You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by dg...@hyperreal.org on 1998/08/06 19:31:35 UTC

cvs commit: apache-1.3/src/os/win32 mod_isapi.c

dgaudet     98/08/06 10:31:34

  Modified:    src      CHANGES
               src/include http_config.h http_core.h http_log.h
               src/main http_config.c http_core.c http_log.c http_main.c
                        http_protocol.c http_request.c util_script.c
               src/modules/proxy mod_proxy.c proxy_cache.c proxy_connect.c
                        proxy_ftp.c proxy_http.c proxy_util.c
               src/modules/standard mod_access.c mod_actions.c mod_asis.c
                        mod_auth.c mod_auth_anon.c mod_auth_db.c
                        mod_auth_dbm.c mod_autoindex.c mod_cern_meta.c
                        mod_cgi.c mod_digest.c mod_expires.c mod_imap.c
                        mod_include.c mod_info.c mod_mime_magic.c
                        mod_negotiation.c mod_rewrite.c mod_speling.c
                        mod_status.c
               src/os/win32 mod_isapi.c
  Log:
  Correct the error_log mess in a uniform manner.  Add ap_log_rerror() which
  includes the client ip address in the log message (it takes a request_rec *
  instead of a server_rec *).
  
  PR:		2661
  
  Revision  Changes    Path
  1.1004    +5 -0      apache-1.3/src/CHANGES
  
  Index: CHANGES
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v
  retrieving revision 1.1003
  retrieving revision 1.1004
  diff -u -r1.1003 -r1.1004
  --- CHANGES	1998/08/06 00:10:36	1.1003
  +++ CHANGES	1998/08/06 17:30:18	1.1004
  @@ -1,5 +1,10 @@
   Changes with Apache 1.3.2
   
  +  *) Restore the client IP address to the error log messages, this
  +     was lost during the transition from 1.2 to 1.3.  Add a new
  +     function ap_log_rerror() which takes a request_rec * and
  +     formats it appropriately.  [Dean Gaudet] PR#2661
  +
     *) Cure ap_cfg_getline() of its nasty habit of compressing internal
        whitespace in input lines -- including within quoted strings.
        [Ken Coar]
  
  
  
  1.91      +1 -1      apache-1.3/src/include/http_config.h
  
  Index: http_config.h
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/include/http_config.h,v
  retrieving revision 1.90
  retrieving revision 1.91
  diff -u -r1.90 -r1.91
  --- http_config.h	1998/07/13 11:32:35	1.90
  +++ http_config.h	1998/08/06 17:30:23	1.91
  @@ -275,7 +275,7 @@
    * handle it back-compatibly, or at least signal an error).
    */
   
  -#define MODULE_MAGIC_NUMBER 19980713
  +#define MODULE_MAGIC_NUMBER 19980806
   #define STANDARD_MODULE_STUFF MODULE_MAGIC_NUMBER, -1, __FILE__, NULL, NULL
   
   /* Generic accessors for other modules to get at their own module-specific
  
  
  
  1.45      +19 -0     apache-1.3/src/include/http_core.h
  
  Index: http_core.h
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/include/http_core.h,v
  retrieving revision 1.44
  retrieving revision 1.45
  diff -u -r1.44 -r1.45
  --- http_core.h	1998/07/01 21:19:51	1.44
  +++ http_core.h	1998/08/06 17:30:24	1.45
  @@ -86,9 +86,28 @@
   #define OPT_ALL (OPT_INDEXES|OPT_INCLUDES|OPT_SYM_LINKS|OPT_EXECCGI)
   
   /* options for get_remote_host() */
  +/* REMOTE_HOST returns the hostname, or NULL if the hostname
  + * lookup fails.  It will force a DNS lookup according to the
  + * HostnameLookups setting.
  + */
   #define REMOTE_HOST (0)
  +
  +/* REMOTE_NAME returns the hostname, or the dotted quad if the
  + * hostname lookup fails.  It will force a DNS lookup according
  + * to the HostnameLookups setting.
  + */
   #define REMOTE_NAME (1)
  +
  +/* REMOTE_NOLOOKUP is like REMOTE_NAME except that a DNS lookup is
  + * never forced.
  + */
   #define REMOTE_NOLOOKUP (2)
  +
  +/* REMOTE_DOUBLE_REV will always force a DNS lookup, and also force
  + * a double reverse lookup, regardless of the HostnameLookups
  + * setting.  The result is the (double reverse checked) hostname,
  + * or NULL if any of the lookups fail.
  + */
   #define REMOTE_DOUBLE_REV (3)
   
   #define SATISFY_ALL 0
  
  
  
  1.31      +6 -0      apache-1.3/src/include/http_log.h
  
  Index: http_log.h
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/include/http_log.h,v
  retrieving revision 1.30
  retrieving revision 1.31
  diff -u -r1.30 -r1.31
  --- http_log.h	1998/05/03 17:31:08	1.30
  +++ http_log.h	1998/08/06 17:30:24	1.31
  @@ -108,9 +108,15 @@
   API_EXPORT(void) ap_log_error(const char *file, int line, int level,
   			     const server_rec *s, const char *fmt, ...)
   			    __attribute__((format(printf,5,6)));
  +API_EXPORT(void) ap_log_rerror(const char *file, int line, int level,
  +			     const request_rec *s, const char *fmt, ...)
  +			    __attribute__((format(printf,5,6)));
   API_EXPORT(void) ap_error_log2stderr (server_rec *);     
   
   void ap_log_pid (pool *p, char *fname);
  +/* These are for legacy code, new code should use ap_log_error,
  + * or ap_log_rerror.
  + */
   API_EXPORT(void) ap_log_error_old(const char *err, server_rec *s);
   API_EXPORT(void) ap_log_unixerr(const char *routine, const char *file,
   			     const char *msg, server_rec *s);
  
  
  
  1.119     +3 -3      apache-1.3/src/main/http_config.c
  
  Index: http_config.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_config.c,v
  retrieving revision 1.118
  retrieving revision 1.119
  diff -u -r1.118 -r1.119
  --- http_config.c	1998/07/07 04:06:20	1.118
  +++ http_config.c	1998/08/06 17:30:27	1.119
  @@ -510,7 +510,7 @@
       }
   
       if (result == NOT_IMPLEMENTED && r->handler) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_WARNING, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_WARNING, r,
               "handler \"%s\" not found for: %s", r->handler, r->filename);
       }
   
  @@ -1243,7 +1243,7 @@
   	ap_cfg_closefile(f);
   
   	if (errmsg) {
  -	    ap_log_error(APLOG_MARK, APLOG_ALERT|APLOG_NOERRNO, r->server, "%s: %s",
  +	    ap_log_rerror(APLOG_MARK, APLOG_ALERT|APLOG_NOERRNO, r, "%s: %s",
                           filename, errmsg);
               return HTTP_INTERNAL_SERVER_ERROR;
   	}
  @@ -1254,7 +1254,7 @@
   	if (errno == ENOENT || errno == ENOTDIR)
   	    dc = NULL;
   	else {
  -	    ap_log_error(APLOG_MARK, APLOG_CRIT, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_CRIT, r,
   			"%s pcfg_openfile: unable to check htaccess file, ensure it is readable",
   			filename);
   	    return HTTP_FORBIDDEN;
  
  
  
  1.216     +5 -5      apache-1.3/src/main/http_core.c
  
  Index: http_core.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v
  retrieving revision 1.215
  retrieving revision 1.216
  diff -u -r1.215 -r1.216
  --- http_core.c	1998/08/05 18:52:50	1.215
  +++ http_core.c	1998/08/06 17:30:28	1.216
  @@ -2506,7 +2506,7 @@
           return HTTP_FORBIDDEN;
       }
       if ((r->uri[0] != '/') && strcmp(r->uri, "*")) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		     "Invalid URI in request %s", r->the_request);
   	return BAD_REQUEST;
       }
  @@ -2571,7 +2571,7 @@
       r->allowed |= (1 << M_GET) | (1 << M_OPTIONS);
   
       if (r->method_number == M_INVALID) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "Invalid method in request %s", r->the_request);
   	return NOT_IMPLEMENTED;
       }
  @@ -2583,7 +2583,7 @@
       }
   
       if (r->finfo.st_mode == 0 || (r->path_info && *r->path_info)) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r->server, 
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r, 
                       "File does not exist: %s", 
   		     r->path_info 
   		         ? ap_pstrcat(r->pool, r->filename, r->path_info, NULL)
  @@ -2602,7 +2602,7 @@
   #endif
   
       if (f == NULL) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "file permissions deny server access: %s", r->filename);
           return FORBIDDEN;
       }
  @@ -2625,7 +2625,7 @@
   	mm = mmap(NULL, r->finfo.st_size, PROT_READ, MAP_PRIVATE,
   		  fileno(f), 0);
   	if (mm == (caddr_t)-1) {
  -	    ap_log_error(APLOG_MARK, APLOG_CRIT, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_CRIT, r,
   			 "default_handler: mmap failed: %s", r->filename);
   	}
       }
  
  
  
  1.63      +31 -5     apache-1.3/src/main/http_log.c
  
  Index: http_log.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_log.c,v
  retrieving revision 1.62
  retrieving revision 1.63
  diff -u -r1.62 -r1.63
  --- http_log.c	1998/08/03 09:14:53	1.62
  +++ http_log.c	1998/08/06 17:30:29	1.63
  @@ -275,10 +275,10 @@
           dup2(fileno(s->error_log),STDERR_FILENO);
   }
   
