGNO(02052)
                       "apreq_brigade_concat failed; TempDir problem?");
         ctx->filter_error = APR_EGENERAL;
         return ctx->body_status = rv;
@@ -310,7 +310,7 @@ apr_status_t apreq_filter_prefetch(ap_fi
 
     if (ctx->bytes_read > ctx->read_limit) {
         ctx->body_status = APREQ_ERROR_OVERLIMIT;
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, ctx->body_status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, ctx->body_status, r, APLOGNO(02053)
                       "Bytes read (%" APR_UINT64_T_FMT
                       ") exceeds configured read limit (%" APR_UINT64_T_FMT ")",
                       ctx->bytes_read, ctx->read_limit);
@@ -389,7 +389,7 @@ apr_status_t apreq_filter(ap_filter_t *f
 
     if (ctx->bytes_read > ctx->read_limit) {
         ctx->body_status = APREQ_ERROR_OVERLIMIT;
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, ctx->body_status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, ctx->body_status, r, APLOGNO(02054)
                       "Bytes read (%" APR_UINT64_T_FMT
                       ") exceeds configured max_body limit (%"
                       APR_UINT64_T_FMT ")",
@@ -410,7 +410,7 @@ static int apreq_pre_init(apr_pool_t *p,
 
     status = apreq_pre_initialize(p);
     if (status != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, status, base_server,
+        ap_log_error(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, status, base_server, APLOGNO(02055)
                      "Failed to pre-initialize libapreq2");
         return HTTP_INTERNAL_SERVER_ERROR;
     }
@@ -425,7 +425,7 @@ static int apreq_post_init(apr_pool_t *p
 
     status = apreq_post_initialize(p);
     if (status != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, status, base_server,
+        ap_log_error(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, status, base_server, APLOGNO(02056)
                      "Failed to post-initialize libapreq2");
         return HTTP_INTERNAL_SERVER_ERROR;
     }
@@ -502,7 +502,7 @@ void apreq_filter_make_context(ap_filter
 
             }
 
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(02057)
                           "stealing filter context");
             f->ctx = ctx;
             r->proto_input_filters = f;
@@ -511,7 +511,7 @@ void apreq_filter_make_context(ap_filter
             return;
 
         default:
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, ctx->body_status, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, ctx->body_status, r, APLOGNO(02058)
                           "cannot steal context: bad filter status");
         }
     }

Modified: httpd/httpd/trunk/modules/arch/netware/mod_netware.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/netware/mod_netware.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/netware/mod_netware.c (original)
+++ httpd/httpd/trunk/modules/arch/netware/mod_netware.c Fri Dec  2 23:02:04 2011
@@ -144,7 +144,7 @@ static apr_status_t ap_cgi_build_command
     new_cmd = apr_table_get(d->file_type_handlers, ext);
     e_info->detached = 1;
     if (new_cmd == NULL) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02135)
                   "Could not find a command associated with the %s extension", ext);
         return APR_EBADF;
     }

Modified: httpd/httpd/trunk/modules/arch/netware/mod_nw_ssl.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/netware/mod_nw_ssl.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/netware/mod_nw_ssl.c (original)
+++ httpd/httpd/trunk/modules/arch/netware/mod_nw_ssl.c Fri Dec  2 23:02:04 2011
@@ -258,7 +258,7 @@ static int make_secure_socket(apr_pool_t
             (LPWSAPROTOCOL_INFO)&SecureProtoInfo, 0, 0);
 
     if (s == INVALID_SOCKET) {
-        ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf,
+        ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf, APLOGNO(02120)
                      "make_secure_socket: failed to get a socket for %s",
                      addr);
         return -1;
@@ -269,7 +269,7 @@ static int make_secure_socket(apr_pool_t
 
         if (WSAIoctl(s, SO_SSL_SET_FLAGS, (char *)&optParam,
             sizeof(optParam), NULL, 0, NULL, NULL, NULL)) {
-            ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf,
+            ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf, APLOGNO(02121)
                          "make_secure_socket: for %s, WSAIoctl: "
                          "(SO_SSL_SET_FLAGS)", addr);
             return -1;
@@ -284,7 +284,7 @@ static int make_secure_socket(apr_pool_t
 
     if (WSAIoctl(s, SO_SSL_SET_SERVER, (char *)&opts, sizeof(opts),
         NULL, 0, NULL, NULL, NULL) != 0) {
-        ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf,
+        ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf, APLOGNO(02122)
                      "make_secure_socket: for %s, WSAIoctl: "
                      "(SO_SSL_SET_SERVER)", addr);
         return -1;
@@ -295,7 +295,7 @@ static int make_secure_socket(apr_pool_t
 
         if(WSAIoctl(s, SO_SSL_SET_FLAGS, (char*)&optParam,
             sizeof(optParam), NULL, 0, NULL, NULL, NULL)) {
-            ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf,
+            ap_log_error(APLOG_MARK, APLOG_CRIT, WSAGetLastError(), sconf, APLOGNO(02123)
                          "make_secure_socket: for %s, WSAIoctl: "
                          "(SO_SSL_SET_FLAGS)", addr);
             return -1;
@@ -331,7 +331,7 @@ static int convert_secure_socket(conn_re
                      NULL, 0, NULL, NULL, NULL);
         if (SOCKET_ERROR == rcode)
         {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, c->base_server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, c->base_server, APLOGNO(02124)
                      "Error: %d with ioctlsocket(flag SO_TLS_ENABLE)", WSAGetLastError());
                 return rcode;
         }
@@ -366,7 +366,7 @@ static int convert_secure_socket(conn_re
 
     /* make sure that it was successful */
         if(SOCKET_ERROR == rcode ){
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, c->base_server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, c->base_server, APLOGNO(02125)
                      "Error: %d with ioctl (SO_TLS_SET_CLIENT)", WSAGetLastError());
         }
         return rcode;
@@ -388,7 +388,7 @@ static int SSLize_Socket(SOCKET socketHn
     rcode = WSAIoctl(socketHnd, SO_TLS_SET_FLAGS, &ulFlag, sizeof(unsigned long), NULL, 0, NULL, NULL, NULL);
     if(rcode)
     {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02126)
                      "Error: %d with WSAIoctl(SO_TLS_SET_FLAGS, SO_TLS_ENABLE)", WSAGetLastError());
         goto ERR;
     }
@@ -399,7 +399,7 @@ static int SSLize_Socket(SOCKET socketHn
 
