assert_eid(e->id);
assert(e->name.size());
- debugs(55, 9, this << " adding entry: " << e->id << " at " <<
- entries.count);
+ debugs(55, 7, HERE << this << " adding entry: " << e->id << " at " << entries.count);
if (CBIT_TEST(mask, e->id))
Headers[e->id].stat.repCount++;
assert(e);
assert_eid(e->id);
- debugs(55, 7, this << " adding entry: " << e->id << " at " <<
- entries.count);
+ debugs(55, 7, HERE << this << " adding entry: " << e->id << " at " << entries.count);
if (CBIT_TEST(mask, e->id))
Headers[e->id].stat.repCount++;
if (!(ssl = httpsCreate(details, sslContext)))
return;
- debugs(33, 5, HERE << details << " accepted, starting SSL negotiation.");
+ debugs(33, 4, HERE << details << " accepted, starting SSL negotiation.");
fd_note(details->fd, "client https connect");
if (s->http.tcp_keepalive.enabled) {
}
if (!Comm::IsConnOpen(serverConnection)) {
- debugs(11,2, HERE << "ignoring broken POST for closed " << serverConnection);
+ debugs(11, 3, HERE << "ignoring broken POST for closed " << serverConnection);
assert(closeHandler != NULL);
return true; // prevent caller from proceeding as if nothing happened
}
- debugs(11, 2, "finishingBrokenPost: fixing broken POST");
+ debugs(11, 3, "finishingBrokenPost: fixing broken POST");
typedef CommCbMemFunT<HttpStateData, CommIoCbParams> Dialer;
requestSender = JobCallback(11,5,
Dialer, this, HttpStateData::wroteLast);
((sockaddr_in*)S->ai_addr)->sin_port = 0;
assert(icmp_pktsize <= MAX_PKT4_SZ);
- debugs(42, 2, HERE << "Send ICMP packet to " << to << ".");
+ debugs(42, 5, HERE << "Send ICMP packet to " << to << ".");
x = sendto(icmp_sock,
(const void *) pkt,
if (!strncasecmp(unit, B_GBYTES_STR, strlen(B_GBYTES_STR)))
return 1 << 30;
+ std::cerr << "WARNING: Unknown bytes unit '" << unit << "'" << std::endl;
+
return 0;
}
#if HAVE_SETRLIMIT && defined(RLIMIT_VMEM)
if (getrlimit(RLIMIT_VMEM, &rl) < 0) {
- debugs(50, 0, "getrlimit: RLIMIT_VMEM: " << xstrerror());
+ debugs(50, DBG_CRITICAL, "getrlimit: RLIMIT_VMEM: " << xstrerror());
} else if (rl.rlim_max > rl.rlim_cur) {
rl.rlim_cur = rl.rlim_max; /* set it to the max */
sigemptyset(&sa.sa_mask);
if (sigaction(sig, &sa, NULL) < 0)
- debugs(50, 0, "sigaction: sig=" << sig << " func=" << func << ": " << xstrerror());
+ debugs(50, DBG_CRITICAL, "sigaction: sig=" << sig << " func=" << func << ": " << xstrerror());
#else
#if _SQUID_MSWIN_
}
if ( !Config.Wccp.router.SetIPv4() ) {
- debugs(1, 1, "WCCPv1 Disabled. Router " << Config.Wccp.router << " is not IPv4.");
+ debugs(80, DBG_CRITICAL, "WCCPv1 Disabled. Router " << Config.Wccp.router << " is not an IPv4 address.");
return;
}
if ( !Config.Wccp.address.SetIPv4() ) {
- debugs(1, 1, "WCCPv1 Disabled. Local address " << Config.Wccp.address << " is not IPv4.");
+ debugs(80, DBG_CRITICAL, "WCCPv1 Disabled. Local address " << Config.Wccp.address << " is not an IPv4 address.");
return;
}
debugs(80, 5, "wccp2ConnectionOpen: Called");
if (wccp2_numrouters == 0 || !wccp2_service_list_head) {
- debugs(80, 2, "WCCPv2 Disabled.");
+ debugs(80, 2, "WCCPv2 Disabled. No IPv4 Router(s) configured.");
return;
}
if ( !Config.Wccp2.address.SetIPv4() ) {
- debugs(80, 0, "WCCPv2 Disabled. " << Config.Wccp2.address << " is not an IPv4 address.");
+ debugs(80, DBG_CRITICAL, "WCCPv2 Disabled. Local address " << Config.Wccp2.address << " is not an IPv4 address.");
return;
}
service_id = GetInteger();
if (service_id < 0 || service_id > 255) {
- debugs(80, 0, "wccp2ParseServiceInfo: service info id " << service_id << " is out of range (0..255)");
+ debugs(80, DBG_CRITICAL, "ERROR: invalid WCCP service id " << service_id << " (must be between 0 .. 255)");
self_destruct();
}
service_id = GetInteger();
if (service_id < 0 || service_id > 255) {
- debugs(80, 1, "parse_wccp2_service_info: invalid service id " << service_id << " (must be between 0 .. 255)");
+ debugs(80, DBG_CRITICAL, "ERROR: invalid WCCP service id " << service_id << " (must be between 0 .. 255)");
self_destruct();
}