  -API_EXPORT(void) ap_log_error (const char *file, int line, int level,
  -			      const server_rec *s, const char *fmt, ...)
  +static void log_error_core (const char *file, int line, int level,
  +			   const server_rec *s, const request_rec *r,
  +			   const char *fmt, va_list args)
   {
  -    va_list args;
       char errstr[MAX_STRING_LEN];
       size_t len;
       int save_errno = errno;
  @@ -346,6 +346,15 @@
   	len += ap_snprintf(errstr + len, sizeof(errstr) - len,
   		"%s(%d): ", file, line);
       }
  +    if (r) {
  +	/* XXX: TODO: add a method of selecting whether logged client
  +	 * addresses are in dotted quad or resolved form... dotted
  +	 * quad is the most secure, which is why I'm implementing it
  +	 * first. -djg
  +	 */
  +	len += ap_snprintf(errstr + len, sizeof(errstr) - len,
  +		"(client %s): ", r->connection->remote_ip);
  +    }
       if (!(level & APLOG_NOERRNO)
   	&& (save_errno != 0)
   #ifdef WIN32
  @@ -399,9 +408,7 @@
       }
   #endif
   
  -    va_start(args, fmt);
       len += ap_vsnprintf(errstr + len, sizeof(errstr) - len, fmt, args);
  -    va_end(args);
   
       /* NULL if we are logging to syslog */
       if (logf) {
  @@ -416,6 +423,25 @@
   #endif
   }
       
  +API_EXPORT(void) ap_log_error (const char *file, int line, int level,
  +			      const server_rec *s, const char *fmt, ...)
  +{
  +    va_list args;
  +
  +    va_start(args, fmt);
  +    log_error_core(file, line, level, s, NULL, fmt, args);
  +    va_end(args);
  +}
  +
  +API_EXPORT(void) ap_log_rerror (const char *file, int line, int level,
  +			      const request_rec *r, const char *fmt, ...)
  +{
  +    va_list args;
  +
  +    va_start(args, fmt);
  +    log_error_core(file, line, level, r->server, r, fmt, args);
  +    va_end(args);
  +}
   
   void ap_log_pid (pool *p, char *fname)
   {
  
  
  
  1.379     +5 -5      apache-1.3/src/main/http_main.c
  
  Index: http_main.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_main.c,v
  retrieving revision 1.378
  retrieving revision 1.379
  diff -u -r1.378 -r1.379
  --- http_main.c	1998/08/03 09:14:54	1.378
  +++ http_main.c	1998/08/06 17:30:29	1.379
  @@ -999,16 +999,16 @@
   	if (sig == SIGPIPE) {
   	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_INFO,
   			current_conn->server,
  -			"%s client stopped connection before %s completed",
  -			ap_get_remote_host(current_conn, dirconf, REMOTE_NAME),
  +			"(client %s) stopped connection before %s completed",
  +			current_conn->remote_ip,
   			timeout_name ? timeout_name : "request");
   	}
   	else {
   	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_INFO,
   			current_conn->server,
  -			"%s timed out for %s",
  -			timeout_name ? timeout_name : "request",
  -			ap_get_remote_host(current_conn, dirconf, REMOTE_NAME));
  +			"(client %s) %s timed out",
  +			current_conn->remote_ip,
  +			timeout_name ? timeout_name : "request");
   	}
       }
   
  
  
  
  1.229     +17 -30    apache-1.3/src/main/http_protocol.c
  
  Index: http_protocol.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_protocol.c,v
  retrieving revision 1.228
  retrieving revision 1.229
  diff -u -r1.228 -r1.229
  --- http_protocol.c	1998/08/03 09:14:58	1.228
  +++ http_protocol.c	1998/08/06 17:30:30	1.229
  @@ -796,10 +796,8 @@
           ap_kill_timeout(r);
           if (r->status == HTTP_REQUEST_URI_TOO_LARGE) {
   
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  -                         "request failed for %s, reason: URI too long",
  -                         ap_get_remote_host(r->connection, r->per_dir_config,
  -                                            REMOTE_NAME));
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
  +                         "request failed: URI too long");
               ap_send_error_response(r, 0);
               ap_bflush(r->connection->client);
               ap_log_transaction(r);
  @@ -812,10 +810,8 @@
           get_mime_headers(r);
           ap_kill_timeout(r);
           if (r->status != HTTP_REQUEST_TIME_OUT) {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  -                         "request failed for %s: error reading the headers",
  -                         ap_get_remote_host(r->connection, r->per_dir_config, 
  -                                            REMOTE_NAME));
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
  +                         "request failed: error reading the headers");
               ap_send_error_response(r, 0);
               ap_bflush(r->connection->client);
               ap_log_transaction(r);
  @@ -926,8 +922,8 @@
           return DECLINED;
   
       if (!ap_auth_name(r)) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  -		    r->server, "need AuthName: %s", r->uri);
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  +		    r, "need AuthName: %s", r->uri);
           return SERVER_ERROR;
       }
   
  @@ -938,7 +934,7 @@
   
       if (strcasecmp(ap_getword(r->pool, &auth_line, ' '), "Basic")) {
           /* Client tried to authenticate using wrong auth scheme */
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "client used wrong authentication scheme: %s", r->uri);
           ap_note_basic_auth_failure(r);
           return AUTH_REQUIRED;
  @@ -1367,12 +1363,12 @@
   
       if (tenc) {
           if (strcasecmp(tenc, "chunked")) {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Unknown Transfer-Encoding %s", tenc);
               return HTTP_NOT_IMPLEMENTED;
           }
           if (r->read_body == REQUEST_CHUNKED_ERROR) {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "chunked Transfer-Encoding forbidden: %s", r->uri);
               return (lenp) ? HTTP_BAD_REQUEST : HTTP_LENGTH_REQUIRED;
           }
  @@ -1385,7 +1381,7 @@
           while (ap_isdigit(*pos) || ap_isspace(*pos))
               ++pos;
           if (*pos != '\0') {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Invalid Content-Length %s", lenp);
               return HTTP_BAD_REQUEST;
           }
  @@ -1395,7 +1391,7 @@
   
       if ((r->read_body == REQUEST_NO_BODY) &&
           (r->read_chunked || (r->remaining > 0))) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "%s with body is not allowed for %s", r->method, r->uri);
           return HTTP_REQUEST_ENTITY_TOO_LARGE;
       }
  @@ -1669,11 +1665,8 @@
                   else if (errno == EAGAIN)
                       continue;
                   else {
  -                    ap_log_error(APLOG_MARK, APLOG_INFO, r->server,
  -                     "%s client stopped connection before send body completed",
  -                                ap_get_remote_host(r->connection,
  -                                                r->per_dir_config,
  -                                                REMOTE_NAME));
  +                    ap_log_rerror(APLOG_MARK, APLOG_INFO, r,
  +                     "client stopped connection before send body completed");
                       ap_bsetflag(r->connection->client, B_EOUT, 1);
                       r->connection->aborted = 1;
                       break;
  @@ -1786,11 +1779,8 @@
                   else if (errno == EAGAIN)
                       continue;
                   else {
  -                    ap_log_error(APLOG_MARK, APLOG_INFO, r->server,
  -                     "%s client stopped connection before send body completed",
  -                                ap_get_remote_host(r->connection,
  -                                                r->per_dir_config,
  -                                                REMOTE_NAME));
  +                    ap_log_rerror(APLOG_MARK, APLOG_INFO, r,
  +                     "client stopped connection before send body completed");
                       ap_bsetflag(r->connection->client, B_EOUT, 1);
                       r->connection->aborted = 1;
                       break;
  @@ -1854,11 +1844,8 @@
                   else if (errno == EAGAIN)
                       continue;
                   else {
  -                    ap_log_error(APLOG_MARK, APLOG_INFO, r->server,
  -                     "%s client stopped connection before send mmap completed",
  -                                ap_get_remote_host(r->connection,
  -                                                r->per_dir_config,
  -                                                REMOTE_NAME));
  +                    ap_log_rerror(APLOG_MARK, APLOG_INFO, r,
  +                     "client stopped connection before send mmap completed");
                       ap_bsetflag(r->connection->client, B_EOUT, 1);
                       r->connection->aborted = 1;
                       break;
  
  
  
  1.127     +10 -12    apache-1.3/src/main/http_request.c
  
  Index: http_request.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/http_request.c,v
  retrieving revision 1.126
  retrieving revision 1.127
  diff -u -r1.126 -r1.127
  --- http_request.c	1998/08/03 09:14:59	1.126
  +++ http_request.c	1998/08/06 17:30:31	1.127
  @@ -103,7 +103,7 @@
           || S_ISLNK(r->finfo.st_mode)) {
           return OK;
       }
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                   "object is not a file, directory or symlink: %s",
                   r->filename);
       return HTTP_FORBIDDEN;
  @@ -246,10 +246,8 @@
   #if defined(EACCES)
               if (errno != EACCES)
   #endif
  -                ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  -                            "access to %s failed for %s", r->uri,
  -                            ap_get_remote_host(r->connection, r->per_dir_config,
  -                                            REMOTE_NOLOOKUP));
  +                ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
  +                            "access to %s failed", r->uri);
               return HTTP_FORBIDDEN;
           }
   #else
  @@ -408,7 +406,7 @@
            */
   
           if ((res = check_symlinks(test_dirname, core_dir->opts))) {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Symbolic link not allowed: %s", test_dirname);
               return res;
           }
  @@ -503,7 +501,7 @@
        */
       if (!S_ISDIR(r->finfo.st_mode)
           && (res = check_symlinks(r->filename, ap_allow_options(r)))) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "Symbolic link not allowed: %s", r->filename);
           return res;
       }
  @@ -797,7 +795,7 @@
           }
           else {
               if ((res = check_symlinks(rnew->filename, ap_allow_options(rnew)))) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, rnew->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, rnew,
                               "Symbolic link not allowed: %s", rnew->filename);
                   rnew->status = res;
                   return rnew;
  @@ -971,7 +969,7 @@
                * dying with a recursive server error...
                */
               recursive_error = SERVER_ERROR;
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Invalid error redirection directive: %s",
                           custom_response);
           }
  @@ -982,7 +980,7 @@
   static void decl_die(int status, char *phase, request_rec *r)
   {
       if (status == DECLINED) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_CRIT, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_CRIT, r,
                       "configuration error:  couldn't %s: %s", phase, r->uri);
           ap_die(SERVER_ERROR, r);
       }
  @@ -1025,7 +1023,7 @@
            * headers!  Have to dink things even to make sure the error message
            * comes through...
            */
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "client sent illegal HTTP/0.9 request: %s", r->uri);
           r->header_only = 0;
           ap_die(BAD_REQUEST, r);
  @@ -1041,7 +1039,7 @@
   	 * HTTP/1.1 mentions twice (S9, S14.23) that a request MUST contain
   	 * a Host: header, and the server MUST respond with 400 if it doesn't.
            */
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                  "client sent HTTP/1.1 request without hostname (see RFC2068 section 9, and 14.23): %s", r->uri);
           ap_die(BAD_REQUEST, r);
           return;
  