     if(rcode)
     {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02127)
                      "Error: %d with WSAIoctl(SO_TLS_SET_FLAGS, SO_TLS_SERVER)", WSAGetLastError());
         goto ERR;
     }
@@ -437,7 +437,7 @@ static int SSLize_Socket(SOCKET socketHn
                      NULL,
                      NULL);
     if(SOCKET_ERROR == rcode) {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02128)
                      "Error: %d with WSAIoctl(SO_TLS_SET_SERVER)", WSAGetLastError());
         goto ERR;
     }
@@ -785,7 +785,7 @@ static int nwssl_post_config(apr_pool_t 
                 lr->sd = sd;
                 if ((status = apr_sockaddr_info_get(&lr->bind_addr, sl->addr, APR_UNSPEC, sl->port, 0,
                                               s->process->pool)) != APR_SUCCESS) {
-                    ap_log_perror(APLOG_MARK, APLOG_CRIT, status, pconf,
+                    ap_log_perror(APLOG_MARK, APLOG_CRIT, status, pconf, APLOGNO(02129)
                                  "alloc_listener: failed to set up sockaddr for %s:%d", sl->addr, sl->port);
                     return HTTP_INTERNAL_SERVER_ERROR;
                 }
@@ -808,7 +808,7 @@ static int nwssl_post_config(apr_pool_t 
             }
         }
         if (!found) {
-            ap_log_perror(APLOG_MARK, APLOG_WARNING, 0, plog,
+            ap_log_perror(APLOG_MARK, APLOG_WARNING, 0, plog, APLOGNO(02130)
                          "No Listen directive found for upgradeable listener %s:%d", slu->addr, slu->port);
         }
     }
@@ -1167,7 +1167,7 @@ static apr_status_t ssl_io_filter_Upgrad
         csd = csd_data->csd;
     }
     else {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02131)
                      "Unable to get upgradeable socket handle");
         return ap_pass_brigade(f->next, bb);
     }
@@ -1184,7 +1184,7 @@ static apr_status_t ssl_io_filter_Upgrad
 
     rv = ap_pass_brigade(f->next, upgradebb);
     if (rv) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, APLOGNO(02132)
                       "could not send interim 101 Upgrade response");
         return AP_FILTER_ERROR;
     }
@@ -1202,12 +1202,12 @@ static apr_status_t ssl_io_filter_Upgrad
         }
     }
     else {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02133)
                      "Upgradeable socket handle not found");
         return AP_FILTER_ERROR;
     }
 
-    ap_log_error(APLOG_MARK, APLOG_INFO, 0, r->server,
+    ap_log_error(APLOG_MARK, APLOG_INFO, 0, r->server, APLOGNO(02134)
                  "Awaiting re-negotiation handshake");
 
     /* Now that we have initialized the ssl connection which added the ssl_io_filter,

Modified: httpd/httpd/trunk/modules/arch/unix/mod_privileges.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/unix/mod_privileges.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/unix/mod_privileges.c (original)
+++ httpd/httpd/trunk/modules/arch/unix/mod_privileges.c Fri Dec  2 23:02:04 2011
@@ -150,22 +150,22 @@ static apr_status_t privileges_end_req(v
     /* if either user or group are not the default, restore them */
     if (cfg->uid || cfg->gid) {
         if (setppriv(PRIV_ON, PRIV_EFFECTIVE, priv_setid) == -1) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02136)
                           "PRIV_ON failed restoring default user/group");
         }
         if (cfg->uid && (setuid(ap_unixd_config.user_id) == -1)) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02137)
                           "Error restoring default userid");
         }
         if (cfg->gid && (setgid(ap_unixd_config.group_id) == -1)) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02138)
                           "Error restoring default group");
         }
     }
 
     /* restore default privileges */
     if (setppriv(PRIV_SET, PRIV_EFFECTIVE, priv_default) == -1) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r, APLOGNO(02139)
                       "Error restoring default privileges");
     }
     return APR_SUCCESS;
@@ -216,14 +216,14 @@ static int privileges_req(request_rec *r
        rv = apr_proc_fork(&proc, r->pool);
         switch (rv) {
         case APR_INPARENT:
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02140)
                           "parent waiting for child");
             /* FIXME - does the child need to run synchronously?
              * esp. if we enable mod_privileges with threaded MPMs?
              * We do need at least to ensure r outlives the child.
              */
             rv = apr_proc_wait(&proc, &exitcode, &exitwhy, APR_WAIT);
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "parent: child %s",
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02141) "parent: child %s",
                           (rv == APR_CHILD_DONE) ? "done" : "notdone");
 
             /* The child has taken responsibility for reading all input
@@ -239,10 +239,10 @@ static int privileges_req(request_rec *r
              */
             return DONE;
         case APR_INCHILD:
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "In child!");
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02142) "In child!");
             break;  /* now we'll drop privileges in the child */
         default:
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02143)
                           "Failed to fork secure child process!");
             return HTTP_INTERNAL_SERVER_ERROR;
         }
@@ -256,38 +256,38 @@ static int privileges_req(request_rec *r
     /* set user and group if configured */
     if (cfg->uid || cfg->gid) {
         if (setppriv(PRIV_ON, PRIV_EFFECTIVE, priv_setid) == -1) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02144)
                           "No privilege to set user/group");
         }
         /* if we should be able to set these but can't, it could be
          * a serious security issue.  Bail out rather than risk it!
          */
         if (cfg->uid && (setuid(cfg->uid) == -1)) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02145)
                           "Error setting userid");
             return HTTP_INTERNAL_SERVER_ERROR;
         }
         if (cfg->gid && (setgid(cfg->gid) == -1)) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02146)
                           "Error setting group");
             return HTTP_INTERNAL_SERVER_ERROR;
         }
     }
     /* set vhost's privileges */
     if (setppriv(PRIV_SET, PRIV_EFFECTIVE, cfg->priv) == -1) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r, APLOGNO(02147)
                       "Error setting effective privileges");
         return HTTP_INTERNAL_SERVER_ERROR;
     }
 
     /* ... including those of any subprocesses */
     if (setppriv(PRIV_SET, PRIV_INHERITABLE, cfg->child_priv) == -1) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r, APLOGNO(02148)
                       "Error setting inheritable privileges");
         return HTTP_INTERNAL_SERVER_ERROR;
     }
     if (setppriv(PRIV_SET, PRIV_LIMIT, cfg->child_priv) == -1) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r, APLOGNO(02149)
                       "Error setting limit privileges");
         return HTTP_INTERNAL_SERVER_ERROR;
     }
@@ -295,7 +295,7 @@ static int privileges_req(request_rec *r
     /* If we're in a child process, drop down PPERM too */
     if (fork_req) {
         if (setppriv(PRIV_SET, PRIV_PERMITTED, cfg->priv) == -1) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, errno, r, APLOGNO(02150)
                           "Error setting permitted privileges");
             return HTTP_INTERNAL_SERVER_ERROR;
         }
@@ -304,7 +304,7 @@ static int privileges_req(request_rec *r
     return OK;
 }
 #define PDROP_CHECK(x) if (x == -1) { \
-        ap_log_error(APLOG_MARK, APLOG_CRIT, errno, s, \
+        ap_log_error(APLOG_MARK, APLOG_CRIT, errno, s, APLOGNO(02151) \
                      "Error dropping privileges"); \
         return !OK; \
     }
@@ -380,7 +380,7 @@ static int privileges_postconf(apr_pool_
                               apr_pool_cleanup_null);
     priv_emptyset(priv_setid);
     if (priv_addset(priv_setid, PRIV_PROC_SETID) == -1) {
-        ap_log_perror(APLOG_MARK, APLOG_CRIT, errno, ptemp,
+        ap_log_perror(APLOG_MARK, APLOG_CRIT, errno, ptemp, APLOGNO(02152)
                       "priv_addset");
         return !OK;
     }
@@ -393,13 +393,13 @@ static int privileges_init(apr_pool_t *p
     int threaded;
     int rv = ap_mpm_query(AP_MPMQ_IS_THREADED, &threaded);
     if (rv != APR_SUCCESS) {
-        ap_log_perror(APLOG_MARK, APLOG_NOTICE, rv, ptemp,
+        ap_log_perror(APLOG_MARK, APLOG_NOTICE, rv, ptemp, APLOGNO(02153)
                       "mod_privileges: unable to determine MPM characteristics."
                       "  Please ensure you are using a non-threaded MPM "
                       "with this module.");
     }
     if (threaded) {
-        ap_log_perror(APLOG_MARK, APLOG_CRIT, rv, ptemp,
+        ap_log_perror(APLOG_MARK, APLOG_CRIT, rv, ptemp, APLOGNO(02154)
                       "mod_privileges is not compatible with a threaded MPM.");
         return !OK;
     }

Modified: httpd/httpd/trunk/modules/arch/unix/mod_unixd.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/unix/mod_unixd.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/unix/mod_unixd.c (original)
+++ httpd/httpd/trunk/modules/arch/unix/mod_unixd.c Fri Dec  2 23:02:04 2011
@@ -96,7 +96,7 @@ static int set_group_privs(void)
             uid_t uid = atol(&ap_unixd_config.user_name[1]);
 
             if ((ent = getpwuid(uid)) == NULL) {
-                ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+                ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02155)
                          "getpwuid: couldn't determine user name from uid %ld, "
                          "you probably need to modify the User directive",
                          (long)uid);
@@ -115,7 +115,7 @@ static int set_group_privs(void)
          * setgid() is known to zap the group list.
          */
         if (setgid(ap_unixd_config.group_id) == -1) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02156)
                         "setgid: unable to set group id to Group %ld",
                         (long)ap_unixd_config.group_id);
             return -1;
@@ -124,7 +124,7 @@ static int set_group_privs(void)
         /* Reset `groups' attributes. */
 
         if (initgroups(name, ap_unixd_config.group_id) == -1) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02157)
                         "initgroups: unable to set groups for User %s "
                         "and Group %ld", name, (long)ap_unixd_config.group_id);
             return -1;
@@ -147,28 +147,28 @@ unixd_drop_privileges(apr_pool_t *pool, 
     if (NULL != ap_unixd_config.chroot_dir) {
         if (geteuid()) {
             rv = errno;
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02158)
                          "Cannot chroot when not started as root");
             return rv;
         }
 
         if (chdir(ap_unixd_config.chroot_dir) != 0) {
             rv = errno;
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02159)
                          "Can't chdir to %s", ap_unixd_config.chroot_dir);
             return rv;
         }
 
         if (chroot(ap_unixd_config.chroot_dir) != 0) {
             rv = errno;
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02160)
                          "Can't chroot to %s", ap_unixd_config.chroot_dir);
             return rv;
         }
 
         if (chdir("/") != 0) {
             rv = errno;
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02161)
                          "Can't chdir to new root");
             return rv;
         }
@@ -181,7 +181,7 @@ unixd_drop_privileges(apr_pool_t *pool, 
 #endif
         setuid(ap_unixd_config.user_id) == -1)) {
         rv = errno;
-        ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+        ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02162)
                     "setuid: unable to change to uid: %ld",
                     (long) ap_unixd_config.user_id);
         return rv;
@@ -191,7 +191,7 @@ unixd_drop_privileges(apr_pool_t *pool, 
     if (ap_coredumpdir_configured) {
         if (prctl(PR_SET_DUMPABLE, 1)) {
             rv = errno;
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02163)
                          "set dumpable failed - this child will not coredump"
                          " after software errors");
             return rv;
@@ -327,22 +327,22 @@ AP_DECLARE(int) ap_unixd_setup_child(voi
 
     if (NULL != ap_unixd_config.chroot_dir) {
         if (geteuid()) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02164)
                          "Cannot chroot when not started as root");
             return -1;
         }
         if (chdir(ap_unixd_config.chroot_dir) != 0) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02165)
                          "Can't chdir to %s", ap_unixd_config.chroot_dir);
             return -1;
         }
         if (chroot(ap_unixd_config.chroot_dir) != 0) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02166)
                          "Can't chroot to %s", ap_unixd_config.chroot_dir);
             return -1;
         }
         if (chdir("/") != 0) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02167)
                          "Can't chdir to new root");
             return -1;
         }
@@ -354,7 +354,7 @@ AP_DECLARE(int) ap_unixd_setup_child(voi
         os_init_job_environment(NULL, ap_unixd_config.user_name, ap_exists_config_define("DEBUG")) != 0 ||
 #endif
         setuid(ap_unixd_config.user_id) == -1)) {
-        ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+        ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02168)
                     "setuid: unable to change to uid: %ld",
                     (long) ap_unixd_config.user_id);
         return -1;
@@ -363,7 +363,7 @@ AP_DECLARE(int) ap_unixd_setup_child(voi
     /* this applies to Linux 2.4+ */
     if (ap_coredumpdir_configured) {
         if (prctl(PR_SET_DUMPABLE, 1)) {
-            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL,
+            ap_log_error(APLOG_MARK, APLOG_ALERT, errno, NULL, APLOGNO(02169)
                          "set dumpable failed - this child will not coredump"
                          " after software errors");
         }

Modified: httpd/httpd/trunk/modules/arch/win32/mod_isapi.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/win32/mod_isapi.c (original)
+++ httpd/httpd/trunk/modules/arch/win32/mod_isapi.c Fri Dec  2 23:02:04 2011
@@ -136,18 +136,18 @@ static const char *isapi_cmd_cachefile(c
      */
     fspec = ap_server_root_relative(cmd->pool, filename);
     if (!fspec) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server, APLOGNO(02103)
                      "invalid module path, skipping %s", filename);
         return NULL;
     }
     if ((rv = apr_stat(&tmp, fspec, APR_FINFO_TYPE,
                       cmd->temp_pool)) != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server, APLOGNO(02104)
                      "unable to stat, skipping %s", fspec);
         return NULL;
     }
     if (tmp.filetype != APR_REG) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server, APLOGNO(02105)
                      "not a regular file, skipping %s", fspec);
         return NULL;
     }
@@ -155,7 +155,7 @@ static const char *isapi_cmd_cachefile(c
     /* Load the extention as cached (with null request_rec) */
     rv = isapi_lookup(cmd->pool, cmd->server, NULL, fspec, &isa);
     if (rv != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server, APLOGNO(02106)
                      "unable to cache, skipping %s", fspec);
         return NULL;
     }
@@ -271,7 +271,7 @@ static apr_status_t isapi_load(apr_pool_
     rv = apr_dso_load(&isa->handle, isa->filename, p);
     if (rv)
     {
-        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
+        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, APLOGNO(02107)
                      "failed to load %s", isa->filename);
         isa->handle = NULL;
         return rv;
@@ -281,7 +281,7 @@ static apr_status_t isapi_load(apr_pool_
                      "GetExtensionVersion");
     if (rv)
     {
-        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
+        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, APLOGNO(02108)
                      "missing GetExtensionVersion() in %s",
                      isa->filename);
         apr_dso_unload(isa->handle);
@@ -293,7 +293,7 @@ static apr_status_t isapi_load(apr_pool_
                      "HttpExtensionProc");
     if (rv)
     {
-        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
+        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, APLOGNO(02109)
                      "missing HttpExtensionProc() in %s",
                      isa->filename);
         apr_dso_unload(isa->handle);
@@ -309,7 +309,7 @@ static apr_status_t isapi_load(apr_pool_
     /* Run GetExtensionVersion() */
     if (!(isa->GetExtensionVersion)(isa->isapi_version)) {
         apr_status_t rv = apr_get_os_error();
-        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
+        ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, APLOGNO(02110)
                      "failed call to GetExtensionVersion() in %s",
                      isa->filename);
         apr_dso_unload(isa->handle);
@@ -771,7 +771,7 @@ static apr_ssize_t send_response_header(
         cid->r->status = HTTP_OK;
         cid->r->status_line = ap_get_status_line(cid->r->status);
         cid->ecb->dwHttpStatusCode = cid->r->status;
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, cid->r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, cid->r, APLOGNO(02111)
                 "Could not determine HTTP response code; using %d",
                 cid->r->status);
     }
@@ -1572,7 +1572,7 @@ static apr_status_t isapi_handler (reque
         }
 