  
  
  1.126     +9 -9      apache-1.3/src/main/util_script.c
  
  Index: util_script.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/main/util_script.c,v
  retrieving revision 1.125
  retrieving revision 1.126
  diff -u -r1.125 -r1.126
  --- util_script.c	1998/08/06 02:03:38	1.125
  +++ util_script.c	1998/08/06 17:30:32	1.126
  @@ -430,7 +430,7 @@
   
   	if ((*getsfunc) (w, MAX_STRING_LEN - 1, getsfunc_data) == 0) {
   	    ap_kill_timeout(r);
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			 "Premature end of script headers: %s", r->filename);
   	    return SERVER_ERROR;
   	}
  @@ -486,7 +486,7 @@
   	    }
   
   	    ap_kill_timeout(r);
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			 "%s: %s", malformed, r->filename);
   	    return SERVER_ERROR;
   	}
  @@ -704,7 +704,7 @@
   
   	program = fopen(r->filename, "rt");
   	if (!program) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server, "fopen(%s) failed",
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r, "fopen(%s) failed",
   			 r->filename);
   	    return (pid);
   	}
  @@ -819,13 +819,13 @@
               if (!is_exe) {
                   program = fopen(r->filename, "rb");
                   if (!program) {
  -                    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                                    "fopen(%s) failed", r->filename);
                       return (pid);
                   }
                   sz = fread(interpreter, 1, sizeof(interpreter) - 1, program);
                   if (sz < 0) {
  -                    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                                    "fread of %s failed", r->filename);
                       fclose(program);
                       return (pid);
  @@ -857,7 +857,7 @@
                * file this is by now..
                */
               if (!is_exe && !is_script && !is_binary) {
  -                ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r,
                                "%s is not executable; ensure interpreted scripts have "
                                "\"#!\" first line", 
                                r->filename);
  @@ -1058,7 +1058,7 @@
   	    }
   
   	    if ((pw = getpwnam(username)) == NULL) {
  -		ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			     "getpwnam: invalid username %s", username);
   		return (pid);
   	    }
  @@ -1079,7 +1079,7 @@
   	}
   	else {
   	    if ((pw = getpwuid(r->server->server_uid)) == NULL) {
  -		ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			     "getpwuid: invalid userid %ld",
   			     (long) r->server->server_uid);
   		return (pid);
  @@ -1087,7 +1087,7 @@
   	    execuser = ap_pstrdup(r->pool, pw->pw_name);
   
   	    if ((gr = getgrgid(r->server->server_gid)) == NULL) {
  -		ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			     "getgrgid: invalid groupid %ld",
   			     (long) r->server->server_gid);
   		return (pid);
  
  
  
  1.58      +2 -2      apache-1.3/src/modules/proxy/mod_proxy.c
  
  Index: mod_proxy.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/mod_proxy.c,v
  retrieving revision 1.57
  retrieving revision 1.58
  diff -u -r1.57 -r1.58
  --- mod_proxy.c	1998/08/03 09:30:56	1.57
  +++ mod_proxy.c	1998/08/06 17:30:40	1.58
  @@ -271,7 +271,7 @@
   				  UNP_REVEALPASSWORD);
   
       ap_table_set(r->headers_out, "Location", nuri);
  -    ap_log_error(APLOG_MARK, APLOG_INFO|APLOG_NOERRNO, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_INFO|APLOG_NOERRNO, r,
   		"Domain missing: %s sent to %s%s%s", r->uri,
   		ap_unparse_uri_components(r->pool, &r->parsed_uri,
   		      UNP_OMITUSERINFO),
  @@ -350,7 +350,7 @@
   	    direct_connect = list[ii].matcher(&list[ii], r);
   	}
   #if DEBUGGING
  -	ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, r,
   		     (direct_connect) ? "NoProxy for %s" : "UseProxy for %s",
   		     r->uri);
   #endif
  
  
  
  1.49      +9 -9      apache-1.3/src/modules/proxy/proxy_cache.c
  
  Index: proxy_cache.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_cache.c,v
  retrieving revision 1.48
  retrieving revision 1.49
  diff -u -r1.48 -r1.49
  --- proxy_cache.c	1998/08/03 09:15:07	1.48
  +++ proxy_cache.c	1998/08/06 17:30:41	1.49
  @@ -670,7 +670,7 @@
   	    ap_bpushfd(cachefp, cfd, cfd);
   	}
   	else if (errno != ENOENT)
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error opening cache file %s",
   			 c->filename);
   #ifdef EXPLAIN
  @@ -682,11 +682,11 @@
       if (cachefp != NULL) {
   	i = rdcache(r->pool, cachefp, c);
   	if (i == -1)
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error reading cache file %s", 
   			 c->filename);
   	else if (i == 0)
  -	    ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r,
   			 "proxy: bad (short?) cache file: %s", c->filename);
   	if (i != 1) {
   	    ap_pclosef(r->pool, cachefp->fd);
  @@ -941,11 +941,11 @@
   	    if (lmod != c->lmod || expc != c->expire || date != c->date) {
   		off_t curpos = lseek(c->fp->fd, 0, SEEK_SET);
   		if (curpos == -1)
  -		    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   				 "proxy: error seeking on cache file %s",
   				 c->filename);
   		else if (write(c->fp->fd, buff, 35) == -1)
  -		    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   				 "proxy: error updating cache file %s",
   				 c->filename);
   	    }
  @@ -974,11 +974,11 @@
   		off_t curpos = lseek(c->fp->fd, 0, SEEK_SET);
   
   		if (curpos == -1)
  -		    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   				 "proxy: error seeking on cache file %s",
   				 c->filename);
   		else if (write(c->fp->fd, buff, 35) == -1)
  -		    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   				 "proxy: error updating cache file %s",
   				 c->filename);
   	    }
  @@ -1011,7 +1011,7 @@
   
       i = open(c->tempfile, O_WRONLY | O_CREAT | O_EXCL | O_BINARY, 0622);
       if (i == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy: error creating cache file %s",
   		     c->tempfile);
   	return DECLINED;
  @@ -1021,7 +1021,7 @@
       ap_bpushfd(c->fp, -1, i);
   
       if (ap_bvputs(c->fp, buff, "X-URL: ", c->url, "\n", NULL) == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy: error writing cache file(%s)", c->tempfile);
   	ap_pclosef(r->pool, c->fp->fd);
   	unlink(c->tempfile);
  
  
  
  1.30      +1 -1      apache-1.3/src/modules/proxy/proxy_connect.c
  
  Index: proxy_connect.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_connect.c,v
  retrieving revision 1.29
  retrieving revision 1.30
  diff -u -r1.29 -r1.30
  --- proxy_connect.c	1998/06/08 14:23:50	1.29
  +++ proxy_connect.c	1998/08/06 17:30:42	1.30
  @@ -160,7 +160,7 @@
   
       sock = ap_psocket(r->pool, PF_INET, SOCK_STREAM, IPPROTO_TCP);
       if (sock == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "proxy: error creating socket");
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  
  
  
  1.65      +11 -11    apache-1.3/src/modules/proxy/proxy_ftp.c
  
  Index: proxy_ftp.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_ftp.c,v
  retrieving revision 1.64
  retrieving revision 1.65
  diff -u -r1.64 -r1.65
  --- proxy_ftp.c	1998/07/09 19:45:56	1.64
  +++ proxy_ftp.c	1998/08/06 17:30:43	1.65
  @@ -570,7 +570,7 @@
   
       sock = ap_psocket(p, PF_INET, SOCK_STREAM, IPPROTO_TCP);
       if (sock == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy: error creating socket");
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  @@ -579,7 +579,7 @@
   	if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
   		       (const char *) &conf->recv_buffer_size, sizeof(int))
   	    == -1) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default");
   	}
       }
  @@ -587,7 +587,7 @@
       if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &one,
   		   sizeof(one)) == -1) {
   #ifndef _OSD_POSIX /* BS2000 has this option "always on" */
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy: error setting reuseaddr option: setsockopt(SO_REUSEADDR)");
   	ap_pclosesocket(p, sock);
   	return HTTP_INTERNAL_SERVER_ERROR;
  @@ -771,7 +771,7 @@
   /* try to set up PASV data connection first */
       dsock = ap_psocket(p, PF_INET, SOCK_STREAM, IPPROTO_TCP);
       if (dsock == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy: error creating PASV socket");
   	ap_bclose(f);
   	ap_kill_timeout(r);
  @@ -781,7 +781,7 @@
       if (conf->recv_buffer_size) {
   	if (setsockopt(dsock, SOL_SOCKET, SO_RCVBUF,
   	       (const char *) &conf->recv_buffer_size, sizeof(int)) == -1) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default");
   	}
       }
  @@ -793,7 +793,7 @@
       i = ap_bgets(pasv, sizeof(pasv), f);
   
       if (i == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r,
   		     "PASV: control connection is toast");
   	ap_pclosesocket(p, dsock);
   	ap_bclose(f);
  @@ -848,7 +848,7 @@
       if (!pasvmode) {		/* set up data connection */
   	clen = sizeof(struct sockaddr_in);
   	if (getsockname(sock, (struct sockaddr *) &server, &clen) < 0) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error getting socket address");
   	    ap_bclose(f);
   	    ap_kill_timeout(r);
  @@ -857,7 +857,7 @@
   
   	dsock = ap_psocket(p, PF_INET, SOCK_STREAM, IPPROTO_TCP);
   	if (dsock == -1) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error creating socket");
   	    ap_bclose(f);
   	    ap_kill_timeout(r);
  @@ -867,7 +867,7 @@
   	if (setsockopt(dsock, SOL_SOCKET, SO_REUSEADDR, (void *) &one,
   		       sizeof(one)) == -1) {
   #ifndef _OSD_POSIX /* BS2000 has this option "always on" */
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error setting reuseaddr option");
   	    ap_pclosesocket(p, dsock);
   	    ap_bclose(f);
  @@ -881,7 +881,7 @@
   	    char buff[22];
   
   	    ap_snprintf(buff, sizeof(buff), "%s:%d", inet_ntoa(server.sin_addr), server.sin_port);
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: error binding to ftp data socket %s", buff);
   	    ap_bclose(f);
   	    ap_pclosesocket(p, dsock);
  @@ -1048,7 +1048,7 @@
   	    csd = accept(dsock, (struct sockaddr *) &server, &clen);
   	while (csd == -1 && errno == EINTR);
   	if (csd == -1) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "proxy: failed to accept data connection");
   	    ap_pclosesocket(p, dsock);
   	    ap_bclose(f);
  