         if (!cid->completed || (rv != APR_SUCCESS)) {
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, APLOGNO(02112)
                           "Failed to create completion mutex");
             return HTTP_INTERNAL_SERVER_ERROR;
         }
@@ -1583,7 +1583,7 @@ static apr_status_t isapi_handler (reque
 
     /* Check for a log message - and log it */
     if (cid->ecb->lpszLogData && *cid->ecb->lpszLogData)
-        ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(02113)
                       "%s: %s", r->filename, cid->ecb->lpszLogData);
 
     switch(rv) {
@@ -1614,7 +1614,7 @@ static apr_status_t isapi_handler (reque
                 break;
             }
             else if (cid->dconf.log_unsupported) {
-                 ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
+                 ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, APLOGNO(02114)
                                "asynch I/O result HSE_STATUS_PENDING "
                                "from HttpExtensionProc() is not supported: %s",
                                r->filename);
@@ -1625,14 +1625,14 @@ static apr_status_t isapi_handler (reque
         case HSE_STATUS_ERROR:
             /* end response if we have yet to do so.
              */
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r, APLOGNO(02115)
                           "HSE_STATUS_ERROR result from "
                           "HttpExtensionProc(): %s", r->filename);
             r->status = HTTP_INTERNAL_SERVER_ERROR;
             break;
 
         default:
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r, APLOGNO(02116)
                           "unrecognized result code %d "
                           "from HttpExtensionProc(): %s ",
                           rv, r->filename);
@@ -1654,7 +1654,7 @@ static apr_status_t isapi_handler (reque
         cid->response_sent = 1;
 
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r, APLOGNO(02117)
                           "ap_pass_brigade failed to "
                           "complete the response: %s ", r->filename);
         }
@@ -1687,14 +1687,14 @@ static int isapi_pre_config(apr_pool_t *
 
     apr_pool_create_ex(&loaded.pool, pconf, NULL, NULL);
     if (!loaded.pool) {
-        ap_log_error(APLOG_MARK, APLOG_ERR, APR_EGENERAL, NULL,
+        ap_log_error(APLOG_MARK, APLOG_ERR, APR_EGENERAL, NULL, APLOGNO(02118)
                      "could not create the isapi cache pool");
         return APR_EGENERAL;
     }
 
     loaded.hash = apr_hash_make(loaded.pool);
     if (!loaded.hash) {
-        ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
+        ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL, APLOGNO(02119)
                      "Failed to create module cache");
         return APR_EGENERAL;
     }

Modified: httpd/httpd/trunk/modules/arch/win32/mod_win32.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_win32.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/arch/win32/mod_win32.c (original)
+++ httpd/httpd/trunk/modules/arch/win32/mod_win32.c Fri Dec  2 23:02:04 2011
@@ -439,12 +439,12 @@ static apr_status_t ap_cgi_build_command
          */
         if ((rv = apr_file_open(&fh, *cmd, APR_READ | APR_BUFFERED,
                                  APR_OS_DEFAULT, r->pool)) != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, APLOGNO(02100)
                           "Failed to open cgi file %s for testing", *cmd);
             return rv;
         }
         if ((rv = apr_file_read(fh, buffer, &bytes)) != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, APLOGNO(02101)
                           "Failed to read cgi file %s for testing", *cmd);
             return rv;
         }
@@ -505,7 +505,7 @@ static apr_status_t ap_cgi_build_command
         }
     }
     if (!interpreter) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02102)
                       "%s is not executable; ensure interpreted scripts have "
                       "\"#!\" or \"'!\" first line", *cmd);
         return APR_EBADF;

Modified: httpd/httpd/trunk/modules/cache/cache_storage.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/cache/cache_storage.c (original)
+++ httpd/httpd/trunk/modules/cache/cache_storage.c Fri Dec  2 23:02:04 2011
@@ -46,7 +46,7 @@ int cache_remove_url(cache_request_rec *
     if (!h) {
        return OK;
     }
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00691)
                  "cache: Removing url %s from the cache", h->cache_obj->key);
 
     /* for each specified cache type, delete the URL */
@@ -78,7 +78,7 @@ int cache_create_entity(cache_request_re
 
     if (!cache) {
         /* This should never happen */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r, APLOGNO(00692)
                 "cache: No cache request information available for key"
                 " generation");
         return APR_EGENERAL;
@@ -203,7 +203,7 @@ int cache_select(cache_request_rec *cach
 
     if (!cache) {
         /* This should never happen */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r, APLOGNO(00693)
                 "cache: No cache request information available for key"
                 " generation");
         return DECLINED;
@@ -283,7 +283,7 @@ int cache_select(cache_request_rec *cach
                 else {
                     /* headers do not match, so Vary failed */
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                            r, "cache_select_url(): Vary header mismatch.");
+                            r, APLOGNO(00694) "cache_select_url(): Vary header mismatch.");
                     mismatch = 1;
                 }
             }
@@ -317,7 +317,7 @@ int cache_select(cache_request_rec *cach
                         r->headers_in);
                 cache->stale_handle = h;
 
-                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00695)
                         "Cached response for %s isn't fresh.  Adding/replacing "
                         "conditional request headers.", r->uri);
 
@@ -380,7 +380,7 @@ int cache_select(cache_request_rec *cach
 
     /* if Cache-Control: only-if-cached, and not cached, return 504 */
     if (cache->control_in.only_if_cached) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00696)
                 "cache: 'only-if-cached' requested and no cached entity, "
                 "returning 504 Gateway Timeout for: %s", r->uri);
         return HTTP_GATEWAY_TIME_OUT;
@@ -406,7 +406,7 @@ int cache_invalidate(cache_request_rec *
 
     if (!cache) {
         /* This should never happen */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, r, APLOGNO(00697)
                 "cache: No cache request information available for key"
                 " generation");
         return DECLINED;
@@ -668,7 +668,7 @@ apr_status_t cache_generate_key_default(
      * resource in the cache under a key where it is never found by the quick
      * handler during following requests.
      */
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00698)
             "cache: Key for entity %s?%s is %s", r->uri,
             r->parsed_uri.query, *key);
 

Modified: httpd/httpd/trunk/modules/cache/cache_util.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_util.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/cache/cache_util.c (original)
+++ httpd/httpd/trunk/modules/cache/cache_util.c Fri Dec  2 23:02:04 2011
@@ -301,7 +301,7 @@ apr_status_t cache_try_lock(cache_server
     path = apr_pstrcat(r->pool, conf->lockpath, dir, NULL);
     if (APR_SUCCESS != (status = apr_dir_make_recursive(path,
             APR_UREAD|APR_UWRITE|APR_UEXECUTE, r->pool))) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, APLOGNO(00778)
                 "Could not create a cache lock directory: %s",
                 path);
         return status;
@@ -313,14 +313,14 @@ apr_status_t cache_try_lock(cache_server
     status = apr_stat(&finfo, lockname,
                 APR_FINFO_MTIME | APR_FINFO_NLINK, r->pool);
     if (!(APR_STATUS_IS_ENOENT(status)) && APR_SUCCESS != status) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EEXIST, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_EEXIST, r, APLOGNO(00779)
                 "Could not stat a cache lock file: %s",
                 lockname);
         return status;
     }
     if ((status == APR_SUCCESS) && (((now - finfo.mtime) > conf->lockmaxage)
                                   || (now < finfo.mtime))) {
-        ap_log_rerror(APLOG_MARK, APLOG_INFO, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_INFO, status, r, APLOGNO(00780)
                 "Cache lock file for '%s' too old, removing: %s",
                 r->uri, lockname);
         apr_file_remove(lockname, r->pool);
@@ -530,7 +530,7 @@ int cache_check_freshness(cache_handle_t
             return 0;
         }
 
-        ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00781)
                 "Incoming request is asking for a uncached version of "
                 "%s, but we have been configured to ignore it and "
                 "serve a cached response anyway",
@@ -703,7 +703,7 @@ int cache_check_freshness(cache_handle_t
     status = cache_try_lock(conf, cache, r);
     if (APR_SUCCESS == status) {
         /* we obtained a lock, follow the stale path */
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00782)
                 "Cache lock obtained for stale cached URL, "
                 "revalidating entry: %s",
                 r->unparsed_uri);
@@ -711,7 +711,7 @@ int cache_check_freshness(cache_handle_t
     }
     else if (APR_EEXIST == status) {
         /* lock already exists, return stale data anyway, with a warning */
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00783)
                 "Cache already locked for stale cached URL, "
                 "pretend it is fresh: %s",
                 r->unparsed_uri);
@@ -728,7 +728,7 @@ int cache_check_freshness(cache_handle_t
     }
     else {
         /* some other error occurred, just treat the object as stale */
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, status, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, status, r, APLOGNO(00784)
                 "Attempt to obtain a cache lock for stale "
                 "cached URL failed, revalidating entry anyway: %s",
                 r->unparsed_uri);

Modified: httpd/httpd/trunk/modules/cache/mod_cache.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/mod_cache.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/cache/mod_cache.c (original)
+++ httpd/httpd/trunk/modules/cache/mod_cache.c Fri Dec  2 23:02:04 2011
@@ -117,7 +117,7 @@ static int cache_quick_handler(request_r
      */
     if (r->method_number != M_GET) {
 
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00748)
                 "Invalidating all cached entities in response to '%s' request for %s",
                 r->method, r->uri);
 
@@ -163,7 +163,7 @@ static int cache_quick_handler(request_r
                      */
                     if (r->main) {
                         ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                                r, "Adding CACHE_SAVE_SUBREQ filter for %s",
+                                r, APLOGNO(00749) "Adding CACHE_SAVE_SUBREQ filter for %s",
                                 r->uri);
                         cache->save_filter = ap_add_output_filter_handle(
                                 cache_save_subreq_filter_handle, cache, r,
@@ -171,7 +171,7 @@ static int cache_quick_handler(request_r
                     }
                     else {
                         ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                                r, "Adding CACHE_SAVE filter for %s",
+                                r, APLOGNO(00750) "Adding CACHE_SAVE filter for %s",
                                 r->uri);
                         cache->save_filter = ap_add_output_filter_handle(
                                 cache_save_filter_handle, cache, r,
@@ -180,7 +180,7 @@ static int cache_quick_handler(request_r
 
                     apr_pool_userdata_setn(cache, CACHE_CTX_KEY, NULL, r->pool);
 
-                    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+                    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00751)
                             "Adding CACHE_REMOVE_URL filter for %s",
                             r->uri);
 
@@ -197,14 +197,14 @@ static int cache_quick_handler(request_r
                 }
                 else {
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv,
-                            r, "Cache locked for url, not caching "
+                            r, APLOGNO(00752) "Cache locked for url, not caching "
                             "response: %s", r->uri);
                 }
             }
             else {
                 if (cache->stale_headers) {
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                            r, "Restoring request headers for %s",
+                            r, APLOGNO(00753) "Restoring request headers for %s",
                             r->uri);
 
                     r->headers_in = cache->stale_headers;
@@ -226,7 +226,7 @@ static int cache_quick_handler(request_r
      * the headers. */
     if (lookup) {
         if (cache->stale_headers) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00754)
                     "Restoring request headers.");
             r->headers_in = cache->stale_headers;
         }
@@ -390,7 +390,7 @@ static int cache_handler(request_rec *r)
      */
     if (r->method_number != M_GET) {
 
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00755)
                 "Invalidating all cached entities in response to '%s' request for %s",
                 r->method, r->uri);
 
@@ -436,13 +436,13 @@ static int cache_handler(request_rec *r)
                  */
                 if (r->main) {
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                            r, "Adding CACHE_SAVE_SUBREQ filter for %s",
+                            r, APLOGNO(00756) "Adding CACHE_SAVE_SUBREQ filter for %s",
                             r->uri);
                     cache_save_handle = cache_save_subreq_filter_handle;
                 }
                 else {
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                            r, "Adding CACHE_SAVE filter for %s",
+                            r, APLOGNO(00757) "Adding CACHE_SAVE filter for %s",
                             r->uri);
                     cache_save_handle = cache_save_filter_handle;
                 }
@@ -465,7 +465,7 @@ static int cache_handler(request_rec *r)
                         cache_filter_handle, cache_save_handle,
                         ap_get_input_filter_handle("SUBREQ_CORE"))) {
                     ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                            r, "Replacing CACHE with CACHE_SAVE "
+                            r, APLOGNO(00758) "Replacing CACHE with CACHE_SAVE "
                             "filter for %s", r->uri);
                 }
 
@@ -475,7 +475,7 @@ static int cache_handler(request_rec *r)
 
                 apr_pool_userdata_setn(cache, CACHE_CTX_KEY, NULL, r->pool);
 