  
  
  1.54      +2 -2      apache-1.3/src/modules/proxy/proxy_http.c
  
  Index: proxy_http.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_http.c,v
  retrieving revision 1.53
  retrieving revision 1.54
  diff -u -r1.53 -r1.54
  --- proxy_http.c	1998/07/09 19:45:56	1.53
  +++ proxy_http.c	1998/08/06 17:30:43	1.54
  @@ -248,7 +248,7 @@
   
       sock = ap_psocket(p, PF_INET, SOCK_STREAM, IPPROTO_TCP);
       if (sock == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "proxy: error creating socket");
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  @@ -257,7 +257,7 @@
   	if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
   		       (const char *) &conf->recv_buffer_size, sizeof(int))
   	    == -1) {
  -	    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			 "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default");
   	}
       }
  
  
  
  1.66      +3 -3      apache-1.3/src/modules/proxy/proxy_util.c
  
  Index: proxy_util.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_util.c,v
  retrieving revision 1.65
  retrieving revision 1.66
  diff -u -r1.65 -r1.66
  --- proxy_util.c	1998/07/09 19:45:57	1.65
  +++ proxy_util.c	1998/08/06 17:30:44	1.66
  @@ -830,7 +830,7 @@
   BUFF *
        ap_proxy_cache_error(struct cache_req *c)
   {
  -    ap_log_error(APLOG_MARK, APLOG_ERR, c->req->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_ERR, c->req,
   		 "proxy: error writing to cache file %s", c->tempfile);
       ap_pclosef(c->req->pool, c->fp->fd);
       c->fp = NULL;
  @@ -908,7 +908,7 @@
       err = ap_proxy_canon_netloc(r->pool, &url, &user, &password, &host, &port);
   
       if (err != NULL)
  -	ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r,
   		     "%s", err);
   
       r->hostname = host;
  @@ -1243,7 +1243,7 @@
   #endif /* WIN32 */
       } while (i == -1 && errno == EINTR);
       if (i == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "proxy connect to %s port %d failed",
   		     inet_ntoa(addr->sin_addr), ntohs(addr->sin_port));
       }
  
  
  
  1.37      +3 -3      apache-1.3/src/modules/standard/mod_access.c
  
  Index: mod_access.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_access.c,v
  retrieving revision 1.36
  retrieving revision 1.37
  diff -u -r1.36 -r1.37
  --- mod_access.c	1998/07/08 17:47:12	1.36
  +++ mod_access.c	1998/08/06 17:30:52	1.37
  @@ -376,9 +376,9 @@
   
       if (ret == FORBIDDEN
   	&& (ap_satisfies(r) != SATISFY_ANY || !ap_some_auth_required(r))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  -		  "client %pI denied by server configuration: %s",
  -		  &r->connection->remote_addr, r->filename);
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
  +		  "client denied by server configuration: %s",
  +		  r->filename);
       }
   
       return ret;
  
  
  
  1.28      +1 -1      apache-1.3/src/modules/standard/mod_actions.c
  
  Index: mod_actions.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_actions.c,v
  retrieving revision 1.27
  retrieving revision 1.28
  diff -u -r1.27 -r1.28
  --- mod_actions.c	1998/06/13 15:23:04	1.27
  +++ mod_actions.c	1998/08/06 17:30:53	1.28
  @@ -191,7 +191,7 @@
   		       action ? action : ap_default_type(r)))) {
   	script = t;
   	if (r->finfo.st_mode == 0) {
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"File does not exist: %s", r->filename);
   	    return NOT_FOUND;
   	}
  
  
  
  1.29      +2 -2      apache-1.3/src/modules/standard/mod_asis.c
  
  Index: mod_asis.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_asis.c,v
  retrieving revision 1.28
  retrieving revision 1.29
  diff -u -r1.28 -r1.29
  --- mod_asis.c	1998/06/13 15:23:05	1.28
  +++ mod_asis.c	1998/08/06 17:30:53	1.29
  @@ -72,7 +72,7 @@
       if (r->method_number != M_GET)
   	return DECLINED;
       if (r->finfo.st_mode == 0) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "File does not exist: %s", r->filename);
   	return NOT_FOUND;
       }
  @@ -80,7 +80,7 @@
       f = ap_pfopen(r->pool, r->filename, "r");
   
       if (f == NULL) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "file permissions deny server access: %s", r->filename);
   	return FORBIDDEN;
       }
  
  
  
  1.39      +6 -8      apache-1.3/src/modules/standard/mod_auth.c
  
  Index: mod_auth.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth.c,v
  retrieving revision 1.38
  retrieving revision 1.39
  diff -u -r1.38 -r1.39
  --- mod_auth.c	1998/07/10 06:33:24	1.38
  +++ mod_auth.c	1998/08/06 17:30:54	1.39
  @@ -126,7 +126,7 @@
       const char *rpw, *w;
   
       if (!(f = ap_pcfg_openfile(r->pool, auth_pwfile))) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "Could not open password file: %s", auth_pwfile);
   	return NULL;
       }
  @@ -214,14 +214,14 @@
       if (!(real_pw = get_pw(r, c->user, sec->auth_pwfile))) {
   	if (!(sec->auth_authoritative))
   	    return DECLINED;
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "user %s not found: %s", c->user, r->uri);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
       }
       /* anyone know where the prototype for crypt is? */
       if (strcmp(real_pw, (char *) crypt(sent_pw, real_pw))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "user %s: password mismatch: %s", c->user, r->uri);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -292,11 +292,9 @@
       if (!(sec->auth_authoritative))
   	return DECLINED;
   
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  -	"access to %s failed for %s, reason: user %s not allowed access",
  -	r->uri,
  -	ap_get_remote_host(r->connection, r->per_dir_config, REMOTE_NAME),
  -	user);
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
  +	"access to %s failed, reason: user %s not allowed access",
  +	r->uri, user);
   	
       ap_note_basic_auth_failure(r);
       return AUTH_REQUIRED;
  
  
  
  1.35      +2 -2      apache-1.3/src/modules/standard/mod_auth_anon.c
  
  Index: mod_auth_anon.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth_anon.c,v
  retrieving revision 1.34
  retrieving revision 1.35
  diff -u -r1.34 -r1.35
  --- mod_auth_anon.c	1998/07/03 22:08:49	1.34
  +++ mod_auth_anon.c	1998/08/06 17:30:54	1.35
  @@ -252,7 +252,7 @@
   	       || ((strpbrk("@", sent_pw) != NULL)
   		   && (strpbrk(".", sent_pw) != NULL)))) {
   	if (sec->auth_anon_logemail && ap_is_initial_req(r)) {
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_INFO, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_INFO, r,
   			"Anonymous: Passwd <%s> Accepted",
   			sent_pw ? sent_pw : "\'none\'");
   	}
  @@ -260,7 +260,7 @@
       }
       else {
   	if (sec->auth_anon_authoritative) {
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"Anonymous: Authoritative, Passwd <%s> not accepted",
   			sent_pw ? sent_pw : "\'none\'");
   	    return AUTH_REQUIRED;
  
  
  
  1.32      +5 -5      apache-1.3/src/modules/standard/mod_auth_db.c
  
  Index: mod_auth_db.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth_db.c,v
  retrieving revision 1.31
  retrieving revision 1.32
  diff -u -r1.31 -r1.32
  --- mod_auth_db.c	1998/07/03 22:08:50	1.31
  +++ mod_auth_db.c	1998/08/06 17:30:55	1.32
  @@ -155,7 +155,7 @@
       q.size = strlen(q.data);
   
       if (!(f = dbopen(auth_dbpwfile, O_RDONLY, 0664, DB_HASH, NULL))) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "could not open db auth file: %s", auth_dbpwfile);
   	return NULL;
       }
  @@ -218,7 +218,7 @@
       if (!(real_pw = get_db_pw(r, c->user, sec->auth_dbpwfile))) {
   	if (!(sec->auth_dbauthoritative))
   	    return DECLINED;
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "DB user %s not found: %s", c->user, r->filename);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -229,7 +229,7 @@
   	*colon_pw = '\0';
       /* anyone know where the prototype for crypt is? */
       if (strcmp(real_pw, (char *) crypt(sent_pw, real_pw))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "DB user %s: password mismatch: %s", c->user, r->uri);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -274,7 +274,7 @@
   	    if (!(groups = get_db_grp(r, user, sec->auth_dbgrpfile))) {
   		if (!(sec->auth_dbauthoritative))
   		    return DECLINED;
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			    "user %s not in DB group file %s: %s",
   			    user, sec->auth_dbgrpfile, r->filename);
   		ap_note_basic_auth_failure(r);
  @@ -290,7 +290,7 @@
   			return OK;
   		}
   	    }
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"user %s not in right group: %s", user, r->filename);
   	    ap_note_basic_auth_failure(r);
   	    return AUTH_REQUIRED;
  
  
  