-                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00759)
                         "Adding CACHE_REMOVE_URL filter for %s",
                         r->uri);
 
@@ -493,7 +493,7 @@ static int cache_handler(request_rec *r)
             }
             else {
                 ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv,
-                        r, "Cache locked for url, not caching "
+                        r, APLOGNO(00760) "Cache locked for url, not caching "
                         "response: %s", r->uri);
             }
         }
@@ -541,7 +541,7 @@ static int cache_handler(request_rec *r)
     if (cache_replace_filter(r->output_filters, cache_filter_handle,
             cache_out_handle, ap_get_input_filter_handle("SUBREQ_CORE"))) {
         ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS,
-                r, "Replacing CACHE with CACHE_OUT filter for %s",
+                r, APLOGNO(00761) "Replacing CACHE with CACHE_OUT filter for %s",
                 r->uri);
     }
 
@@ -586,13 +586,13 @@ static int cache_out_filter(ap_filter_t 
     if (!cache) {
         /* user likely configured CACHE_OUT manually; they should use mod_cache
          * configuration to do that */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00762)
                 "CACHE/CACHE_OUT filter enabled while caching is disabled, ignoring");
         ap_remove_output_filter(f);
         return ap_pass_brigade(f->next, in);
     }
 
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00763)
             "cache: running CACHE_OUT filter");
 
     /* clean out any previous response up to EOS, if any */
@@ -614,7 +614,7 @@ static int cache_out_filter(ap_filter_t 
             /* This filter is done once it has served up its content */
             ap_remove_output_filter(f);
 
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00764)
                     "cache: serving %s", r->uri);
             return ap_pass_brigade(f->next, in);
 
@@ -649,7 +649,7 @@ static int cache_save_store(ap_filter_t 
 
         rv = cache->provider->store_body(cache->handle, f->r, in, cache->out);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, f->r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, f->r, APLOGNO(00765)
                     "cache: Cache provider's store_body failed!");
             ap_remove_output_filter(f);
 
@@ -687,7 +687,7 @@ static int cache_save_store(ap_filter_t 
                 /* oops, no data out, but not all data read in either, be
                  * safe and stand down to prevent a spin.
                  */
-                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, f->r,
+                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, f->r, APLOGNO(00766)
                         "cache: Cache provider's store_body returned an "
                         "empty brigade, but didn't consume all of the"
                         "input brigade, standing down to prevent a spin");
@@ -752,7 +752,7 @@ static int cache_save_filter(ap_filter_t
         /* user likely configured CACHE_SAVE manually; they should really use
          * mod_cache configuration to do that
          */
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00767)
                 "CACHE/CACHE_SAVE filter enabled while caching is disabled, ignoring");
         ap_remove_output_filter(f);
         return ap_pass_brigade(f->next, in);
@@ -1101,7 +1101,7 @@ static int cache_save_filter(ap_filter_t
     }
 
     if (reason) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00768)
                 "cache: %s not cached. Reason: %s", r->unparsed_uri,
                 reason);
 
@@ -1220,13 +1220,13 @@ static int cache_save_filter(ap_filter_t
         return ap_pass_brigade(f->next, in);
     }
 
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00769)
             "cache: Caching url: %s", r->unparsed_uri);
 
     /* We are actually caching this response. So it does not
      * make sense to remove this entity any more.
      */
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00770)
             "cache: Removing CACHE_REMOVE_URL filter.");
     ap_remove_output_filter(cache->remove_url_filter);
 
@@ -1273,7 +1273,7 @@ static int cache_save_filter(ap_filter_t
         /* if it's in the future, then replace by date */
         lastmod = date;
         ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0,
-                r, "cache: Last modified is in the future, "
+                r, APLOGNO(00771) "cache: Last modified is in the future, "
                 "replacing with now");
     }
 
@@ -1404,7 +1404,7 @@ static int cache_save_filter(ap_filter_t
          * the body it is safe to try and remove the url from the cache.
          */
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r, APLOGNO(00772)
                     "cache: updating headers with store_headers failed. "
                     "Removing cached url.");
 
@@ -1413,7 +1413,7 @@ static int cache_save_filter(ap_filter_t
                 /* Probably a mod_cache_disk cache area has been (re)mounted
                  * read-only, or that there is a permissions problem.
                  */
-                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
+                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r, APLOGNO(00773)
                         "cache: attempt to remove url from cache unsuccessful.");
             }
 
@@ -1439,7 +1439,7 @@ static int cache_save_filter(ap_filter_t
     }
 
     if (rv != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r, APLOGNO(00774)
                 "cache: store_headers failed");
 
         /* we've got a cache miss! tell anyone who cares */
@@ -1493,7 +1493,7 @@ static int cache_remove_url_filter(ap_fi
          * 1. Remove ourselves
          * 2. Do nothing and bail out
          */
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00775)
                 "cache: CACHE_REMOVE_URL enabled unexpectedly");
         ap_remove_output_filter(f);
         return ap_pass_brigade(f->next, in);
@@ -1534,13 +1534,13 @@ static int cache_filter(ap_filter_t *f, 
 
     /* was the quick handler enabled */
     if (conf->quick) {
-        ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, f->r,
+        ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, f->r, APLOGNO(00776)
                 "cache: CACHE filter was added in quick handler mode and "
                 "will be ignored: %s", f->r->unparsed_uri);
     }
     /* otherwise we may have been bypassed, nothing to see here */
     else {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, f->r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, f->r, APLOGNO(00777)
                 "cache: CACHE filter was added twice, or was added where "
                 "the cache has been bypassed and will be ignored: %s",
                 f->r->unparsed_uri);

Modified: httpd/httpd/trunk/modules/cache/mod_cache_disk.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/mod_cache_disk.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/cache/mod_cache_disk.c (original)
+++ httpd/httpd/trunk/modules/cache/mod_cache_disk.c Fri Dec  2 23:02:04 2011
@@ -173,7 +173,7 @@ static apr_status_t file_cache_el_final(
 
         rv = safe_file_rename(conf, file->tempfile, file->file, file->pool);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00699)
                     "rename tempfile to file failed:"
                     " %s -> %s", file->tempfile, file->file);
             apr_file_remove(file->tempfile, file->pool);
@@ -350,7 +350,7 @@ static int create_entity(cache_handle_t 
 
     /* we don't support caching of range requests (yet) */
     if (r->status == HTTP_PARTIAL_CONTENT) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00700)
                 "URL %s partial content response not cached",
                 key);
         return DECLINED;
@@ -358,14 +358,14 @@ static int create_entity(cache_handle_t 
 
     /* Note, len is -1 if unknown so don't trust it too hard */
     if (len > dconf->maxfs) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00701)
                 "URL %s failed the size check "
                 "(%" APR_OFF_T_FMT " > %" APR_OFF_T_FMT ")",
                 key, len, dconf->maxfs);
         return DECLINED;
     }
     if (len >= 0 && len < dconf->minfs) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00702)
                 "URL %s failed the size check "
                 "(%" APR_OFF_T_FMT " < %" APR_OFF_T_FMT ")",
                 key, len, dconf->minfs);
@@ -424,7 +424,7 @@ static int open_entity(cache_handle_t *h
     if (conf->cache_root == NULL) {
         if (!error_logged) {
             error_logged = 1;
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00703)
                     "Cannot cache files to disk without a CacheRoot specified.");
         }
         return DECLINED;
@@ -464,7 +464,7 @@ static int open_entity(cache_handle_t *h
         varray = apr_array_make(r->pool, 5, sizeof(char*));
         rc = read_array(r, varray, dobj->vary.fd);
         if (rc != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r, APLOGNO(00704)
                     "Cannot parse vary header file: %s",
                     dobj->vary.file);
             apr_file_close(dobj->vary.fd);
@@ -485,7 +485,7 @@ static int open_entity(cache_handle_t *h
         }
     }
     else if (format != DISK_FORMAT_VERSION) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00705)
                 "File '%s' has a version mismatch. File had version: %d.",
                 dobj->vary.file, format);
         apr_file_close(dobj->vary.fd);
@@ -521,7 +521,7 @@ static int open_entity(cache_handle_t *h
     /* Read the bytes to setup the cache_info fields */
     rc = file_cache_recall_mydata(dobj->hdrs.fd, info, dobj, r);
     if (rc != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r, APLOGNO(00706)
                 "Cannot read header file %s", dobj->hdrs.file);
         apr_file_close(dobj->hdrs.fd);
         return DECLINED;
@@ -531,7 +531,7 @@ static int open_entity(cache_handle_t *h
 
     /* Is this a cached HEAD request? */
     if (dobj->disk_info.header_only && !r->header_only) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r, APLOGNO(00707)
                 "HEAD request cached, non-HEAD requested, ignoring: %s",
                 dobj->hdrs.file);
         return DECLINED;
@@ -549,7 +549,7 @@ static int open_entity(cache_handle_t *h
 #endif
         rc = apr_file_open(&dobj->data.fd, dobj->data.file, flags, 0, r->pool);
         if (rc != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r, APLOGNO(00708)
                     "Cannot open data file %s", dobj->data.file);
             apr_file_close(dobj->hdrs.fd);
             return DECLINED;
@@ -566,7 +566,7 @@ static int open_entity(cache_handle_t *h
                 dobj->disk_info.device == finfo.device) {
 
             /* Initialize the cache_handle callback functions */
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00709)
                     "Recalled cached URL info header %s", dobj->name);
 
             /* make the configuration stick */
@@ -587,7 +587,7 @@ static int open_entity(cache_handle_t *h
     }
 
     /* Oh dear, no luck matching header to the body */
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00710)
             "Cached URL info header '%s' didn't match body, ignoring this entry",
             dobj->name);
 
@@ -614,7 +614,7 @@ static int remove_url(cache_handle_t *h,
 
     /* Delete headers file */
     if (dobj->hdrs.file) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00711)
                 "Deleting %s from cache.", dobj->hdrs.file);
 
         rc = apr_file_remove(dobj->hdrs.file, r->pool);
@@ -622,7 +622,7 @@ static int remove_url(cache_handle_t *h,
             /* Will only result in an output if httpd is started with -e debug.
              * For reason see log_error_core for the case s == NULL.
              */
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r, APLOGNO(00712)
                     "Failed to delete headers file %s from cache.",
                     dobj->hdrs.file);
             return DECLINED;
@@ -631,7 +631,7 @@ static int remove_url(cache_handle_t *h,
 
     /* Delete data file */
     if (dobj->data.file) {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00713)
                 "Deleting %s from cache.", dobj->data.file);
 
         rc = apr_file_remove(dobj->data.file, r->pool);
@@ -639,7 +639,7 @@ static int remove_url(cache_handle_t *h,
             /* Will only result in an output if httpd is started with -e debug.
              * For reason see log_error_core for the case s == NULL.
              */
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r, APLOGNO(00714)
                     "Failed to delete data file %s from cache.",
                     dobj->data.file);
             return DECLINED;
@@ -671,7 +671,7 @@ static int remove_url(cache_handle_t *h,
              * we won't either delete or go above our cache root.
              */
             for (q = dir + dobj->root_len; *q ; ) {
-                 ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+                 ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00715)
                         "Deleting directory %s from cache", dir);
 
                  rc = apr_dir_remove(dir, r->pool);
@@ -697,7 +697,7 @@ static apr_status_t read_array(request_r
     while (1) {
         rv = apr_file_gets(w, MAX_STRING_LEN - 1, file);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00716)
                           "Premature end of vary array.");
             return rv;
         }
@@ -766,7 +766,7 @@ static apr_status_t read_table(cache_han
         /* ### What about APR_EOF? */
         rv = apr_file_gets(w, MAX_STRING_LEN - 1, file);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00717)
                           "Premature end of cache headers.");
             return rv;
         }
@@ -809,7 +809,7 @@ static apr_status_t read_table(cache_han
                     ++maybeASCII;
             }
             if (maybeASCII > maybeEBCDIC) {
-                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00718)
                         "CGI Interface Error: Script headers apparently ASCII: (CGI = %s)",
                         r->filename);
                 inbytes_left = outbytes_left = cp - w;
@@ -848,7 +848,7 @@ static apr_status_t recall_headers(cache
 
     /* This case should not happen... */
     if (!dobj->hdrs.fd) {
-        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00719)
                 "recalling headers; but no header fd for %s", dobj->name);
         return APR_NOTFOUND;
     }
@@ -862,7 +862,7 @@ static apr_status_t recall_headers(cache
 
     apr_file_close(dobj->hdrs.fd);
 
-    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00720)
             "Recalled headers for URL %s", dobj->name);
     return APR_SUCCESS;
 }
@@ -967,7 +967,7 @@ static apr_status_t write_headers(cache_
                                  dobj->vary.pool);
 
             if (rv != APR_SUCCESS) {
-                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00721)
                         "could not create vary file %s",
                         dobj->vary.tempfile);
                 return rv;
@@ -976,7 +976,7 @@ static apr_status_t write_headers(cache_
             amt = sizeof(format);
             rv = apr_file_write(dobj->vary.tempfd, &format, &amt);
             if (rv != APR_SUCCESS) {
-                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00722)
                         "could not write to vary file %s",
                         dobj->vary.tempfile);
                 apr_file_close(dobj->vary.tempfd);
@@ -988,7 +988,7 @@ static apr_status_t write_headers(cache_
             rv = apr_file_write(dobj->vary.tempfd, &h->cache_obj->info.expire,
                     &amt);
             if (rv != APR_SUCCESS) {
-                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00723)
                         "could not write to vary file %s",
                         dobj->vary.tempfile);
                 apr_file_close(dobj->vary.tempfd);
@@ -1003,7 +1003,7 @@ static apr_status_t write_headers(cache_
 
             rv = apr_file_close(dobj->vary.tempfd);
             if (rv != APR_SUCCESS) {
-                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+                ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00724)
                         "could not close vary file %s",
                         dobj->vary.tempfile);
                 apr_pool_destroy(dobj->vary.pool);
@@ -1024,7 +1024,7 @@ static apr_status_t write_headers(cache_
                          APR_BUFFERED | APR_EXCL, dobj->hdrs.pool);
 