  1.39      +5 -5      apache-1.3/src/modules/standard/mod_auth_dbm.c
  
  Index: mod_auth_dbm.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth_dbm.c,v
  retrieving revision 1.38
  retrieving revision 1.39
  diff -u -r1.38 -r1.39
  --- mod_auth_dbm.c	1998/07/03 22:08:50	1.38
  +++ mod_auth_dbm.c	1998/08/06 17:30:55	1.39
  @@ -154,7 +154,7 @@
   
   
       if (!(f = dbm_open(auth_dbmpwfile, O_RDONLY, 0664))) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "could not open dbm auth file: %s", auth_dbmpwfile);
   	return NULL;
       }
  @@ -219,7 +219,7 @@
       if (!(real_pw = get_dbm_pw(r, c->user, sec->auth_dbmpwfile))) {
   	if (!(sec->auth_dbmauthoritative))
   	    return DECLINED;
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "DBM user %s not found: %s", c->user, r->filename);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -230,7 +230,7 @@
   	*colon_pw = '\0';
       /* anyone know where the prototype for crypt is? */
       if (strcmp(real_pw, (char *) crypt(sent_pw, real_pw))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "user %s: password mismatch: %s", c->user, r->uri);
   	ap_note_basic_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -275,7 +275,7 @@
   	    if (!(groups = get_dbm_grp(r, user, sec->auth_dbmgrpfile))) {
   		if (!(sec->auth_dbmauthoritative))
   		    return DECLINED;
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			    "user %s not in DBM group file %s: %s",
   			    user, sec->auth_dbmgrpfile, r->filename);
   		ap_note_basic_auth_failure(r);
  @@ -291,7 +291,7 @@
   			return OK;
   		}
   	    }
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"user %s not in right group: %s",
   			user, r->filename);
   	    ap_note_basic_auth_failure(r);
  
  
  
  1.87      +2 -2      apache-1.3/src/modules/standard/mod_autoindex.c
  
  Index: mod_autoindex.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_autoindex.c,v
  retrieving revision 1.86
  retrieving revision 1.87
  diff -u -r1.86 -r1.87
  --- mod_autoindex.c	1998/07/08 17:47:14	1.86
  +++ mod_autoindex.c	1998/08/06 17:30:56	1.87
  @@ -1089,7 +1089,7 @@
       char direction;
   
       if (!(d = ap_popendir(r->pool, name))) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "Can't open directory for index: %s", r->filename);
   	return HTTP_FORBIDDEN;
       }
  @@ -1223,7 +1223,7 @@
   	return index_directory(r, d);
       }
       else {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		     "Directory index forbidden by rule: %s", r->filename);
   	return HTTP_FORBIDDEN;
       }
  
  
  
  1.33      +3 -3      apache-1.3/src/modules/standard/mod_cern_meta.c
  
  Index: mod_cern_meta.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_cern_meta.c,v
  retrieving revision 1.32
  retrieving revision 1.33
  diff -u -r1.32 -r1.33
  --- mod_cern_meta.c	1998/07/08 17:47:14	1.32
  +++ mod_cern_meta.c	1998/08/06 17:30:56	1.33
  @@ -251,7 +251,7 @@
   	/* if we see a bogus header don't ignore it. Shout and scream */
   
   	if (!(l = strchr(w, ':'))) {
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"malformed header in meta file: %s", r->filename);
   	    return SERVER_ERROR;
   	}
  @@ -324,7 +324,7 @@
       }
       else {
   	/* no last slash, buh?! */
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "internal error in mod_cern_meta: %s", r->filename);
   	/* should really barf, but hey, let's be friends... */
   	return DECLINED;
  @@ -353,7 +353,7 @@
   	if (errno == ENOENT) {
   	    return DECLINED;
   	}
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   	      "meta file permissions deny server access: %s", metafilename);
   	return FORBIDDEN;
       };
  
  
  
  1.84      +2 -2      apache-1.3/src/modules/standard/mod_cgi.c
  
  Index: mod_cgi.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_cgi.c,v
  retrieving revision 1.83
  retrieving revision 1.84
  diff -u -r1.83 -r1.84
  --- mod_cgi.c	1998/08/03 09:15:10	1.83
  +++ mod_cgi.c	1998/08/06 17:30:57	1.84
  @@ -169,7 +169,7 @@
       FILE *f;
       struct stat finfo;
   
  -    ap_log_error(APLOG_MARK, show_errno|APLOG_ERR, r->server, 
  +    ap_log_rerror(APLOG_MARK, show_errno|APLOG_ERR, r, 
   		"%s: %s", error, r->filename);
   
       if (!conf->logname ||
  @@ -431,7 +431,7 @@
       if (!ap_bspawn_child(r->main ? r->main->pool : r->pool, cgi_child,
   			 (void *) &cld, kill_after_timeout,
   			 &script_out, &script_in, &script_err)) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "couldn't spawn child process: %s", r->filename);
   	return SERVER_ERROR;
       }
  
  
  
  1.37      +5 -5      apache-1.3/src/modules/standard/mod_digest.c
  
  Index: mod_digest.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_digest.c,v
  retrieving revision 1.36
  retrieving revision 1.37
  diff -u -r1.36 -r1.37
  --- mod_digest.c	1998/07/08 17:47:14	1.36
  +++ mod_digest.c	1998/08/06 17:30:57	1.37
  @@ -112,7 +112,7 @@
       char *w, *x;
   
       if (!(f = ap_pcfg_openfile(r->pool, auth_pwfile))) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "Could not open password file: %s", auth_pwfile);
   	return NULL;
       }
  @@ -148,7 +148,7 @@
   	return DECLINED;
   
       if (!ap_auth_name(r)) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "need AuthName: %s", r->uri);
   	return SERVER_ERROR;
       }
  @@ -160,7 +160,7 @@
   
       if (strcasecmp(ap_getword(r->pool, &auth_line, ' '), "Digest")) {
   	/* Client tried to authenticate using wrong auth scheme */
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "client used wrong authentication scheme: %s", r->uri);
   	ap_note_digest_auth_failure(r);
   	return AUTH_REQUIRED;
  @@ -297,13 +297,13 @@
   	return DECLINED;
   
       if (!(a1 = get_hash(r, c->user, sec->pwfile))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "user %s not found: %s", c->user, r->uri);
   	ap_note_digest_auth_failure(r);
   	return AUTH_REQUIRED;
       }
       if (strcmp(response->digest, find_digest(r, response, a1))) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "user %s: password mismatch: %s", c->user, r->uri);
   	ap_note_digest_auth_failure(r);
   	return AUTH_REQUIRED;
  
  
  
  1.29      +2 -2      apache-1.3/src/modules/standard/mod_expires.c
  
  Index: mod_expires.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_expires.c,v
  retrieving revision 1.28
  retrieving revision 1.29
  diff -u -r1.28 -r1.29
  --- mod_expires.c	1998/07/08 17:47:15	1.28
  +++ mod_expires.c	1998/08/06 17:30:57	1.29
  @@ -418,7 +418,7 @@
   
       conf = (expires_dir_config *) ap_get_module_config(r->per_dir_config, &expires_module);
       if (conf == NULL) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "internal error: %s", r->filename);
           return SERVER_ERROR;
       };
  @@ -468,7 +468,7 @@
           /* expecting the add_* routines to be case-hardened this 
            * is just a reminder that module is beta
            */
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "internal error: bad expires code: %s", r->filename);
           return SERVER_ERROR;
       };
  
  
  
  1.48      +3 -3      apache-1.3/src/modules/standard/mod_imap.c
  
  Index: mod_imap.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_imap.c,v
  retrieving revision 1.47
  retrieving revision 1.48
  diff -u -r1.47 -r1.48
  --- mod_imap.c	1998/07/08 17:47:15	1.47
  +++ mod_imap.c	1998/08/06 17:30:58	1.48
  @@ -406,7 +406,7 @@
       /* must be a relative URL to be combined with base */
       if (strchr(base, '/') == NULL && (!strncmp(value, "../", 3)
           || !strcmp(value, ".."))) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "invalid base directive in map file: %s", r->uri);
           return NULL;
       }
  @@ -466,7 +466,7 @@
                                      value */
           }
           else if (directory) {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "invalid directory name in map file: %s", r->uri);
               return NULL;
           }
  @@ -867,7 +867,7 @@
                                                    we failed. They lose! */
   
   need_2_fields:
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		"map file %s, line %d syntax error: requires at "
                   "least two fields", r->uri, imap->line_number);
       /* fall through */
  
  
  
  1.101     +47 -47    apache-1.3/src/modules/standard/mod_include.c
  
  Index: mod_include.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_include.c,v
  retrieving revision 1.100
  retrieving revision 1.101
  diff -u -r1.100 -r1.101
  --- mod_include.c	1998/08/03 09:15:11	1.100
  +++ mod_include.c	1998/08/06 17:30:58	1.101
  @@ -513,8 +513,8 @@
   		    start_of_var_name = in;
   		    in = strchr(in, '}');
   		    if (in == NULL) {
  -                        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  -				    r->server, "Missing '}' on variable \"%s\"",
  +                        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  +				    r, "Missing '}' on variable \"%s\"",
   				    expansion);
                           *next = '\0';
                           return;
  @@ -711,8 +711,8 @@
               ap_chdir_file(r->filename);
   #endif
               if (error_fmt) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  -			    r->server, error_fmt, tag_val, r->filename);
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  +			    r, error_fmt, tag_val, r->filename);
                   ap_rputs(error, r);
               }
   
  @@ -727,7 +727,7 @@
               return 0;
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag include in %s",
                           tag, r->filename);
               ap_rputs(error, r);
  @@ -823,7 +823,7 @@
   
       if (!ap_bspawn_child(r->pool, include_cmd_child, &arg,
   			 kill_after_timeout, NULL, &script_in, NULL)) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		     "couldn't spawn include command");
           return -1;
       }
  @@ -847,7 +847,7 @@
           if (!strcmp(tag, "cmd")) {
               parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 1);
               if (include_cmd(parsed_string, r) == -1) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "execution failure for parameter \"%s\" "
                               "to tag exec in file %s",
                               tag, r->filename);
  @@ -861,7 +861,7 @@
           else if (!strcmp(tag, "cgi")) {
               parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0);
               if (include_cgi(parsed_string, r) == -1) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "invalid CGI ref \"%s\" in %s", tag_val, file);
                   ap_rputs(error, r);
               }
  @@ -874,7 +874,7 @@
               return 0;
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag exec in %s",
                           tag, file);
               ap_rputs(error, r);
  @@ -906,7 +906,7 @@
               return 0;
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag echo in %s",
                           tag, r->filename);
               ap_rputs(error, r);
  @@ -924,7 +924,7 @@
       AV *av = newAV();
   
       if (!(ap_allow_options(r) & OPT_INCLUDES)) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "httpd: #perl SSI disallowed by IncludesNoExec in %s",
                       r->filename);
           return DECLINED;
  @@ -991,7 +991,7 @@
               return 0;
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag config in %s",
                           tag, r->filename);
               ap_rputs(error, r);
  @@ -1015,7 +1015,7 @@
           if (rr->status == HTTP_OK && rr->finfo.st_mode != 0) {
               to_send = rr->filename;
               if ((ret = stat(to_send, finfo)) == -1) {
  -                ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                               "unable to get information about \"%s\" "
                               "in parsed file %s",
                               to_send, r->filename);
  @@ -1024,7 +1024,7 @@
           }
           else {
               ret = -1;
  -            ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                           "unable to lookup information about \"%s\" "
                           "in parsed file %s",
                           tag_val, r->filename);
  @@ -1045,7 +1045,7 @@
               return 0;
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unable to get information about \"%s\" "
                           "in parsed file %s",
                           tag_val, r->filename);
  @@ -1055,7 +1055,7 @@
           }
       }
       else {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "unknown parameter \"%s\" to tag %s in %s",
                       tag, directive, r->filename);
           ap_rputs(error, r);
  @@ -1135,7 +1135,7 @@
   
       compiled = ap_pregcomp(r->pool, rexp, REG_EXTENDED | REG_NOSUB);
       if (compiled == NULL) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "unable to compile pattern \"%s\"", rexp);
           return -1;
       }
  @@ -1380,7 +1380,7 @@
                   current = current->right = new;
                   break;
               default:
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1394,7 +1394,7 @@
               ap_rputs("     Token: and/or\n", r);
   #endif
               if (current == (struct parse_node *) NULL) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1419,7 +1419,7 @@
                   case token_lbrace:
                       break;
                   default:
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "Invalid expression \"%s\" in file %s",
                                   expr, r->filename);
                       ap_rputs(error, r);
  @@ -1464,7 +1464,7 @@
                   case token_lt:
                       break;
                   default:
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "Invalid expression \"%s\" in file %s",
                                   expr, r->filename);
                       ap_rputs(error, r);
  @@ -1496,7 +1496,7 @@
               ap_rputs("     Token: eq/ne/ge/gt/le/lt\n", r);
   #endif
               if (current == (struct parse_node *) NULL) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1521,7 +1521,7 @@
                   case token_le:
                   case token_lt:
                   default:
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "Invalid expression \"%s\" in file %s",
                                   expr, r->filename);
                       ap_rputs(error, r);
  @@ -1555,7 +1555,7 @@
                   current = current->parent;
               }
               if (current == (struct parse_node *) NULL) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Unmatched ')' in \"%s\" in file %s",
   			    expr, r->filename);
                   ap_rputs(error, r);
  @@ -1588,7 +1588,7 @@
                   case token_string:
                   case token_group:
                   default:
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "Invalid expression \"%s\" in file %s",
                                   expr, r->filename);
                       ap_rputs(error, r);
  @@ -1636,7 +1636,7 @@
   #endif
               if (current->left == (struct parse_node *) NULL ||
                   current->right == (struct parse_node *) NULL) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1701,7 +1701,7 @@
                   (current->right == (struct parse_node *) NULL) ||
                   (current->left->token.type != token_string) ||
                   (current->right->token.type != token_string)) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1722,7 +1722,7 @@
                       current->right->token.value[len - 1] = '\0';
                   }
                   else {
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "Invalid rexp \"%s\" in file %s",
                                   current->right->token.value, r->filename);
                       ap_rputs(error, r);
  @@ -1766,7 +1766,7 @@
                   (current->right == (struct parse_node *) NULL) ||
                   (current->left->token.type != token_string) ||
                   (current->right->token.type != token_string)) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "Invalid expression \"%s\" in file %s",
                               expr, r->filename);
                   ap_rputs(error, r);
  @@ -1849,21 +1849,21 @@
               break;
   
           case token_lbrace:
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Unmatched '(' in \"%s\" in file %s",
                           expr, r->filename);
               ap_rputs(error, r);
               goto RETURN;
   
           case token_rbrace:
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Unmatched ')' in \"%s\" in file %s",
                           expr, r->filename);
               ap_rputs(error, r);
               goto RETURN;
   
           default:
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			"bad token type");
               ap_rputs(error, r);
               goto RETURN;
  @@ -1891,7 +1891,7 @@
           }
           else if (!strcmp(tag, "done")) {
   	    if (expr == NULL) {
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			    "missing expr in if statement: %s",
   			    r->filename);
   		ap_rputs(error, r);
  @@ -1911,7 +1911,7 @@
   #endif
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag if in %s",
                           tag, r->filename);
               ap_rputs(error, r);
  @@ -1942,7 +1942,7 @@
                   return (0);
               }
   	    if (expr == NULL) {
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			    "missing expr in elif statement: %s",
   			    r->filename);
   		ap_rputs(error, r);
  @@ -1962,7 +1962,7 @@
   #endif
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "unknown parameter \"%s\" to tag if in %s",
                           tag, r->filename);
               ap_rputs(error, r);
  @@ -1988,7 +1988,7 @@
           return 0;
       }
       else {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "else directive does not take tags in %s",
   		    r->filename);
           if (*printing) {
  @@ -2016,7 +2016,7 @@
           return 0;
       }
       else {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "endif directive does not take tags in %s",
   		    r->filename);
           ap_rputs(error, r);
  @@ -2044,7 +2044,7 @@
           }
           else if (!strcmp(tag, "value")) {
               if (var == (char *) NULL) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "variable must precede value in set directive in %s",
   			    r->filename);
                   ap_rputs(error, r);
  @@ -2054,7 +2054,7 @@
               ap_table_setn(r->subprocess_env, var, ap_pstrdup(r->pool, parsed_string));
           }
           else {
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                           "Invalid tag for set directive in %s", r->filename);
               ap_rputs(error, r);
               return -1;
  @@ -2080,7 +2080,7 @@
           return 0;
       }
       else {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "printenv directive does not take tags in %s",
   		    r->filename);
           ap_rputs(error, r);
  @@ -2127,7 +2127,7 @@
       while (1) {
           if (!find_string(f, STARTING_SEQUENCE, r, printing)) {
               if (get_directive(f, directive, sizeof(directive), r->pool)) {
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   			    "mod_include: error reading directive in %s",
   			    r->filename);
   		ap_rputs(error, r);
  @@ -2173,7 +2173,7 @@
               }
               if (!strcmp(directive, "exec")) {
                   if (noexec) {
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                   "httpd: exec used but not allowed in %s",
                                   r->filename);
                       if (printing) {
  @@ -2212,7 +2212,7 @@
               }
   #endif
               else {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "httpd: unknown directive \"%s\" "
                               "in parsed doc %s",
                               directive, r->filename);
  @@ -2222,7 +2222,7 @@
                   ret = find_string(f, ENDING_SEQUENCE, r, 0);
               }
               if (ret) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                               "httpd: premature EOF in parsed file %s",
                               r->filename);
                   return;
  @@ -2294,7 +2294,7 @@
           return DECLINED;
       }
       if (r->finfo.st_mode == 0) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "File does not exist: %s",
                       (r->path_info
                        ? ap_pstrcat(r->pool, r->filename, r->path_info, NULL)
  @@ -2303,7 +2303,7 @@
       }
   
       if (!(f = ap_pfopen(r->pool, r->filename, "r"))) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                       "file permissions deny server access: %s", r->filename);
           return HTTP_FORBIDDEN;
       }
  
  
  
  1.41      +1 -1      apache-1.3/src/modules/standard/mod_info.c
  
  Index: mod_info.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_info.c,v
  retrieving revision 1.40
  retrieving revision 1.41
  diff -u -r1.40 -r1.41
  --- mod_info.c	1998/04/11 12:00:48	1.40
  +++ mod_info.c	1998/08/06 17:30:59	1.41
  @@ -171,7 +171,7 @@
   
       fp = ap_pcfg_openfile(p, filename);
       if (!fp) {
  -        ap_log_error(APLOG_MARK, APLOG_WARNING, r->server, 
  +        ap_log_rerror(APLOG_MARK, APLOG_WARNING, r, 
   		    "mod_info: couldn't open config file %s",
   		    filename);
           return NULL;
  
  
  
  1.37      +37 -37    apache-1.3/src/modules/standard/mod_mime_magic.c
  
  Index: mod_mime_magic.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_mime_magic.c,v
  retrieving revision 1.36
  retrieving revision 1.37
  diff -u -r1.36 -r1.37
  --- mod_mime_magic.c	1998/07/08 17:47:17	1.36
  +++ mod_mime_magic.c	1998/08/06 17:31:00	1.37
  @@ -575,7 +575,7 @@
   