     if (rv != APR_SUCCESS) {
-       ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+       ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00725)
                 "could not create header file %s",
                 dobj->hdrs.tempfile);
         return rv;
@@ -1053,7 +1053,7 @@ static apr_status_t write_headers(cache_
 
     rv = apr_file_writev(dobj->hdrs.tempfd, (const struct iovec *) &iov, 2, &amt);
     if (rv != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00726)
                 "could not write info to header file %s",
                 dobj->hdrs.tempfile);
         apr_file_close(dobj->hdrs.tempfd);
@@ -1064,7 +1064,7 @@ static apr_status_t write_headers(cache_
     if (dobj->headers_out) {
         rv = store_table(dobj->hdrs.tempfd, dobj->headers_out);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00727)
                     "could not write out-headers to header file %s",
                     dobj->hdrs.tempfile);
             apr_file_close(dobj->hdrs.tempfd);
@@ -1078,7 +1078,7 @@ static apr_status_t write_headers(cache_
     if (dobj->headers_in) {
         rv = store_table(dobj->hdrs.tempfd, dobj->headers_in);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+            ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00728)
                     "could not write in-headers to header file %s",
                     dobj->hdrs.tempfile);
             apr_file_close(dobj->hdrs.tempfd);
@@ -1089,7 +1089,7 @@ static apr_status_t write_headers(cache_
 
     rv = apr_file_close(dobj->hdrs.tempfd); /* flush and close */
     if (rv != APR_SUCCESS) {
-        ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
+        ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r, APLOGNO(00729)
                 "could not close header file %s",
                 dobj->hdrs.tempfile);
         apr_pool_destroy(dobj->hdrs.pool);
@@ -1160,7 +1160,7 @@ static apr_status_t store_body(cache_han
         APR_BUCKET_REMOVE(e);
         APR_BRIGADE_INSERT_TAIL(out, e);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00730)
                     "Error when reading bucket for URL %s",
                     h->cache_obj->key);
             /* Remove the intermediate cache file and return non-APR_SUCCESS */
@@ -1200,7 +1200,7 @@ static apr_status_t store_body(cache_han
         /* write to the cache, leave if we fail */
         rv = apr_file_write_full(dobj->data.tempfd, str, length, &written);
         if (rv != APR_SUCCESS) {
-            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00731)
                     "Error when writing cache file for URL %s",
                     h->cache_obj->key);
             /* Remove the intermediate cache file and return non-APR_SUCCESS */
@@ -1209,7 +1209,7 @@ static apr_status_t store_body(cache_han
         }
         dobj->file_size += written;
         if (dobj->file_size > dconf->maxfs) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00732)
                     "URL %s failed the size check "
                     "(%" APR_OFF_T_FMT ">%" APR_OFF_T_FMT ")",
                     h->cache_obj->key, dobj->file_size, dconf->maxfs);
@@ -1251,7 +1251,7 @@ static apr_status_t store_body(cache_han
         }
 
         if (r->connection->aborted || r->no_cache) {
-            ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00733)
                     "Discarding body for URL %s "
                     "because connection has been aborted.",
                     h->cache_obj->key);
@@ -1260,7 +1260,7 @@ static apr_status_t store_body(cache_han
             return APR_EGENERAL;
         }
         if (dobj->file_size < dconf->minfs) {
-            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00734)
                     "URL %s failed the size check "
                     "(%" APR_OFF_T_FMT "<%" APR_OFF_T_FMT ")",
                     h->cache_obj->key, dobj->file_size, dconf->minfs);
@@ -1271,7 +1271,7 @@ static apr_status_t store_body(cache_han
         if (cl_header) {
             apr_int64_t cl = apr_atoi64(cl_header);
             if ((errno == 0) && (dobj->file_size != cl)) {
-                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00735)
                         "URL %s didn't receive complete response, not caching",
                         h->cache_obj->key);
                 /* Remove the intermediate cache file and return non-APR_SUCCESS */
@@ -1310,12 +1310,12 @@ static apr_status_t commit_entity(cache_
     /* remove the cached items completely on any failure */
     if (APR_SUCCESS != rv) {
         remove_url(h, r);
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00736)
                 "commit_entity: URL '%s' not cached due to earlier disk error.",
                 dobj->name);
     }
     else {
-        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00737)
                 "commit_entity: Headers and body for URL %s cached.",
                 dobj->name);
     }

Modified: httpd/httpd/trunk/modules/cache/mod_file_cache.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/mod_file_cache.c?rev=1209766&r1=1209765&r2=1209766&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/cache/mod_file_cache.c (original)
+++ httpd/httpd/trunk/modules/cache/mod_file_cache.c Fri Dec  2 23:02:04 2011
@@ -133,24 +133,24 @@ static void cache_the_file(cmd_parms *cm
 
     fspec = ap_server_root_relative(cmd->pool, filename);
     if (!fspec) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server, APLOGNO(00794)
                      "invalid file path "
                      "%s, skipping", filename);
         return;
     }
     if ((rc = apr_stat(&tmp.finfo, fspec, APR_FINFO_MIN,
                                  cmd->temp_pool)) != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server, APLOGNO(00795)
                      "unable to stat(%s), skipping", fspec);
         return;
     }
     if (tmp.finfo.filetype != APR_REG) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server, APLOGNO(00796)
                      "%s isn't a regular file, skipping", fspec);
         return;
     }
     if (tmp.finfo.size > AP_MAX_SENDFILE) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server, APLOGNO(00797)
                      "%s is too large to cache, skipping", fspec);
         return;
     }
@@ -158,7 +158,7 @@ static void cache_the_file(cmd_parms *cm
     rc = apr_file_open(&fd, fspec, APR_READ | APR_BINARY | APR_XTHREAD,
                        APR_OS_DEFAULT, cmd->pool);
     if (rc != APR_SUCCESS) {
-        ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
+        ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server, APLOGNO(00798)
                      "unable to open(%s, O_RDONLY), skipping", fspec);
         return;
     }
@@ -178,7 +178,7 @@ static void cache_the_file(cmd_parms *cm
                                   (apr_size_t)new_file->finfo.size,
                                   APR_MMAP_READ, cmd->pool)) != APR_SUCCESS) {
             apr_file_close(fd);
-            ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
+            ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server, APLOGNO(00799)
                          "unable to mmap %s, skipping", filename);
             return;
         }
@@ -209,7 +209,7 @@ static const char *cachefilehandle(cmd_p
     cache_the_file(cmd, filename, 0);
 #else
     /* Sendfile not supported by this OS */
-    ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
+    ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server, APLOGNO(00800)
                  "unable to cache file: %s. Sendfile is not supported on this OS", filename);
 #endif
     return NULL;
@@ -220,7 +220,7 @@ static const char *cachefilemmap(cmd_par
     cache_the_file(cmd, filename, 1);
 #else
     /* MMAP not supported by this OS */
-    ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
+    ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server, APLOGNO(00801)
                  "unable to cache file: %s. MMAP is not supported by this OS", filename);
 #endif
     return NULL;