       /* make sure we have a list to put it in */
       if (!req_dat) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": request config should not be NULL");
   	if (!(req_dat = magic_set_config(r))) {
   	    /* failure */
  @@ -677,7 +677,7 @@
       /* clean up and return */
       result[res_pos] = 0;
   #if MIME_MAGIC_DEBUG
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   	     MODNAME ": rsl_strdup() %d chars: %s", res_pos - 1, result);
   #endif
       return result;
  @@ -749,7 +749,7 @@
   		else {
   		    /* should not be possible */
   		    /* abandon malfunctioning module */
  -		    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   				MODNAME ": bad state %d (ws)", state);
   		    return DECLINED;
   		}
  @@ -793,7 +793,7 @@
   		else {
   		    /* should not be possible */
   		    /* abandon malfunctioning module */
  -		    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +		    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   				MODNAME ": bad state %d (ns)", state);
   		    return DECLINED;
   		}
  @@ -868,7 +868,7 @@
   
       if ((fd = ap_popenf(r->pool, r->filename, O_RDONLY, 0)) < 0) {
   	/* We can't open it, but we were able to stat it. */
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    MODNAME ": can't read `%s'", r->filename);
   	/* let some other handler decide what the problem is */
   	return DECLINED;
  @@ -878,7 +878,7 @@
        * try looking at the first HOWMANY bytes
        */
       if ((nbytes = read(fd, (char *) buf, sizeof(buf) - 1)) == -1) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    MODNAME ": read failed: %s", r->filename);
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  @@ -1479,7 +1479,7 @@
   	/* We used stat(), the only possible reason for this is that the
   	 * symlink is broken.
   	 */
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": broken symlink (%s)", fn);
   	return HTTP_INTERNAL_SERVER_ERROR;
   #endif
  @@ -1493,7 +1493,7 @@
       case S_IFREG:
   	break;
       default:
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": invalid mode 0%o.", (unsigned int)r->finfo.st_mode);
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  @@ -1560,7 +1560,7 @@
       struct magic *m;
   
   #if MIME_MAGIC_DEBUG
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		MODNAME ": match conf=%x file=%s m=%s m->next=%s last=%s",
   		conf,
   		conf->magicfile ? conf->magicfile : "NULL",
  @@ -1575,7 +1575,7 @@
   	    ap_isprint((((unsigned long) m) >> 16) & 255) &&
   	    ap_isprint((((unsigned long) m) >> 8) & 255) &&
   	    ap_isprint(((unsigned long) m) & 255)) {
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			MODNAME ": match: POINTER CLOBBERED! "
   			"m=\"%c%c%c%c\"",
   			(((unsigned long) m) >> 24) & 255,
  @@ -1590,7 +1590,7 @@
       for (m = conf->magic; m; m = m->next) {
   #if MIME_MAGIC_DEBUG
   	rule_counter++;
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    MODNAME ": line=%d desc=%s", m->lineno, m->desc);
   #endif
   
  @@ -1610,7 +1610,7 @@
   	    while (m_cont && (m_cont->cont_level != 0)) {
   #if MIME_MAGIC_DEBUG
   		rule_counter++;
  -		ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			MODNAME ": line=%d mc=%x mc->next=%x cont=%d desc=%s",
   			    m_cont->lineno, m_cont,
   			    m_cont->next, m_cont->cont_level,
  @@ -1629,7 +1629,7 @@
   	/* if we get here, the main entry rule was a match */
   	/* this will be the last run through the loop */
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    MODNAME ": rule matched, line=%d type=%d %s",
   		    m->lineno, m->type,
   		    (m->type == STRING) ? m->value.s : "");
  @@ -1653,7 +1653,7 @@
   	m = m->next;
   	while (m && (m->cont_level != 0)) {
   #if MIME_MAGIC_DEBUG
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			MODNAME ": match line=%d cont=%d type=%d %s",
   			m->lineno, m->cont_level, m->type,
   			(m->type == STRING) ? m->value.s : "");
  @@ -1697,13 +1697,13 @@
   	    m = m->next;
   	}
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    MODNAME ": matched after %d rules", rule_counter);
   #endif
   	return 1;		/* all through */
       }
   #if MIME_MAGIC_DEBUG
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		MODNAME ": failed after %d rules", rule_counter);
   #endif
       return 0;			/* no match at all */
  @@ -1750,7 +1750,7 @@
   	(void) magic_rsl_printf(r, m->desc, pp);
   	return;
       default:
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": invalid m->type (%d) in mprint().",
   		    m->type);
   	return;
  @@ -1796,7 +1796,7 @@
   	    ((p->hl[3] << 24) | (p->hl[2] << 16) | (p->hl[1] << 8) | (p->hl[0]));
   	return 1;
       default:
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": invalid type %d in mconvert().", m->type);
   	return 0;
       }
  @@ -1848,7 +1848,7 @@
       int matched;
   
       if ((m->value.s[0] == 'x') && (m->value.s[1] == '\0')) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": BOINK");
   	return 1;
       }
  @@ -1893,7 +1893,7 @@
   	break;
       default:
   	/*  bogosity, pretend that it just wasn't a match */
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": invalid type %d in mcheck().", m->type);
   	return 0;
       }
  @@ -1903,7 +1903,7 @@
       switch (m->reln) {
       case 'x':
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    "%lu == *any* = 1", v);
   #endif
   	matched = 1;
  @@ -1912,7 +1912,7 @@
       case '!':
   	matched = v != l;
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    "%lu != %lu = %d", v, l, matched);
   #endif
   	break;
  @@ -1920,7 +1920,7 @@
       case '=':
   	matched = v == l;
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    "%lu == %lu = %d", v, l, matched);
   #endif
   	break;
  @@ -1929,14 +1929,14 @@
   	if (m->flag & UNSIGNED) {
   	    matched = v > l;
   #if MIME_MAGIC_DEBUG
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			"%lu > %lu = %d", v, l, matched);
   #endif
   	}
   	else {
   	    matched = (long) v > (long) l;
   #if MIME_MAGIC_DEBUG
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			"%ld > %ld = %d", v, l, matched);
   #endif
   	}
  @@ -1946,14 +1946,14 @@
   	if (m->flag & UNSIGNED) {
   	    matched = v < l;
   #if MIME_MAGIC_DEBUG
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			"%lu < %lu = %d", v, l, matched);
   #endif
   	}
   	else {
   	    matched = (long) v < (long) l;
   #if MIME_MAGIC_DEBUG
  -	    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   			"%ld < %ld = %d", v, l, matched);
   #endif
   	}
  @@ -1962,7 +1962,7 @@
       case '&':
   	matched = (v & l) == l;
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    "((%lx & %lx) == %lx) = %d", v, l, l, matched);
   #endif
   	break;
  @@ -1970,7 +1970,7 @@
       case '^':
   	matched = (v & l) != l;
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    "((%lx & %lx) != %lx) = %d", v, l, l, matched);
   #endif
   	break;
  @@ -1978,7 +1978,7 @@
       default:
   	/* bogosity, pretend it didn't match */
   	matched = 0;
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_ERR, r,
   		    MODNAME ": mcheck: can't happen: invalid relation %d.",
   		    m->reln);
   	break;
  @@ -2153,7 +2153,7 @@
       return (child_pid);
   #else
       execvp(compr[parm->method].argv[0], compr[parm->method].argv);
  -    ap_log_error(APLOG_MARK, APLOG_ERR, parm->r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_ERR, parm->r,
   		MODNAME ": could not execute `%s'.",
   		compr[parm->method].argv[0]);
       return -1;
  @@ -2179,14 +2179,14 @@
   
       if (!ap_bspawn_child(sub_pool, uncompress_child, &parm, kill_always,
   			 &bin, &bout, NULL)) {
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    MODNAME ": couldn't spawn uncompress process: %s", r->uri);
   	return -1;
       }
   
       if (ap_bwrite(bin, old, n) != n) {
   	ap_destroy_pool(sub_pool);
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    MODNAME ": write failed.");
   	return -1;
       }
  @@ -2194,7 +2194,7 @@
       *newch = (unsigned char *) ap_palloc(r->pool, n);
       if ((n = ap_bread(bout, *newch, n)) <= 0) {
   	ap_destroy_pool(sub_pool);
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   	    MODNAME ": read failed %s", r->filename);
   	return -1;
       }
  @@ -2301,7 +2301,7 @@
       request_rec *sub;
   
   #if MIME_MAGIC_DEBUG
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		MODNAME ": revision_suffix checking %s", r->filename);
   #endif /* MIME_MAGIC_DEBUG */
   
  @@ -2320,7 +2320,7 @@
       result = 0;
       sub_filename = ap_pstrndup(r->pool, r->filename, suffix_pos);
   #if MIME_MAGIC_DEBUG
  -    ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		MODNAME ": subrequest lookup for %s", sub_filename);
   #endif /* MIME_MAGIC_DEBUG */
       sub = ap_sub_req_lookup_file(sub_filename, r);
  @@ -2329,7 +2329,7 @@
       if (sub->content_type) {
   	r->content_type = ap_pstrdup(r->pool, sub->content_type);
   #if MIME_MAGIC_DEBUG
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, r,
   		    MODNAME ": subrequest %s got %s",
   		    sub_filename, r->content_type);
   #endif /* MIME_MAGIC_DEBUG */
  
  
  
  1.84      +6 -6      apache-1.3/src/modules/standard/mod_negotiation.c
  
  Index: mod_negotiation.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_negotiation.c,v
  retrieving revision 1.83
  retrieving revision 1.84
  diff -u -r1.83 -r1.84
  --- mod_negotiation.c	1998/07/08 17:47:18	1.83
  +++ mod_negotiation.c	1998/08/06 17:31:00	1.84
  @@ -681,7 +681,7 @@
       }
   
       if (!*cp) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "Syntax error in type map --- no ':': %s", r->filename);
           return NULL;
       }
  @@ -691,7 +691,7 @@
       } while (*cp && ap_isspace(*cp));
   
       if (!*cp) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "Syntax error in type map --- no header body: %s",
                       r->filename);
           return NULL;
  @@ -713,7 +713,7 @@
   
       map = ap_pfopen(neg->pool, rr->filename, "r");
       if (map == NULL) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                       "cannot access type map file: %s", rr->filename);
           return HTTP_FORBIDDEN;
       }
  @@ -805,7 +805,7 @@
       dirp = ap_popendir(neg->pool, neg->dir_name);
   
       if (dirp == NULL) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                       "cannot read directory for multi: %s", neg->dir_name);
           return HTTP_FORBIDDEN;
       }
  @@ -2052,7 +2052,7 @@
       }
   
       if (!best) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "no acceptable variant: %s", r->filename);
   
           set_neg_headers(r, neg, na_result);
  @@ -2139,7 +2139,7 @@
       }
   
       if (!best) {
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                       "no acceptable variant: %s", r->filename);
   
           set_neg_headers(r, neg, na_result);
  
  
  
  1.128     +13 -13    apache-1.3/src/modules/standard/mod_rewrite.c
  
  Index: mod_rewrite.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_rewrite.c,v
  retrieving revision 1.127
  retrieving revision 1.128
  diff -u -r1.127 -r1.128
  --- mod_rewrite.c	1998/08/03 09:15:14	1.127
  +++ mod_rewrite.c	1998/08/06 17:31:05	1.128
  @@ -1097,7 +1097,7 @@
                * we can actually use it!
                */
               if (!proxy_available) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                                "attempt to make remote request from mod_rewrite "
                                "without proxy enabled: %s", r->filename);
                   return FORBIDDEN;
  @@ -1334,7 +1334,7 @@
        */
       if (!(ap_allow_options(r) & (OPT_SYM_LINKS | OPT_SYM_OWNER))) {
           /* FollowSymLinks is mandatory! */
  -        ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
                        "Options FollowSymLinks or SymLinksIfOwnerMatch is off "
                        "which implies that RewriteRule directive is forbidden: "
                        "%s", r->filename);
  @@ -2614,8 +2614,8 @@
               if (cpT != NULL) {
                   n = strlen(cpT);
                   if (cpO + n >= newuri + sizeof(newuri)) {
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  -                                 r->server, "insufficient space in "
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
  +                                 r, "insufficient space in "
                                    "expand_map_lookups, aborting");
                       return;
                   }
  @@ -2625,8 +2625,8 @@
               else {
                   n = strlen(defaultvalue);
                   if (cpO + n >= newuri + sizeof(newuri)) {
  -                    ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 
  -                                 r->server, "insufficient space in "
  +                    ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 
  +                                 r, "insufficient space in "
                                    "expand_map_lookups, aborting");
                       return;
                   }
  @@ -2640,8 +2640,8 @@
                   cpT = cpI+strlen(cpI);
               n = cpT-cpI;
               if (cpO + n >= newuri + sizeof(newuri)) {
  -                ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 
  -                             r->server, "insufficient space in "
  +                ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 
  +                             r, "insufficient space in "
                                "expand_map_lookups, aborting");
                   return;
               }
  @@ -2691,7 +2691,7 @@
           if (strcmp(s->name, name) == 0) {
               if (s->type == MAPTYPE_TXT) {
                   if (stat(s->checkfile, &st) == -1) {
  -                    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                                    "mod_rewrite: can't access text RewriteMap "
                                    "file %s", s->checkfile);
                       rewritelog(r, 1, "can't open RewriteMap file, "
  @@ -2726,7 +2726,7 @@
               else if (s->type == MAPTYPE_DBM) {
   #ifndef NO_DBM_REWRITEMAP
                   if (stat(s->checkfile, &st) == -1) {
  -                    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                                    "mod_rewrite: can't access DBM RewriteMap "
                                    "file %s", s->checkfile);
                       rewritelog(r, 1, "can't open DBM RewriteMap file, "
  @@ -2786,7 +2786,7 @@
               }
               else if (s->type == MAPTYPE_RND) {
                   if (stat(s->checkfile, &st) == -1) {
  -                    ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +                    ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                                    "mod_rewrite: can't access text RewriteMap "
                                    "file %s", s->checkfile);
                       rewritelog(r, 1, "can't open RewriteMap file, "
  @@ -4092,7 +4092,7 @@
   #endif
   
       if (rc < 0) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                        "mod_rewrite: failed to lock file descriptor");
           exit(1);
       }
  @@ -4122,7 +4122,7 @@
   #endif
   
       if (rc < 0) {
  -        ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +        ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
                        "mod_rewrite: failed to unlock file descriptor");
           exit(1);
       }
  
  
  
  1.23      +2 -2      apache-1.3/src/modules/standard/mod_speling.c
  
  Index: mod_speling.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_speling.c,v
  retrieving revision 1.22
  retrieving revision 1.23
  diff -u -r1.22 -r1.23
  --- mod_speling.c	1998/08/06 02:38:10	1.22
  +++ mod_speling.c	1998/08/06 17:31:11	1.23
  @@ -382,7 +382,7 @@
               ap_table_setn(r->headers_out, "Location",
   			  ap_construct_url(r->pool, nuri, r));
   
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_INFO, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_INFO, r,
   			 ref ? "Fixed spelling: %s to %s from %s"
   			     : "Fixed spelling: %s to %s",
   			 r->uri, nuri, ref);
  @@ -465,7 +465,7 @@
               /* Pass our table to http_protocol.c (see mod_negotiation): */
               ap_table_setn(notes, "variant-list", t);
   
  -            ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_INFO, r->server,
  +            ap_log_rerror(APLOG_MARK, APLOG_NOERRNO | APLOG_INFO, r,
   			 ref ? "Spelling fix: %s: %d candidates from %s"
   			     : "Spelling fix: %s: %d candidates",
   			 r->uri, candidates->nelts, ref);
  
  
  
  1.91      +1 -1      apache-1.3/src/modules/standard/mod_status.c
  
  Index: mod_status.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_status.c,v
  retrieving revision 1.90
  retrieving revision 1.91
  diff -u -r1.90 -r1.91
  --- mod_status.c	1998/08/03 09:15:14	1.90
  +++ mod_status.c	1998/08/06 17:31:14	1.91
  @@ -246,7 +246,7 @@
       tu = ts = tcu = tcs = 0;
   
       if (!ap_exists_scoreboard_image()) {
  -	ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
   		    "Server status unavailable in inetd mode");
   	return HTTP_INTERNAL_SERVER_ERROR;
       }
  
  
  
  1.14      +10 -10    apache-1.3/src/os/win32/mod_isapi.c
  
  Index: mod_isapi.c
  ===================================================================
  RCS file: /export/home/cvs/apache-1.3/src/os/win32/mod_isapi.c,v
  retrieving revision 1.13
  retrieving revision 1.14
  diff -u -r1.13 -r1.14
  --- mod_isapi.c	1998/07/08 17:47:24	1.13
  +++ mod_isapi.c	1998/08/06 17:31:34	1.14
  @@ -147,14 +147,14 @@
   
       if (!(isapi_handle = LoadLibraryEx(r->filename, NULL,
   				       LOAD_WITH_ALTERED_SEARCH_PATH))) {
  -	ap_log_error(APLOG_MARK, APLOG_ALERT, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ALERT, r,
   		    "Could not load DLL: %s", r->filename);
   	return SERVER_ERROR;
       }
   
       if (!(isapi_version =
   	  (void *)(GetProcAddress(isapi_handle, "GetExtensionVersion")))) {
  -	ap_log_error(APLOG_MARK, APLOG_ALERT, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ALERT, r,
   		    "DLL could not load GetExtensionVersion(): %s", r->filename);
   	FreeLibrary(isapi_handle);
   	return SERVER_ERROR;
  @@ -162,7 +162,7 @@
   
       if (!(isapi_entry =
   	  (void *)(GetProcAddress(isapi_handle, "HttpExtensionProc")))) {
  -	ap_log_error(APLOG_MARK, APLOG_ALERT, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ALERT, r,
   		    "DLL could not load HttpExtensionProc(): %s", r->filename);
   	FreeLibrary(isapi_handle);
   	return SERVER_ERROR;
  @@ -173,7 +173,7 @@
       /* Run GetExtensionVersion() */
   
       if ((*isapi_version)(pVer) != TRUE) {
  -	ap_log_error(APLOG_MARK, APLOG_ALERT, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ALERT, r,
   		    "ISAPI GetExtensionVersion() failed: %s", r->filename);
   	FreeLibrary(isapi_handle);
   	return SERVER_ERROR;
  @@ -264,7 +264,7 @@
   
       /* Check for a log message - and log it */
       if (ecb->lpszLogData && strcmp(ecb->lpszLogData, ""))
  -	ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   		    "%s: %s", ecb->lpszLogData, r->filename);
   
       /* All done with the DLL... get rid of it */
  @@ -283,7 +283,7 @@
   
   	return OK;
       case HSE_STATUS_PENDING:	/* We don't support this */
  -	ap_log_error(APLOG_MARK, APLOG_WARNING, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_WARNING, r,
   		    "ISAPI asynchronous I/O not supported: %s", r->filename);
       case HSE_STATUS_ERROR:
       default:
  @@ -345,7 +345,7 @@
   
       /* We only support synchronous writing */
       if (dwReserved && dwReserved != HSE_IO_SYNC) {
  -	ap_log_error(APLOG_MARK, APLOG_WARNING, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_WARNING, r,
   		    "ISAPI asynchronous I/O not supported: %s", r->filename);
   	SetLastError(ERROR_INVALID_PARAMETER);
   	return FALSE;
  @@ -430,7 +430,7 @@
   		*lf = '\0';
   #else
   	    if (!lf) { /* Huh? Invalid data, I think */
  -		ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			    "ISA sent invalid headers: %s", r->filename);
   		SetLastError(ERROR);	/* XXX: Find right error */
   		return FALSE;
  @@ -453,7 +453,7 @@
   
   	    if (!(value = strchr(data, ':'))) {
   		SetLastError(ERROR);	/* XXX: Find right error */
  -		ap_log_error(APLOG_MARK, APLOG_ERR, r->server,
  +		ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
   			    "ISA sent invalid headers", r->filename);
   		return FALSE;
   	    }
  @@ -536,7 +536,7 @@
       /* We don't support all this async I/O, Microsoft-specific stuff */
       case HSE_REQ_IO_COMPLETION:
       case HSE_REQ_TRANSMIT_FILE:
  -	ap_log_error(APLOG_MARK, APLOG_WARNING, r->server,
  +	ap_log_rerror(APLOG_MARK, APLOG_WARNING, r,
   		    "ISAPI asynchronous I/O not supported: %s", r->filename);
       default:
   	SetLastError(ERROR_INVALID_PARAMETER);